swfla.rr.com == aka == timewarner/roadrunner cable
I'm using the default setup on the Bering_1.0rc3 floppy1680 image
---except I went ahead and removed norfc1918 from
/etc/shorewall/interfaces' eth0
Initially the users connected behind the firewall are able to use
services, then after a random amount of time the internet dissapears.
The internal network can still reach weblet on the firewall, but all
requests NAT to the internet fail.
From the firewall/Bering box itself, pump -s says I still have valid
lease, but it sure doesn't act like it.
If I issue shorewall stop, svi networking stop, power cycle the modem,
svi networking start, shorewall start, svi networking restart; the
connection to the internet at large is restored. It doesn't appear to be
a physical ISP failure, because I can do this immediately after the
disconnect. I can also reboot bering & powercycle the modem and get
immediate connection. The disconnect appears after a random amount of
time, sometimes a few minutes, sometimes after more that 12 hours.
eth0 is outside - connected to the rr cablemodem
eth1 is inside - connected to hub
eth2 is unused
what follows are via the firewall/bering box console.
uname=============================================================
Linux firewall 2.4.18 #4 Sun Jun 9 09:46:15 CEST 2002 i486 unknown
ip addr show =======================================================
1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 brd 127.255.255.255 scope host lo
2: dummy0: <BROADCAST,NOARP> mtu 1500 qdisc noop
link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff
3: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100
link/ether 00:00:c5:04:db:e8 brd ff:ff:ff:ff:ff:ff
inet 65.34.117.132/23 brd 255.255.255.255 scope global eth0
4: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100
link/ether 00:40:f6:f4:e5:d4 brd ff:ff:ff:ff:ff:ff
inet 192.168.1.254/24 brd 192.168.1.255 scope global eth1
5: eth2: <BROADCAST,MULTICAST> mtu 1500 qdisc noop qlen 100
link/ether 00:40:33:90:fc:3a brd ff:ff:ff:ff:ff:ff
ip route show ======================================================
192.168.1.0/24 dev eth1 proto kernel scope link src 192.168.1.254
65.34.116.0/23 dev eth0 proto kernel scope link src 65.34.117.132
default via 65.34.116.1 dev eth0
pump -s=============================================================
Device eth0
IP: 65.34.117.132
Netmask: 255.255.254.0
Broadcast: 255.255.255.255
Network: 65.34.116.0
Boot server 65.32.2.175
Next server 0.0.0.0
Gateway: 65.34.116.1
Hostname: firewall
Domain: swfla.rr.com
Nameservers: 65.32.1.70 65.32.2.130
Renewal time: Sat Aug 10 05:29:08 2002
Expiration time: Sat Aug 10 06:59:08 2002
netstat -nr---------------------------------------------------------
netstat: not found
traceroute: not found
ping a FQN that will normally respond----------------------------
never responds, have to kill process.
I am not getting info back from the nameserver.
All pings that follow are to numerical addresses x.x.x.x
see pump -s section above for appropriate address numbers
These ping(s) will succeed when firewall is first booted.
ping one, then the other nameserver---------------------------------
never responds, have to kill process. 100% packet loss
ping gateway---------------------------------------------------------
never responds, have to kill process. 100% packet loss
ping bootserver/DHCPserver------------------------------------------
never responds, have to kill process. 100% packet loss
ping address outside ISP that normally responds---------------------
never responds, have to kill process. 100% packet loss
iptables -nvL=======================================================
Chain INPUT (policy DROP 2 packets, 144 bytes)
pkts bytes target prot opt in out source
destination
560 52190 ACCEPT ah -- lo * 0.0.0.0/0
0.0.0.0/0
565 160K eth0_in ah -- eth0 * 0.0.0.0/0
0.0.0.0/0
373 24430 eth1_in ah -- eth1 * 0.0.0.0/0
0.0.0.0/0
0 0 common ah -- * * 0.0.0.0/0
0.0.0.0/0
0 0 LOG ah -- * * 0.0.0.0/0
0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:INPUT:REJECT:'
0 0 reject ah -- * * 0.0.0.0/0
0.0.0.0/0
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
7434 5349K eth0_fwd ah -- eth0 * 0.0.0.0/0
0.0.0.0/0
6112 758K eth1_fwd ah -- eth1 * 0.0.0.0/0
0.0.0.0/0
0 0 common ah -- * * 0.0.0.0/0
0.0.0.0/0
0 0 LOG ah -- * * 0.0.0.0/0
0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:FORWARD:REJECT:'
0 0 reject ah -- * * 0.0.0.0/0
0.0.0.0/0
Chain OUTPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
560 52190 ACCEPT ah -- * lo 0.0.0.0/0
0.0.0.0/0
0 0 DROP icmp -- * * 0.0.0.0/0
0.0.0.0/0 state INVALID
57 5857 ACCEPT icmp -- * * 0.0.0.0/0
0.0.0.0/0
0 0 ACCEPT udp -- * eth0 0.0.0.0/0
0.0.0.0/0 udp dpts:67:68
1199 75914 fw2net ah -- * eth0 0.0.0.0/0
0.0.0.0/0
373 34139 all2all ah -- * eth1 0.0.0.0/0
0.0.0.0/0
0 0 common ah -- * * 0.0.0.0/0
0.0.0.0/0
0 0 LOG ah -- * * 0.0.0.0/0
0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:OUTPUT:REJECT:'
0 0 reject ah -- * * 0.0.0.0/0
0.0.0.0/0
Chain all2all (3 references)
pkts bytes target prot opt in out source
destination
355 32969 ACCEPT ah -- * * 0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
18 1170 common ah -- * * 0.0.0.0/0
0.0.0.0/0
0 0 LOG ah -- * * 0.0.0.0/0
0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:all2all:REJECT:'
0 0 reject ah -- * * 0.0.0.0/0
0.0.0.0/0
Chain common (5 references)
pkts bytes target prot opt in out source
destination
0 0 icmpdef icmp -- * * 0.0.0.0/0
0.0.0.0/0
45 2340 ACCEPT tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp flags:0x10/0x10
0 0 ACCEPT tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp flags:0x04/0x04
10 780 REJECT udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpts:137:139 reject-with icmp-port-unreachable
0 0 REJECT udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpt:445 reject-with icmp-port-unreachable
0 0 reject tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:135
0 0 DROP udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpt:1900
0 0 DROP ah -- * * 0.0.0.0/0
255.255.255.255
0 0 DROP ah -- * * 0.0.0.0/0
224.0.0.0/4
1 60 reject tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:113
18 1170 DROP udp -- * * 0.0.0.0/0
0.0.0.0/0 udp spt:53 state NEW
0 0 DROP ah -- * * 0.0.0.0/0
255.255.255.255
0 0 DROP ah -- * * 0.0.0.0/0
192.168.1.255
Chain eth0_fwd (1 references)
pkts bytes target prot opt in out source
destination
7434 5349K net2all ah -- * eth1 0.0.0.0/0
0.0.0.0/0
Chain eth0_in (1 references)
pkts bytes target prot opt in out source
destination
90 31036 ACCEPT udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpts:67:68
9 756 ACCEPT icmp -- * * 0.0.0.0/0
0.0.0.0/0 icmp type 8
466 128K net2all ah -- * * 0.0.0.0/0
0.0.0.0/0
Chain eth1_fwd (1 references)
pkts bytes target prot opt in out source
destination
6112 758K loc2net ah -- * eth0 0.0.0.0/0
0.0.0.0/0
Chain eth1_in (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT icmp -- * * 0.0.0.0/0
0.0.0.0/0 icmp type 8
373 24430 loc2fw ah -- * * 0.0.0.0/0
0.0.0.0/0
Chain fw2net (1 references)
pkts bytes target prot opt in out source
destination
46 1840 ACCEPT ah -- * * 0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0
0.0.0.0/0 state NEW tcp dpt:53
1153 74074 ACCEPT udp -- * * 0.0.0.0/0
0.0.0.0/0 state NEW udp dpt:53
0 0 all2all ah -- * * 0.0.0.0/0
0.0.0.0/0
Chain icmpdef (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT icmp -- * * 0.0.0.0/0
0.0.0.0/0 icmp type 0
0 0 ACCEPT icmp -- * * 0.0.0.0/0
0.0.0.0/0 icmp type 4
0 0 ACCEPT icmp -- * * 0.0.0.0/0
0.0.0.0/0 icmp type 3
0 0 ACCEPT icmp -- * * 0.0.0.0/0
0.0.0.0/0 icmp type 11
0 0 ACCEPT icmp -- * * 0.0.0.0/0
0.0.0.0/0 icmp type 12
Chain loc2fw (1 references)
pkts bytes target prot opt in out source
destination
363 23769 ACCEPT ah -- * * 0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0
0.0.0.0/0 state NEW tcp dpt:22
10 661 ACCEPT udp -- * * 0.0.0.0/0
0.0.0.0/0 state NEW udp dpt:53
0 0 ACCEPT tcp -- * * 0.0.0.0/0
0.0.0.0/0 state NEW tcp dpt:80
0 0 all2all ah -- * * 0.0.0.0/0
0.0.0.0/0
Chain loc2net (1 references)
pkts bytes target prot opt in out source
destination
5393 715K ACCEPT ah -- * * 0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
719 43140 ACCEPT ah -- * * 0.0.0.0/0
0.0.0.0/0
Chain net2all (2 references)
pkts bytes target prot opt in out source
destination
7841 5474K ACCEPT ah -- * * 0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
59 3324 common ah -- * * 0.0.0.0/0
0.0.0.0/0
3 144 LOG ah -- * * 0.0.0.0/0
0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:net2all:DROP:'
3 144 DROP ah -- * * 0.0.0.0/0
0.0.0.0/0
Chain reject (6 references)
pkts bytes target prot opt in out source
destination
1 60 REJECT tcp -- * * 0.0.0.0/0
0.0.0.0/0 reject-with tcp-reset
0 0 REJECT ah -- * * 0.0.0.0/0
0.0.0.0/0 reject-with icmp-port-unreachable
Chain shorewall (0 references)
pkts bytes target prot opt in out source
destination
iptables -t nat -vnL================================================
Chain PREROUTING (policy ACCEPT 775 packets, 55690 bytes)
pkts bytes target prot opt in out source
destination
Chain POSTROUTING (policy ACCEPT 1167 packets, 75255 bytes)
pkts bytes target prot opt in out source
destination
664 39840 MASQUERADE ah -- * eth0 192.168.1.0/24
0.0.0.0/0
Chain OUTPUT (policy ACCEPT 1184 packets, 76385 bytes)
pkts bytes target prot opt in out source
destination
/var/log/messages===================================================
Aug 9 18:59:38 firewall root: Shorewall Started
Aug 9 19:20:00 firewall kernel: Shorewall:net2all:DROP:IN=eth0 OUT=
MAC=00:00:c5:04:db:e8:00:04:9b:ec:78:8c:08:00 SRC=206.103.207.130
DST=65.34.117.132 LEN=48 TOS=0x00 PREC=0x00 TTL=108 ID=17815 DF
PROTO=TCP SPT=4426 DPT=80 WINDOW=8760 RES=0x00 SYN URGP=0
Aug 9 19:20:03 firewall kernel: Shorewall:net2all:DROP:IN=eth0 OUT=
MAC=00:00:c5:04:db:e8:00:04:9b:ec:78:8c:08:00 SRC=206.103.207.130
DST=65.34.117.132 LEN=48 TOS=0x00 PREC=0x00 TTL=108 ID=17896 DF
PROTO=TCP SPT=4426 DPT=80 WINDOW=8760 RES=0x00 SYN URGP=0
Aug 9 19:20:09 firewall kernel: Shorewall:net2all:DROP:IN=eth0 OUT=
MAC=00:00:c5:04:db:e8:00:04:9b:ec:78:8c:08:00 SRC=206.103.207.130
DST=65.34.117.132 LEN=48 TOS=0x00 PREC=0x00 TTL=108 ID=18047 DF
PROTO=TCP SPT=4426 DPT=80 WINDOW=8760 RES=0x00 SYN URGP=0
date================================================================
Fri Aug 9 20:38:46 EDT 2002
-------------------------------------------------------
This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
http://thinkgeek.com/sf
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html