What NIC driver are you using? I had the same behavior when I moved from 
Dachstein to Bering. The DS driver appeared to work, but would randomly 
drop the connection. Probably not recompiled for the Bering's 
kernel/compiler.

Harry Kitt
lbilyeu wrote:

> swfla.rr.com == aka == timewarner/roadrunner cable
> I'm using the default setup on the Bering_1.0rc3 floppy1680 image
> ---except I went ahead and removed norfc1918 from 
> /etc/shorewall/interfaces'  eth0
>
> Initially the users connected behind the firewall are able to use 
> services, then after a random amount of time the internet dissapears. 
> The internal network can still reach weblet on the firewall, but all 
> requests NAT to the internet fail.
>
> From the firewall/Bering box itself, pump -s says I still have valid 
> lease, but it sure doesn't act like it.
>
> If I issue shorewall stop, svi networking stop, power cycle the modem, 
> svi networking start, shorewall start, svi networking restart; the 
> connection to the internet at large is restored. It doesn't appear to 
> be a physical ISP failure, because I can do this immediately after the 
> disconnect. I can also reboot bering & powercycle the modem and get 
> immediate connection. The disconnect appears after a random amount of 
> time, sometimes a few minutes, sometimes after more that 12 hours.
>
> eth0 is outside - connected to the rr cablemodem
> eth1 is inside - connected to hub
> eth2 is unused
>
> what follows are via the firewall/bering box console.
>
> uname=============================================================
> Linux firewall 2.4.18 #4 Sun Jun 9 09:46:15 CEST 2002 i486 unknown
>
> ip addr show =======================================================
> 1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue
>     link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
>     inet 127.0.0.1/8 brd 127.255.255.255 scope host lo
> 2: dummy0: <BROADCAST,NOARP> mtu 1500 qdisc noop
>     link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff
> 3: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100
>     link/ether 00:00:c5:04:db:e8 brd ff:ff:ff:ff:ff:ff
>     inet 65.34.117.132/23 brd 255.255.255.255 scope global eth0
> 4: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100
>     link/ether 00:40:f6:f4:e5:d4 brd ff:ff:ff:ff:ff:ff
>     inet 192.168.1.254/24 brd 192.168.1.255 scope global eth1
> 5: eth2: <BROADCAST,MULTICAST> mtu 1500 qdisc noop qlen 100
>     link/ether 00:40:33:90:fc:3a brd ff:ff:ff:ff:ff:ff
>
> ip route show ======================================================
> 192.168.1.0/24 dev eth1  proto kernel  scope link  src 192.168.1.254
> 65.34.116.0/23 dev eth0  proto kernel  scope link  src 65.34.117.132
> default via 65.34.116.1 dev eth0
>
> pump -s=============================================================
> Device eth0
>     IP: 65.34.117.132
>     Netmask: 255.255.254.0
>     Broadcast: 255.255.255.255
>     Network: 65.34.116.0
>     Boot server 65.32.2.175
>     Next server 0.0.0.0
>     Gateway: 65.34.116.1
>     Hostname: firewall
>     Domain: swfla.rr.com
>     Nameservers: 65.32.1.70 65.32.2.130
>     Renewal time: Sat Aug 10 05:29:08 2002
>     Expiration time: Sat Aug 10 06:59:08 2002
>
> netstat -nr---------------------------------------------------------
> netstat: not found
>
> traceroute: not found
>
>
> ping a FQN that will normally respond----------------------------
> never responds, have to kill process.
> I am not getting info back from the nameserver.
>
>
> All pings that follow are to numerical addresses x.x.x.x
> see pump -s section above for appropriate address numbers
> These ping(s) will succeed when firewall is first booted.
>
> ping one, then the other nameserver---------------------------------
> never responds, have to kill process. 100% packet loss
>
> ping gateway---------------------------------------------------------
> never responds, have to kill process. 100% packet loss
>
> ping bootserver/DHCPserver------------------------------------------
> never responds, have to kill process. 100% packet loss
>
> ping address outside ISP that normally responds---------------------
> never responds, have to kill process. 100% packet loss
>
> iptables -nvL=======================================================
> Chain INPUT (policy DROP 2 packets, 144 bytes)
>  pkts bytes target     prot opt in     out     source               
> destination
>   560 52190 ACCEPT     ah   --  lo     *       0.0.0.0/0            
> 0.0.0.0/0
>   565  160K eth0_in    ah   --  eth0   *       0.0.0.0/0            
> 0.0.0.0/0
>   373 24430 eth1_in    ah   --  eth1   *       0.0.0.0/0            
> 0.0.0.0/0
>     0     0 common     ah   --  *      *       0.0.0.0/0            
> 0.0.0.0/0
>     0     0 LOG        ah   --  *      *       0.0.0.0/0            
> 0.0.0.0/0          LOG flags 0 level 6 prefix `Shorewall:INPUT:REJECT:'
>     0     0 reject     ah   --  *      *       0.0.0.0/0            
> 0.0.0.0/0
>
> Chain FORWARD (policy DROP 0 packets, 0 bytes)
>  pkts bytes target     prot opt in     out     source               
> destination
>  7434 5349K eth0_fwd   ah   --  eth0   *       0.0.0.0/0            
> 0.0.0.0/0
>  6112  758K eth1_fwd   ah   --  eth1   *       0.0.0.0/0            
> 0.0.0.0/0
>     0     0 common     ah   --  *      *       0.0.0.0/0            
> 0.0.0.0/0
>     0     0 LOG        ah   --  *      *       0.0.0.0/0            
> 0.0.0.0/0          LOG flags 0 level 6 prefix `Shorewall:FORWARD:REJECT:'
>     0     0 reject     ah   --  *      *       0.0.0.0/0            
> 0.0.0.0/0
>
> Chain OUTPUT (policy DROP 0 packets, 0 bytes)
>  pkts bytes target     prot opt in     out     source               
> destination
>   560 52190 ACCEPT     ah   --  *      lo      0.0.0.0/0            
> 0.0.0.0/0
>     0     0 DROP       icmp --  *      *       0.0.0.0/0            
> 0.0.0.0/0          state INVALID
>    57  5857 ACCEPT     icmp --  *      *       0.0.0.0/0            
> 0.0.0.0/0
>     0     0 ACCEPT     udp  --  *      eth0    0.0.0.0/0            
> 0.0.0.0/0          udp dpts:67:68
>  1199 75914 fw2net     ah   --  *      eth0    0.0.0.0/0            
> 0.0.0.0/0
>   373 34139 all2all    ah   --  *      eth1    0.0.0.0/0            
> 0.0.0.0/0
>     0     0 common     ah   --  *      *       0.0.0.0/0            
> 0.0.0.0/0
>     0     0 LOG        ah   --  *      *       0.0.0.0/0            
> 0.0.0.0/0          LOG flags 0 level 6 prefix `Shorewall:OUTPUT:REJECT:'
>     0     0 reject     ah   --  *      *       0.0.0.0/0            
> 0.0.0.0/0
>
> Chain all2all (3 references)
>  pkts bytes target     prot opt in     out     source               
> destination
>   355 32969 ACCEPT     ah   --  *      *       0.0.0.0/0            
> 0.0.0.0/0          state RELATED,ESTABLISHED
>    18  1170 common     ah   --  *      *       0.0.0.0/0            
> 0.0.0.0/0
>     0     0 LOG        ah   --  *      *       0.0.0.0/0            
> 0.0.0.0/0          LOG flags 0 level 6 prefix `Shorewall:all2all:REJECT:'
>     0     0 reject     ah   --  *      *       0.0.0.0/0            
> 0.0.0.0/0
>
> Chain common (5 references)
>  pkts bytes target     prot opt in     out     source               
> destination
>     0     0 icmpdef    icmp --  *      *       0.0.0.0/0            
> 0.0.0.0/0
>    45  2340 ACCEPT     tcp  --  *      *       0.0.0.0/0            
> 0.0.0.0/0          tcp flags:0x10/0x10
>     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            
> 0.0.0.0/0          tcp flags:0x04/0x04
>    10   780 REJECT     udp  --  *      *       0.0.0.0/0            
> 0.0.0.0/0          udp dpts:137:139 reject-with icmp-port-unreachable
>     0     0 REJECT     udp  --  *      *       0.0.0.0/0            
> 0.0.0.0/0          udp dpt:445 reject-with icmp-port-unreachable
>     0     0 reject     tcp  --  *      *       0.0.0.0/0            
> 0.0.0.0/0          tcp dpt:135
>     0     0 DROP       udp  --  *      *       0.0.0.0/0            
> 0.0.0.0/0          udp dpt:1900
>     0     0 DROP       ah   --  *      *       0.0.0.0/0            
> 255.255.255.255
>     0     0 DROP       ah   --  *      *       0.0.0.0/0            
> 224.0.0.0/4
>     1    60 reject     tcp  --  *      *       0.0.0.0/0            
> 0.0.0.0/0          tcp dpt:113
>    18  1170 DROP       udp  --  *      *       0.0.0.0/0            
> 0.0.0.0/0          udp spt:53 state NEW
>     0     0 DROP       ah   --  *      *       0.0.0.0/0            
> 255.255.255.255
>     0     0 DROP       ah   --  *      *       0.0.0.0/0            
> 192.168.1.255
>
> Chain eth0_fwd (1 references)
>  pkts bytes target     prot opt in     out     source               
> destination
>  7434 5349K net2all    ah   --  *      eth1    0.0.0.0/0            
> 0.0.0.0/0
>
> Chain eth0_in (1 references)
>  pkts bytes target     prot opt in     out     source               
> destination
>    90 31036 ACCEPT     udp  --  *      *       0.0.0.0/0            
> 0.0.0.0/0          udp dpts:67:68
>     9   756 ACCEPT     icmp --  *      *       0.0.0.0/0            
> 0.0.0.0/0          icmp type 8
>   466  128K net2all    ah   --  *      *       0.0.0.0/0            
> 0.0.0.0/0
>
> Chain eth1_fwd (1 references)
>  pkts bytes target     prot opt in     out     source               
> destination
>  6112  758K loc2net    ah   --  *      eth0    0.0.0.0/0            
> 0.0.0.0/0
>
> Chain eth1_in (1 references)
>  pkts bytes target     prot opt in     out     source               
> destination
>     0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            
> 0.0.0.0/0          icmp type 8
>   373 24430 loc2fw     ah   --  *      *       0.0.0.0/0            
> 0.0.0.0/0
>
> Chain fw2net (1 references)
>  pkts bytes target     prot opt in     out     source               
> destination
>    46  1840 ACCEPT     ah   --  *      *       0.0.0.0/0            
> 0.0.0.0/0          state RELATED,ESTABLISHED
>     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            
> 0.0.0.0/0          state NEW tcp dpt:53
>  1153 74074 ACCEPT     udp  --  *      *       0.0.0.0/0            
> 0.0.0.0/0          state NEW udp dpt:53
>     0     0 all2all    ah   --  *      *       0.0.0.0/0            
> 0.0.0.0/0
>
> Chain icmpdef (1 references)
>  pkts bytes target     prot opt in     out     source               
> destination
>     0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            
> 0.0.0.0/0          icmp type 0
>     0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            
> 0.0.0.0/0          icmp type 4
>     0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            
> 0.0.0.0/0          icmp type 3
>     0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            
> 0.0.0.0/0          icmp type 11
>     0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            
> 0.0.0.0/0          icmp type 12
>
> Chain loc2fw (1 references)
>  pkts bytes target     prot opt in     out     source               
> destination
>   363 23769 ACCEPT     ah   --  *      *       0.0.0.0/0            
> 0.0.0.0/0          state RELATED,ESTABLISHED
>     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            
> 0.0.0.0/0          state NEW tcp dpt:22
>    10   661 ACCEPT     udp  --  *      *       0.0.0.0/0            
> 0.0.0.0/0          state NEW udp dpt:53
>     0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            
> 0.0.0.0/0          state NEW tcp dpt:80
>     0     0 all2all    ah   --  *      *       0.0.0.0/0            
> 0.0.0.0/0
>
> Chain loc2net (1 references)
>  pkts bytes target     prot opt in     out     source               
> destination
>  5393  715K ACCEPT     ah   --  *      *       0.0.0.0/0            
> 0.0.0.0/0          state RELATED,ESTABLISHED
>   719 43140 ACCEPT     ah   --  *      *       0.0.0.0/0            
> 0.0.0.0/0
>
> Chain net2all (2 references)
>  pkts bytes target     prot opt in     out     source               
> destination
>  7841 5474K ACCEPT     ah   --  *      *       0.0.0.0/0            
> 0.0.0.0/0          state RELATED,ESTABLISHED
>    59  3324 common     ah   --  *      *       0.0.0.0/0            
> 0.0.0.0/0
>     3   144 LOG        ah   --  *      *       0.0.0.0/0            
> 0.0.0.0/0          LOG flags 0 level 6 prefix `Shorewall:net2all:DROP:'
>     3   144 DROP       ah   --  *      *       0.0.0.0/0            
> 0.0.0.0/0
>
> Chain reject (6 references)
>  pkts bytes target     prot opt in     out     source               
> destination
>     1    60 REJECT     tcp  --  *      *       0.0.0.0/0            
> 0.0.0.0/0          reject-with tcp-reset
>     0     0 REJECT     ah   --  *      *       0.0.0.0/0            
> 0.0.0.0/0          reject-with icmp-port-unreachable
>
> Chain shorewall (0 references)
>  pkts bytes target     prot opt in     out     source               
> destination
>
>
> iptables -t nat -vnL================================================
> Chain PREROUTING (policy ACCEPT 775 packets, 55690 bytes)
>  pkts bytes target     prot opt in     out     source               
> destination
>
> Chain POSTROUTING (policy ACCEPT 1167 packets, 75255 bytes)
>  pkts bytes target     prot opt in     out     source               
> destination
>   664 39840 MASQUERADE  ah   --  *      eth0    192.168.1.0/24       
> 0.0.0.0/0
>
> Chain OUTPUT (policy ACCEPT 1184 packets, 76385 bytes)
>  pkts bytes target     prot opt in     out     source               
> destination
>
> /var/log/messages===================================================
> Aug  9 18:59:38 firewall root: Shorewall Started
> Aug  9 19:20:00 firewall kernel: Shorewall:net2all:DROP:IN=eth0 OUT= 
> MAC=00:00:c5:04:db:e8:00:04:9b:ec:78:8c:08:00 SRC=206.103.207.130 
> DST=65.34.117.132 LEN=48 TOS=0x00 PREC=0x00 TTL=108 ID=17815 DF 
> PROTO=TCP SPT=4426 DPT=80 WINDOW=8760 RES=0x00 SYN URGP=0
> Aug  9 19:20:03 firewall kernel: Shorewall:net2all:DROP:IN=eth0 OUT= 
> MAC=00:00:c5:04:db:e8:00:04:9b:ec:78:8c:08:00 SRC=206.103.207.130 
> DST=65.34.117.132 LEN=48 TOS=0x00 PREC=0x00 TTL=108 ID=17896 DF 
> PROTO=TCP SPT=4426 DPT=80 WINDOW=8760 RES=0x00 SYN URGP=0
> Aug  9 19:20:09 firewall kernel: Shorewall:net2all:DROP:IN=eth0 OUT= 
> MAC=00:00:c5:04:db:e8:00:04:9b:ec:78:8c:08:00 SRC=206.103.207.130 
> DST=65.34.117.132 LEN=48 TOS=0x00 PREC=0x00 TTL=108 ID=18047 DF 
> PROTO=TCP SPT=4426 DPT=80 WINDOW=8760 RES=0x00 SYN URGP=0
>
> date================================================================
> Fri Aug  9 20:38:46 EDT 2002
>
>
>
> -------------------------------------------------------
> This sf.net email is sponsored by:ThinkGeek
> Welcome to geek heaven.
> http://thinkgeek.com/sf
> ------------------------------------------------------------------------
> leaf-user mailing list: [EMAIL PROTECTED]
> https://lists.sourceforge.net/lists/listinfo/leaf-user
> SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html
>




-------------------------------------------------------
This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
http://thinkgeek.com/sf
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html

Reply via email to