swfla.rr.com == aka == timewarner/roadrunner cable
I'm using the default setup on the Bering_1.0rc3 floppy1680 image
---except I went ahead and removed norfc1918 from 
/etc/shorewall/interfaces'  eth0

Initially the users connected behind the firewall are able to use 
services, then after a random amount of time the internet dissapears. 
The internal network can still reach weblet on the firewall, but all 
requests NAT to the internet fail.

 From the firewall/Bering box itself, pump -s says I still have valid 
lease, but it sure doesn't act like it.

If I issue shorewall stop, svi networking stop, power cycle the modem, 
svi networking start, shorewall start, svi networking restart; the 
connection to the internet at large is restored. It doesn't appear to be 
a physical ISP failure, because I can do this immediately after the 
disconnect. I can also reboot bering & powercycle the modem and get 
immediate connection. The disconnect appears after a random amount of 
time, sometimes a few minutes, sometimes after more that 12 hours.

eth0 is outside - connected to the rr cablemodem
eth1 is inside - connected to hub
eth2 is unused

what follows are via the firewall/bering box console.

uname=============================================================
Linux firewall 2.4.18 #4 Sun Jun 9 09:46:15 CEST 2002 i486 unknown

ip addr show =======================================================
1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue
     link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
     inet 127.0.0.1/8 brd 127.255.255.255 scope host lo
2: dummy0: <BROADCAST,NOARP> mtu 1500 qdisc noop
     link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff
3: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100
     link/ether 00:00:c5:04:db:e8 brd ff:ff:ff:ff:ff:ff
     inet 65.34.117.132/23 brd 255.255.255.255 scope global eth0
4: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100
     link/ether 00:40:f6:f4:e5:d4 brd ff:ff:ff:ff:ff:ff
     inet 192.168.1.254/24 brd 192.168.1.255 scope global eth1
5: eth2: <BROADCAST,MULTICAST> mtu 1500 qdisc noop qlen 100
     link/ether 00:40:33:90:fc:3a brd ff:ff:ff:ff:ff:ff

ip route show ======================================================
192.168.1.0/24 dev eth1  proto kernel  scope link  src 192.168.1.254
65.34.116.0/23 dev eth0  proto kernel  scope link  src 65.34.117.132
default via 65.34.116.1 dev eth0

pump -s=============================================================
Device eth0
        IP: 65.34.117.132
        Netmask: 255.255.254.0
        Broadcast: 255.255.255.255
        Network: 65.34.116.0
        Boot server 65.32.2.175
        Next server 0.0.0.0
        Gateway: 65.34.116.1
        Hostname: firewall
        Domain: swfla.rr.com
        Nameservers: 65.32.1.70 65.32.2.130
        Renewal time: Sat Aug 10 05:29:08 2002
        Expiration time: Sat Aug 10 06:59:08 2002

netstat -nr---------------------------------------------------------
netstat: not found

traceroute: not found


ping a FQN that will normally respond----------------------------
never responds, have to kill process.
I am not getting info back from the nameserver.


All pings that follow are to numerical addresses x.x.x.x
see pump -s section above for appropriate address numbers
These ping(s) will succeed when firewall is first booted.

ping one, then the other nameserver---------------------------------
never responds, have to kill process. 100% packet loss

ping gateway---------------------------------------------------------
never responds, have to kill process. 100% packet loss

ping bootserver/DHCPserver------------------------------------------
never responds, have to kill process. 100% packet loss

ping address outside ISP that normally responds---------------------
never responds, have to kill process. 100% packet loss

iptables -nvL=======================================================
Chain INPUT (policy DROP 2 packets, 144 bytes)
  pkts bytes target     prot opt in     out     source               
destination
   560 52190 ACCEPT     ah   --  lo     *       0.0.0.0/0            
0.0.0.0/0
   565  160K eth0_in    ah   --  eth0   *       0.0.0.0/0            
0.0.0.0/0
   373 24430 eth1_in    ah   --  eth1   *       0.0.0.0/0            
0.0.0.0/0
     0     0 common     ah   --  *      *       0.0.0.0/0            
0.0.0.0/0
     0     0 LOG        ah   --  *      *       0.0.0.0/0            
0.0.0.0/0          LOG flags 0 level 6 prefix `Shorewall:INPUT:REJECT:'
     0     0 reject     ah   --  *      *       0.0.0.0/0            
0.0.0.0/0

Chain FORWARD (policy DROP 0 packets, 0 bytes)
  pkts bytes target     prot opt in     out     source               
destination
  7434 5349K eth0_fwd   ah   --  eth0   *       0.0.0.0/0            
0.0.0.0/0
  6112  758K eth1_fwd   ah   --  eth1   *       0.0.0.0/0            
0.0.0.0/0
     0     0 common     ah   --  *      *       0.0.0.0/0            
0.0.0.0/0
     0     0 LOG        ah   --  *      *       0.0.0.0/0            
0.0.0.0/0          LOG flags 0 level 6 prefix `Shorewall:FORWARD:REJECT:'
     0     0 reject     ah   --  *      *       0.0.0.0/0            
0.0.0.0/0

Chain OUTPUT (policy DROP 0 packets, 0 bytes)
  pkts bytes target     prot opt in     out     source               
destination
   560 52190 ACCEPT     ah   --  *      lo      0.0.0.0/0            
0.0.0.0/0
     0     0 DROP       icmp --  *      *       0.0.0.0/0            
0.0.0.0/0          state INVALID
    57  5857 ACCEPT     icmp --  *      *       0.0.0.0/0            
0.0.0.0/0
     0     0 ACCEPT     udp  --  *      eth0    0.0.0.0/0            
0.0.0.0/0          udp dpts:67:68
  1199 75914 fw2net     ah   --  *      eth0    0.0.0.0/0            
0.0.0.0/0
   373 34139 all2all    ah   --  *      eth1    0.0.0.0/0            
0.0.0.0/0
     0     0 common     ah   --  *      *       0.0.0.0/0            
0.0.0.0/0
     0     0 LOG        ah   --  *      *       0.0.0.0/0            
0.0.0.0/0          LOG flags 0 level 6 prefix `Shorewall:OUTPUT:REJECT:'
     0     0 reject     ah   --  *      *       0.0.0.0/0            
0.0.0.0/0

Chain all2all (3 references)
  pkts bytes target     prot opt in     out     source               
destination
   355 32969 ACCEPT     ah   --  *      *       0.0.0.0/0            
0.0.0.0/0          state RELATED,ESTABLISHED
    18  1170 common     ah   --  *      *       0.0.0.0/0            
0.0.0.0/0
     0     0 LOG        ah   --  *      *       0.0.0.0/0            
0.0.0.0/0          LOG flags 0 level 6 prefix `Shorewall:all2all:REJECT:'
     0     0 reject     ah   --  *      *       0.0.0.0/0            
0.0.0.0/0

Chain common (5 references)
  pkts bytes target     prot opt in     out     source               
destination
     0     0 icmpdef    icmp --  *      *       0.0.0.0/0            
0.0.0.0/0
    45  2340 ACCEPT     tcp  --  *      *       0.0.0.0/0            
0.0.0.0/0          tcp flags:0x10/0x10
     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            
0.0.0.0/0          tcp flags:0x04/0x04
    10   780 REJECT     udp  --  *      *       0.0.0.0/0            
0.0.0.0/0          udp dpts:137:139 reject-with icmp-port-unreachable
     0     0 REJECT     udp  --  *      *       0.0.0.0/0            
0.0.0.0/0          udp dpt:445 reject-with icmp-port-unreachable
     0     0 reject     tcp  --  *      *       0.0.0.0/0            
0.0.0.0/0          tcp dpt:135
     0     0 DROP       udp  --  *      *       0.0.0.0/0            
0.0.0.0/0          udp dpt:1900
     0     0 DROP       ah   --  *      *       0.0.0.0/0            
255.255.255.255
     0     0 DROP       ah   --  *      *       0.0.0.0/0            
224.0.0.0/4
     1    60 reject     tcp  --  *      *       0.0.0.0/0            
0.0.0.0/0          tcp dpt:113
    18  1170 DROP       udp  --  *      *       0.0.0.0/0            
0.0.0.0/0          udp spt:53 state NEW
     0     0 DROP       ah   --  *      *       0.0.0.0/0            
255.255.255.255
     0     0 DROP       ah   --  *      *       0.0.0.0/0            
192.168.1.255

Chain eth0_fwd (1 references)
  pkts bytes target     prot opt in     out     source               
destination
  7434 5349K net2all    ah   --  *      eth1    0.0.0.0/0            
0.0.0.0/0

Chain eth0_in (1 references)
  pkts bytes target     prot opt in     out     source               
destination
    90 31036 ACCEPT     udp  --  *      *       0.0.0.0/0            
0.0.0.0/0          udp dpts:67:68
     9   756 ACCEPT     icmp --  *      *       0.0.0.0/0            
0.0.0.0/0          icmp type 8
   466  128K net2all    ah   --  *      *       0.0.0.0/0            
0.0.0.0/0

Chain eth1_fwd (1 references)
  pkts bytes target     prot opt in     out     source               
destination
  6112  758K loc2net    ah   --  *      eth0    0.0.0.0/0            
0.0.0.0/0

Chain eth1_in (1 references)
  pkts bytes target     prot opt in     out     source               
destination
     0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            
0.0.0.0/0          icmp type 8
   373 24430 loc2fw     ah   --  *      *       0.0.0.0/0            
0.0.0.0/0

Chain fw2net (1 references)
  pkts bytes target     prot opt in     out     source               
destination
    46  1840 ACCEPT     ah   --  *      *       0.0.0.0/0            
0.0.0.0/0          state RELATED,ESTABLISHED
     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            
0.0.0.0/0          state NEW tcp dpt:53
  1153 74074 ACCEPT     udp  --  *      *       0.0.0.0/0            
0.0.0.0/0          state NEW udp dpt:53
     0     0 all2all    ah   --  *      *       0.0.0.0/0            
0.0.0.0/0

Chain icmpdef (1 references)
  pkts bytes target     prot opt in     out     source               
destination
     0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            
0.0.0.0/0          icmp type 0
     0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            
0.0.0.0/0          icmp type 4
     0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            
0.0.0.0/0          icmp type 3
     0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            
0.0.0.0/0          icmp type 11
     0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            
0.0.0.0/0          icmp type 12

Chain loc2fw (1 references)
  pkts bytes target     prot opt in     out     source               
destination
   363 23769 ACCEPT     ah   --  *      *       0.0.0.0/0            
0.0.0.0/0          state RELATED,ESTABLISHED
     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            
0.0.0.0/0          state NEW tcp dpt:22
    10   661 ACCEPT     udp  --  *      *       0.0.0.0/0            
0.0.0.0/0          state NEW udp dpt:53
     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            
0.0.0.0/0          state NEW tcp dpt:80
     0     0 all2all    ah   --  *      *       0.0.0.0/0            
0.0.0.0/0

Chain loc2net (1 references)
  pkts bytes target     prot opt in     out     source               
destination
  5393  715K ACCEPT     ah   --  *      *       0.0.0.0/0            
0.0.0.0/0          state RELATED,ESTABLISHED
   719 43140 ACCEPT     ah   --  *      *       0.0.0.0/0            
0.0.0.0/0

Chain net2all (2 references)
  pkts bytes target     prot opt in     out     source               
destination
  7841 5474K ACCEPT     ah   --  *      *       0.0.0.0/0            
0.0.0.0/0          state RELATED,ESTABLISHED
    59  3324 common     ah   --  *      *       0.0.0.0/0            
0.0.0.0/0
     3   144 LOG        ah   --  *      *       0.0.0.0/0            
0.0.0.0/0          LOG flags 0 level 6 prefix `Shorewall:net2all:DROP:'
     3   144 DROP       ah   --  *      *       0.0.0.0/0            
0.0.0.0/0

Chain reject (6 references)
  pkts bytes target     prot opt in     out     source               
destination
     1    60 REJECT     tcp  --  *      *       0.0.0.0/0            
0.0.0.0/0          reject-with tcp-reset
     0     0 REJECT     ah   --  *      *       0.0.0.0/0            
0.0.0.0/0          reject-with icmp-port-unreachable

Chain shorewall (0 references)
  pkts bytes target     prot opt in     out     source               
destination


iptables -t nat -vnL================================================
Chain PREROUTING (policy ACCEPT 775 packets, 55690 bytes)
  pkts bytes target     prot opt in     out     source               
destination

Chain POSTROUTING (policy ACCEPT 1167 packets, 75255 bytes)
  pkts bytes target     prot opt in     out     source               
destination
   664 39840 MASQUERADE  ah   --  *      eth0    192.168.1.0/24       
0.0.0.0/0

Chain OUTPUT (policy ACCEPT 1184 packets, 76385 bytes)
  pkts bytes target     prot opt in     out     source               
destination

/var/log/messages===================================================
Aug  9 18:59:38 firewall root: Shorewall Started
Aug  9 19:20:00 firewall kernel: Shorewall:net2all:DROP:IN=eth0 OUT= 
MAC=00:00:c5:04:db:e8:00:04:9b:ec:78:8c:08:00 SRC=206.103.207.130 
DST=65.34.117.132 LEN=48 TOS=0x00 PREC=0x00 TTL=108 ID=17815 DF 
PROTO=TCP SPT=4426 DPT=80 WINDOW=8760 RES=0x00 SYN URGP=0
Aug  9 19:20:03 firewall kernel: Shorewall:net2all:DROP:IN=eth0 OUT= 
MAC=00:00:c5:04:db:e8:00:04:9b:ec:78:8c:08:00 SRC=206.103.207.130 
DST=65.34.117.132 LEN=48 TOS=0x00 PREC=0x00 TTL=108 ID=17896 DF 
PROTO=TCP SPT=4426 DPT=80 WINDOW=8760 RES=0x00 SYN URGP=0
Aug  9 19:20:09 firewall kernel: Shorewall:net2all:DROP:IN=eth0 OUT= 
MAC=00:00:c5:04:db:e8:00:04:9b:ec:78:8c:08:00 SRC=206.103.207.130 
DST=65.34.117.132 LEN=48 TOS=0x00 PREC=0x00 TTL=108 ID=18047 DF 
PROTO=TCP SPT=4426 DPT=80 WINDOW=8760 RES=0x00 SYN URGP=0

date================================================================
Fri Aug  9 20:38:46 EDT 2002



-------------------------------------------------------
This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
http://thinkgeek.com/sf
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html

Reply via email to