Maik Fischer wrote: > > hi steffen, > > you are sure, that there are no cronjobs running? that is abnormal... see > "crontab -e" or "ls -l /etc/cron.d/", "ls -l /etc/cron.daily/", "ls -l > /etc/cron.weekly/" etc (if this at suse exist). > > normally, at least logrotate is running per cron... > > or do you mean, that no ipchains-cron is running? > > cu, > > Maik > > > -----Urspr�ngliche Nachricht----- > > Von: [EMAIL PROTECTED] > > [mailto:[EMAIL PROTECTED]]Im Auftrag von Steffen > > Schmalbach > > Gesendet: Mittwoch, 4. Juli 2001 15:00 > > An: Bgs himself > > Cc: [EMAIL PROTECTED] > > Betreff: Re: Ipchains phenomenon > > > > > > > > Thank you for the hints but there are no cronjobs running on > > the system > > ! > > Any other ideas ... maybe a known bug in ipchains (Version > > 1.3.9) or in > > the Kernel (2.2.16) ?? > > By the way ... the system worked fine fror about a half year > > and now the > > error occurs without having changed anything ! > > > > Steffen Schmalbach > > > > > > Bgs himself wrote: > > > > > > Hi ! > > > > > > I admit I don't know Suse well. Do you have anything in > > crontab or alike > > > that 'updates' you fw rules with ipchains-restore ? If you > > don't flush the > > > tables you'll have your configuration appended every time. > > > > > > Bye > > > Bgs > > Hey Maik I mean there are no cronjobs running except the ones runnning since installation of the system. I have not created any cronjobs ! Here i have got a short extract of my firewall script ... there are only some additional services allowed I think if the script would by started again and again it would not have this result of many many rules because the rules are all flushed. # Delete all rules ipchains -F # Flushes ipchains settings ipmasqadm portfw -f # Flushes ipmasqadm portfw settings # Default policies ipchains -P input DENY ipchains -P output REJECT ipchains -P forward REJECT # Loopback Interface allow everything ipchains -A input -i $LOOPBACK_ITF -j ACCEPT ipchains -A output -i $LOOPBACK_ITF -j ACCEPT # ALLOW everything from LOCAL_NETWORK to INTERNAL_IP ipchains -A input -i $INTERNAL_ITF -s $LOCAL_NETWORK -j ACCEPT ipchains -A output -i $INTERNAL_ITF -d $LOCAL_NETWORK -j ACCEPT # MASQUERADE every TCP connection from LOCAL_NETWORK to INTERNET ipchains -A forward -i $EXTERNAL_ITF -s $LOCAL_NETWORK -j MASQ ipchains -A forward -i $EXTERNAL_ITF -d $LOCAL_NETWORK -j MASQ # ALLOW SSH connection from outside ipchains -A input -i $EXTERNAL_ITF -p tcp -s $ANYWHERE $UNPRIV_PORTS -d $EXTERNAL_IP $SSH_PORT -j ACCEPT -l ipchains -A output -i $EXTERNAL_ITF -p tcp -s $EXTERNAL_IP $SSH_PORT -d $ANYWHERE $UNPRIV_PORTS -j ACCEPT -l ipchains -A input -i $EXTERNAL_ITF -p udp -s $ANYWHERE $UNPRIV_PORTS -d $EXTERNAL_IP $SSH_PORT -j ACCEPT -l ipchains -A output -i $EXTERNAL_ITF -p udp -s $EXTERNAL_IP $SSH_PORT -d $ANYWHERE $UNPRIV_PORTS -j ACCEPT -l # ALLOW SSH connection to outside ipchains -A output -i $EXTERNAL_ITF -p tcp -s $EXTERNAL_IP $UNPRIV_PORTS -d $ANYWHERE $SSH_PORT -j ACCEPT ipchains -A input -i $EXTERNAL_ITF -p tcp -s $ANYWHERE $SSH_PORT -d $EXTERNAL_IP $UNPRIV_PORTS -j ACCEPT ipchains -A output -i $EXTERNAL_ITF -p udp -s $EXTERNAL_IP $UNPRIV_PORTS -d $ANYWHERE $SSH_PORT -j ACCEPT ipchains -A input -i $EXTERNAL_ITF -p udp -s $ANYWHERE $SSH_PORT -d $EXTERNAL_IP $UNPRIV_PORTS -j ACCEPT this is an extraction of my firewallscript !
begin:vcard n:; tel;work:0228-9114627 x-mozilla-html:FALSE org:Much-Net DV GmbH adr:;;Simrockstr. 21 - 23;Bonn;;53113; version:2.1 email;internet:[EMAIL PROTECTED] title:Administrator x-mozilla-cpt:;25312 fn:Steffen Schmalbach end:vcard
