I have a peculiar problem, and I am not sure that I have diagnosed it
correctly: syslog reports every connection made by my internally masq'd
machines to my masquerading machine as a connection attempt, such as:
tpclogd: port 3128 connection attempt from
This doesn't interfer with web browsing, etc. but it clutters the syslog
and makes scanning it difficult since I am regularly reviewing it to
scan it for real unauthorized attempts to connect. I don't understand
why I can't make it recognize the computers on my network, as
connections are logged as connection attempts but not really blocked,
then I am doing something wrong to prohibit outside connections. I
should mention I am running squid to provide web caching to my internal
lan, which is why port 3128 is being used.
My theories as to why this is happening: (1) I don't have the right rule
for ipfwadm to permit this access explicitly; or (2) I have
misconfigured hosts, hosts.allow and hosts.deny.
(1) I am using ipfwadm for firewall rules; I have a robust rule set from
David Ranch's TrinityOS pages, but I cannot figure out how to explicitly
permit access from the internal network to squid (if that is the
problem); is this correct ($intif is the internal interface, $intip is
the internal lan ip address, $universe = 0.0.0.0)?
/sbin/ipfwadm -I -a accept -W $intif -P tcp -S $universe/0 -D $intip/32
3128
/sbin/ipfwadm -I -a accept -W $intif -P tcp -S $universe/0 3128 -D
$intip/32
(2) My hosts file on the masquerading machine lists the loopback as
localhost, and each computer
with the internal IP address in the following form:
and hosts.allows is:
ALL: 127.0.0.1
ALL: LOCAL
Of course, hosts.deny is:
ALL: ALL
ALL: PARANOID