Koozali.org: home of the SME Server
Legacy Forums => General Discussion (Legacy) => Topic started by: Renan Nepomuceno on April 10, 2003, 05:23:02 PM
-
Hi All,
I would like to install trend interscan viruswall on the same pc and also the latest e-smith mailfront with rbl so that mail and spam can be scanned.
Here is what I done but after that I can no longer receive mail:
1.) I just installed the latest e-smith-mailfront-1.0.0-2rbl.noarch.rpm by bradly then I modify the /etc/services file by doing this,
copy the file 10standard from /etc/e-smith/templates/etc/services directory to /etc/e-smith/templates-custom/etc/services;
Modify the 10standard and I change the following line
smtp 25/tcp to 2525/tcp used by mail
add the line
interscan 25/tcp => to be used by interscan
2.) apply the command
/sbin/e-smith/expand-template /etc/services
/sbin/e-smith/signal-event console-save
then restart the server
3.) Install the interscan viruswall and I setup interscan to use port25 then forward mail to port 2525 which is smtpfront then I issue the command " service smtpfront-qmail restart" without quote.
After that I try to scan using nmap from internet and the result was it was filtered or blocked.
P.S.
But when I do this same procedure on sme5.5 without updating the e-smith-mailfront-0.0.1rbl or 0.0.2rbl it was Ok
I don't know why this happen and why the smtp was been blocked. Anyone has clues. Can anyone experience this before, hope you can help me.
Best regards to All,
renan
-
P.S.
By the way here are the policy of my ipchains rule:
Note:
192.x.x.x = local ip address
65.x.x.x = public ip address
test.domain.com = my public domain
Chain input (policy DENY):
target prot opt source destination ports
icmpIn icmp ------ anywhere anywhere any -> any
ACCEPT all ------ anywhere anywhere n/a
denylog tcp ------ anywhere anywhere 0:chargen -> any
denylog udp ------ anywhere anywhere 0:chargen -> any
denylog tcp ------ anywhere anywhere any -> 0:chargen
denylog udp ------ anywhere anywhere any -> 0:chargen
DENY all ------ BASE-ADDRESS.MCAST.NET/4 anywhere n/a
DENY all ------ anywhere BASE-ADDRESS.MCAST.NET/4 n/a
ACCEPT tcp ------ anywhere localhost any -> www
ACCEPT tcp ------ anywhere test.domain.com any -> www
ACCEPT tcp ------ anywhere 65.x.x.x any -> www
REDIRECT tcp ------ 192.x.x.x anywhere any -> www => squid
ACCEPT all ------ 192.x.x.x anywhere n/a
ACCEPT tcp !y---- anywhere anywhere any -> any
ACCEPT tcp ------ anywhere 65.x.x.x any -> auth
ACCEPT udp ------ anywhere 65.x.x.x any -> 113
ACCEPT tcp ------ anywhere 65.x.x.x any -> www
ACCEPT tcp ------ anywhere 65.x.x.x any -> https
ACCEPT ipv6-crypt------ anywhere 65.x.x.x n/a
ACCEPT udp ------ anywhere 65.x.x.x 500 -> 500
ACCEPT gre ------ anywhere 65.x.x.x n/a
denylog tcp -y---- anywhere 65.x.x.x any -> mysql
DENY udp ------ anywhere anywhere any -> route
DENY tcp ------ anywhere anywhere any -> netbios-ns:netbios-ssn
DENY udp ------ anywhere anywhere any -> netbios-ns:netbios-ssn
denylog tcp -y---- anywhere 65.x.x.x any -> squid
ACCEPT tcp -y---- anywhere 65.x.x.x ftp-data -> 1024:65535
ACCEPT tcp ------ anywhere anywhere any -> 1024:65535
ACCEPT udp ------ anywhere anywhere any -> 1024:65535
denylog all ------ anywhere anywhere n/a
Chain forward (policy DENY):
target prot opt source destination ports
ACCEPT all ------ 192.x.x.x 192.x.x.x n/a
ACCEPT all ------ 192.x.x.x 192.x.x.x n/a
MASQ all ------ 192.x.x.x anywhere n/a
DENY all ------ anywhere anywhere n/a
Chain output (policy ACCEPT):
target prot opt source destination ports
icmpOut icmp ------ anywhere anywhere any -> any
- tcp ------ anywhere anywhere any -> www
- tcp ------ anywhere anywhere any -> ssh
- tcp ------ anywhere anywhere any -> telnet
- tcp ------ anywhere anywhere any -> ftp
- tcp ------ anywhere anywhere any -> pop3
- tcp ------ anywhere anywhere any -> interscan
- tcp ------ anywhere anywhere any -> ftp-data
ACCEPT all ------ anywhere anywhere n/a
DENY all ------ BASE-ADDRESS.MCAST.NET/4 anywhere n/a
DENY all ------ anywhere BASE-ADDRESS.MCAST.NET/4 n/a
ACCEPT icmp ------ 192.x.x.x anywhere any -> any
ACCEPT all ------ anywhere 192.x.x.x n/a
ACCEPT tcp !y---- 65.x.x.x anywhere www -> any
ACCEPT tcp !y---- 65.x.x.x anywhere https -> any
ACCEPT all ------ anywhere anywhere n/a
Chain denylog (9 references):
target prot opt source destination ports
DENY all ------ anywhere anywhere n/a
Chain icmpIn (1 references):
target prot opt source destination ports
ACCEPT icmp ------ anywhere anywhere echo-reply
ACCEPT icmp ------ anywhere anywhere destination-unreachable
ACCEPT icmp ------ anywhere anywhere source-quench
ACCEPT icmp ------ anywhere anywhere time-exceeded
ACCEPT icmp ------ anywhere anywhere parameter-problem
ACCEPT icmp ------ anywhere anywhere echo-request
denylog all ------ anywhere anywhere n/a
Chain icmpOut (1 references):
target prot opt source destination ports
ACCEPT icmp ------ anywhere anywhere echo-request
ACCEPT icmp ------ anywhere anywhere echo-reply
ACCEPT icmp ------ anywhere anywhere destination-unreachable
ACCEPT icmp ------ anywhere anywhere source-quench
ACCEPT icmp ------ anywhere anywhere time-exceeded
ACCEPT icmp ------ anywhere anywhere parameter-problem
denylog all ------ anywhere anywhere n/a
Maybe you colud help me solve my problem
Thanks in advance