|
Bugzilla – Full Text Bug Listing |
| Summary: | SuSE yast2 firewall configuration lacks some features thus requiring the user to use custom rules. | ||
|---|---|---|---|
| Product: | [openSUSE] openSUSE 10.2 | Reporter: | Olli Artemjev <grey-olli> |
| Component: | YaST2 | Assignee: | Lukas Ocilka <locilka> |
| Status: | RESOLVED WONTFIX | QA Contact: | Jiri Srain <jsrain> |
| Severity: | Enhancement | ||
| Priority: | P4 - Low | CC: | grey-olli, lnussel |
| Version: | Final | Keywords: | accessibility, Bad_Design, UI |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | openSUSE 10.2 | ||
| Whiteboard: | |||
| Found By: | Other | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Olli Artemjev
2007-09-10 00:11:32 UTC
1.) DNS Client in general doesn't make sense. If DNS reply doesn't work, it must be a very rare case. Actually DHCP Client should be removed. Other clients might make sense because they, e.g., listen to the broadcast reply or act as servers 'a bit'. 2.) Output cannot be configured, just Input. Ludwig, what do you think of that? You are right. DNS replies should just work as iptables consideres them as ESTABLISHED or RELATED. If that's not the case with some proprietary vpn solution then there is nothing we can do about it. DHCP clients use packet sockets that bypass filtering rules so there is normally no need to open then explicitly. For comment #2: 1. The case descibed in my report is dropping DNS _replies_. So, by adding the "DNS client" I mean adding ACCEPT on packets from port 53. 2. What situation did you mean by "Output cannot be configured, just Input"? For comment #3: > "is nothing we can do about it" wrong, you may allow user to implicitly allow replies from udp 53. That will solve problem w/ "some proprietary vpn solution" w/o requirements to open configs w/ text editor. > is normally no need to open then explicitly Well.. "normally" is the key. Are you developing a _useful_ interface or just a stub for kitchen dummies? If the second - just ignore my request. :/ I'm sorry but I seems your configuration is really very rare and it seems that the Custom Rules is the best way to go. YaST Firewall interface should not confuse common users with commonly-unneeded stuff. If YaST UI doesn't fit your needs, you can still edit /etc/sysconfig/SuSEfirewall2 file directly. 1.) Might be also caused by a wrong VPN or wrong router configuration. Such packets should be in state RELATED/ESTABLISHED when they arrive to the client's network interface. 2.) In firewall, you can set some rules for incoming packets, not outgoing (yes, iptables can configure both, but not YaST Firewall). Such definition you need "any packets coming from port 53" might be dangerous and doesn't cover the common way of using YaST Firewall. Custom Rules or editing the configuration manually is the way to go. _useful_ doesn't need to mean _useful-for-the-majority-of-users_ we can't have all features every single user needs, I'm sorry. |