j’ai pas de firewall sur le serveur mail
firewall de mon serveur principal qui fait aussi passerelle
debian:/usr/local/bin# iptables-save -c
# Generated by iptables-save v1.4.2 on Sat Jun 25 17:34:08 2011
*raw
:PREROUTING ACCEPT [3465:4935316]
:OUTPUT ACCEPT [3185:180475]
COMMIT
# Completed on Sat Jun 25 17:34:08 2011
# Generated by iptables-save v1.4.2 on Sat Jun 25 17:34:08 2011
*nat
:PREROUTING ACCEPT [2:96]
:POSTROUTING ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
[0:0] -A PREROUTING -i eth1 -p tcp -m tcp --dport 25 -j DNAT --to-destination 192.168.10.50
[0:0] -A PREROUTING -i eth1 -p tcp -m tcp --dport 110 -j DNAT --to-destination 192.168.10.50
[0:0] -A PREROUTING -i eth1 -p tcp -m tcp --dport 143 -j DNAT --to-destination 192.168.10.50:143
[0:0] -A PREROUTING -i eth0 -p tcp -m tcp --dport 21 -j DNAT --to-destination 192.168.10.3:21
[0:0] -A PREROUTING -i eth0 -p tcp -m tcp --dport 80 -j DNAT --to-destination 192.168.10.50
[2:96] -A POSTROUTING -o eth0 -j MASQUERADE
COMMIT
# Completed on Sat Jun 25 17:34:08 2011
# Generated by iptables-save v1.4.2 on Sat Jun 25 17:34:08 2011
*mangle
:PREROUTING ACCEPT [3472:4935596]
:INPUT ACCEPT [3453:4929791]
:FORWARD ACCEPT [19:5805]
:OUTPUT ACCEPT [1115187635:938262197295]
:POSTROUTING ACCEPT [3222:188684]
COMMIT
# Completed on Sat Jun 25 17:34:08 2011
# Generated by iptables-save v1.4.2 on Sat Jun 25 17:34:08 2011
*filter
:INPUT DROP [32:47744]
:FORWARD DROP [0:0]
:OUTPUT DROP [1:124]
:denylog - [0:0]
[0:0] -A INPUT -i eth0 -p tcp -m tcp --dport 22 -m state --state NEW -m recent --update --seconds 60 --hitcount 4 --name DEFAULT --rsource -j DROP
[0:0] -A INPUT -i eth0 -p tcp -m tcp --dport 22 -m state --state NEW -m recent --set --name DEFAULT --rsource
[2023:2867894] -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
[0:0] -A INPUT -i lo -j ACCEPT
[0:0] -A INPUT -s 192.168.10.0/24 -d 192.168.10.2/32 -j ACCEPT
[1:328] -A INPUT -s 0.0.0.0/32 -d 255.255.255.255/32 -j ACCEPT
[0:0] -A INPUT -s 192.168.10.0/24 -d 192.168.10.255/32 -j ACCEPT
[0:0] -A INPUT -i eth0 -p icmp -m state --state NEW -m limit --limit 2/sec -j ACCEPT
[0:0] -A INPUT -p icmp -m icmp --icmp-type 3 -j ACCEPT
[0:0] -A INPUT -p icmp -m icmp --icmp-type 11 -j ACCEPT
[0:0] -A INPUT -p icmp -m icmp --icmp-type 8 -j ACCEPT
[0:0] -A INPUT -p icmp -m icmp --icmp-type 0 -j ACCEPT
[0:0] -A INPUT -p tcp -m tcp --dport 443 -j ACCEPT
[0:0] -A INPUT -p tcp -m tcp --dport 25 -j ACCEPT
[0:0] -A INPUT -p tcp -m tcp --dport 110 -j ACCEPT
[0:0] -A INPUT -p tcp -m tcp --dport 8765 -j ACCEPT
[0:0] -A INPUT -s 192.168.10.0/24 -p tcp -m tcp --dport 10000 -j ACCEPT
[0:0] -A INPUT -p tcp -m tcp --dport 22 -j ACCEPT
[0:0] -A INPUT -j denylog
[0:0] -A FORWARD -p tcp -m tcp --dport 25 -j ACCEPT
[0:0] -A FORWARD -p tcp -m tcp --sport 25 -j ACCEPT
[0:0] -A FORWARD -p tcp -m tcp --dport 110 -j ACCEPT
[0:0] -A FORWARD -p tcp -m tcp --sport 110 -j ACCEPT
[0:0] -A FORWARD -p tcp -m tcp --dport 143 -j ACCEPT
[0:0] -A FORWARD -p tcp -m tcp --sport 143 -j ACCEPT
[0:0] -A FORWARD -p tcp -m tcp --dport 20:21 -j ACCEPT
[0:0] -A FORWARD -p tcp -m tcp --sport 20:21 -j ACCEPT
[9:2885] -A FORWARD -p tcp -m tcp --dport 80 -j ACCEPT
[6:2365] -A FORWARD -p tcp -m tcp --sport 80 -j ACCEPT
[2:152] -A FORWARD -i eth1 -o eth0 -m state --state NEW,RELATED,ESTABLISHED,UNTRACKED -j ACCEPT
[2:403] -A FORWARD -i eth0 -o eth1 -m state --state RELATED,ESTABLISHED -j ACCEPT
[0:0] -A FORWARD -i eth2 -o eth0 -m state --state NEW,RELATED,ESTABLISHED,UNTRACKED -j ACCEPT
[0:0] -A FORWARD -i eth0 -o eth2 -m state --state RELATED,ESTABLISHED -j ACCEPT
[0:0] -A FORWARD -i eth1 -o eth2 -m state --state NEW,RELATED,ESTABLISHED,UNTRACKED -j ACCEPT
[0:0] -A FORWARD -i eth2 -o eth1 -m state --state RELATED,ESTABLISHED -j ACCEPT
[0:0] -A FORWARD -m state --state INVALID -m limit --limit 3/sec -j LOG --log-prefix "INVALID FORWARD: "
[0:0] -A FORWARD -m state --state INVALID -j DROP
[0:0] -A FORWARD -p tcp -m tcp ! --tcp-flags FIN,SYN,RST,PSH,ACK,URG SYN -m state --state NEW -m limit --limit 3/sec -j LOG --log-prefix "FORWARD TCP sans SYN: "
[0:0] -A FORWARD -p tcp -m tcp ! --tcp-flags FIN,SYN,RST,PSH,ACK,URG SYN -m state --state NEW -j DROP
[0:0] -A FORWARD -m limit --limit 3/sec -j LOG --log-prefix "BAD FORWARD "
[0:0] -A FORWARD -j DROP
[1892:109598] -A OUTPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
[0:0] -A OUTPUT -o lo -j ACCEPT
[0:0] -A OUTPUT -s 192.168.10.2/32 -d 192.168.10.0/24 -j ACCEPT
[0:0] -A OUTPUT -s 192.168.10.2/32 -d 192.168.10.255/32 -j ACCEPT
[0:0] -A OUTPUT -p tcp -m tcp --dport 123 -j ACCEPT
[0:0] -A OUTPUT -p udp -m udp --dport 123 -j ACCEPT
[0:0] -A OUTPUT -p tcp -m tcp --dport 53 -j ACCEPT
[0:0] -A OUTPUT -p udp -m udp --dport 53 -j ACCEPT
[0:0] -A denylog -m limit --limit 40/min -j LOG --log-prefix "IPTABLES "
[0:0] -A denylog -j DROP
COMMIT