Tom,
A short while ago I bought into the Vonage VOIP telephone via cable. Shortly
thereafter I put out my rules file based on what the Vonage Tech told me.
That rules file was a quick ''n dirty way of getting up and running.
The
phone system works fine using SuSE 8.2 and Shorewall 1.4.2 using the two
interface setup as my router/firewall.
I have spent a little time refining the Rules file with the goal being to be
as restrictive as possible. I had been root kitted recently so I am a bit
paranoic. I changed the Rules file and all seems to be working well so far.
The purpose of this message is to ask you to review my changes and make any
suggestons you feel are necessary. Also if it continues to function well you
might want to include a little blurb in your documentation so you wont have
to answer these questions in the future. I would be happy to write up a
paragraph on what I have done if you think it might be helpful.
In reviewing what was necessary to make the voip work I decided to direct the
net access to the Cisco ATA via DNAT. In the original Rules file I had
ACCEPTed connections back and forth between the net and loc. After reviewing
the Policy file I figured out that it had already allowed all comm from loc
to net so about 1/2 of my rules file was superfluous. So here are the two
Rules files, before and after:
BEFORE:
ACCEPT loc fw udp 53
ACCEPT fw loc udp 53
ACCEPT loc net udp 5060
ACCEPT net loc udp 5060
ACCEPT loc fw udp 123
ACCEPT fw loc udp 123
# changed net to loc and loc to net on udp port 123 to test the voip
ACCEPT loc net udp 5061
ACCEPT net loc udp 5061
ACCEPT loc fw udp 69
ACCEPT fw loc udp 69
ACCEPT net loc udp 10100:10500
ACCEPT loc net udp 10100:10500
AFTER:
ACCEPT loc fw udp 53
ACCEPT fw loc udp 53
ACCEPT loc fw udp 69
ACCEPT fw loc udp 69
ACCEPT loc fw udp 123
ACCEPT fw loc udp 123
# changed net to loc and loc to net on udp port 123 to test the voip
DNAT net loc:192.168.1.147 udp 5060
DNAT net loc:192.168.1.147 udp 5061
DNAT net loc:192.168.1.147 udp 10100:10500
The phone works fine with the new settings so I didnt do to badly, I guess.
The burning question is did I improve anything securitywise or am I fooling
myself?
Also, since I am using DHCP to give the ATA its IP, how do I insure that the
loc:<IP address> will automatically be the lease address should it change?
I
suspect a script of some sort being run when Shorewall first fires up would
be in order to make any change necessary. Or is there someway to tie the
ports to the MAC address? But that is something I can worry about once the
basic things work.
I know you are very busy and I appreciate your looking at this.
Thanks again for making my life a lot easier. I am still amazed that people
spend a lot of time trying to get their SuSEFirewall working when Shorewall
will let idiots like me playlike we have some sense!
Regards,
Richard