I just moved from openSUSE and it was quite the adjustment and these forums have been truly superb is getting me moved in the right direction - thank you! One problem remains. This home server has two NICs, bce0 (public IP) and bce1 (private IP). It's also my DNS and DHCP server for the internal network, actually, it's also running PostFix and Dovecot and SSHD until I get another box. All of these are working great with ipfw+nat.
What's not working is my kid's Minecraft server running on port 25565 (rule 00550 below). I can see the server from other networks but when I connect the game is unstable and I get odd disconnects. Once a connection is established though and I stop the firewall, the connections are maintained and the game is perfectly playable. I've no idea what's happening. This is the [CMD=]ipfw show[/CMD] output.
When I enable LOGging on that port, I see all kinds of weirdness that I just don't understand and I was hoping that one of you IPFW gurus might know. Here's a snippet of the /var/log/security when logging is on.
If I don't limit the logging, I can get 1000's of entries.
Is there something wrong in my firewall configuration? Thanks in advance for any insight!
What's not working is my kid's Minecraft server running on port 25565 (rule 00550 below). I can see the server from other networks but when I connect the game is unstable and I get odd disconnects. Once a connection is established though and I stop the firewall, the connections are maintained and the game is perfectly playable. I've no idea what's happening. This is the [CMD=]ipfw show[/CMD] output.
Code:
00080 allow ip from any to any via lo0
00081 deny ip from any to 127.0.0.0/8
00082 deny log ip from 127.0.0.0/8 to any
00500 allow tcp from any to any dst-port 80 in via bce0
00510 allow udp from any to any dst-port 53 in via bce0
00515 allow tcp from any to any dst-port 53 in via bce0
00520 allow tcp from any to any dst-port 2222 in via bce0
00530 allow tcp from any to any dst-port 25 in via bce0
00540 allow tcp from any to any dst-port 993 in via bce0
00550 allow tcp from any to any dst-port 25565 in via bce0
00800 divert 8668 ip from any to any via bce0
01100 check-state
01101 allow ip from any to any via bce1 keep-state
01102 allow ip from any to any out via bce0 keep-state
01103 deny tcp from any to any established in via bce0
01104 deny log ip from any to any frag in via bce0
01200 allow icmp from any to any icmptypes 3
01201 allow icmp from any to any icmptypes 4
01202 allow icmp from any to any icmptypes 8 out
01203 allow icmp from any to any icmptypes 0 in
01204 allow icmp from any to any icmptypes 11 in
60000 deny log tcp from any to any in tcpflags ack,rst recv bce0
65000 deny log ip from any to any
65535 allow ip from any to any
When I enable LOGging on that port, I see all kinds of weirdness that I just don't understand and I was hoping that one of you IPFW gurus might know. Here's a snippet of the /var/log/security when logging is on.
Code:
Mar 31 00:41:47 gandalf kernel: ipfw: 550 Accept TCP 172.17.3.203:50673 178.18.16.194:25565 out via bce0
Mar 31 00:41:48 gandalf kernel: ipfw: 550 Accept TCP 172.17.3.203:50670 109.74.240.179:25565 out via bce0
Mar 31 00:41:48 gandalf kernel: ipfw: limit 5 reached on entry 550
If I don't limit the logging, I can get 1000's of entries.
Is there something wrong in my firewall configuration? Thanks in advance for any insight!