> One final suggestion -- you might consider checking the rulesets again > (either in this fashion or the one Tom suggested, though I don't know if > I'll be able to interpret Shorewall-specific reports) after some time has > elapsed, just to be sure that the Samba retransmit failures have actually > occurred ... the packet counts in what you posted were generally low, > implying that the firewall had not been active for very long, possibly not > long enough for the problem to occur. >
[JShorewall-1.3.10 Status at firewall - Thu Dec 5 02:30:20 UTC 2002 Counters reset Thu Dec 5 01:15:12 UTC 2002 Chain INPUT (policy DROP 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 0 0 ACCEPT ah -- lo * 0.0.0.0/0 0.0.0.0/0 160 35256 ppp0_in ah -- ppp0 * 0.0.0.0/0 0.0.0.0/0 488 49761 eth1_in ah -- eth1 * 0.0.0.0/0 0.0.0.0/0 0 0 ppp_in ah -- ppp+ * 0.0.0.0/0 0.0.0.0/0 0 0 common ah -- * * 0.0.0.0/0 0.0.0.0/0 0 0 LOG ah -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:INPUT:REJECT:' 0 0 reject ah -- * * 0.0.0.0/0 0.0.0.0/0 Chain FORWARD (policy DROP 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 339 16148 TCPMSS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU 331K 487M ppp0_fwd ah -- ppp0 * 0.0.0.0/0 0.0.0.0/0 172K 6996K eth1_fwd ah -- eth1 * 0.0.0.0/0 0.0.0.0/0 0 0 ppp_fwd ah -- ppp+ * 0.0.0.0/0 0.0.0.0/0 0 0 common ah -- * * 0.0.0.0/0 0.0.0.0/0 0 0 LOG ah -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:FORWARD:REJECT:' 0 0 reject ah -- * * 0.0.0.0/0 0.0.0.0/0 Chain OUTPUT (policy DROP 21 packets, 2208 bytes) pkts bytes target prot opt in out source destination 0 0 DROP icmp -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID 0 0 ACCEPT ah -- * lo 0.0.0.0/0 0.0.0.0/0 17 3682 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW,RELATED,ESTABLISHED 145 9073 fw2net ah -- * ppp0 0.0.0.0/0 0.0.0.0/0 340 34308 fw2loc ah -- * eth1 0.0.0.0/0 0.0.0.0/0 0 0 fw2loc ah -- * ppp+ 0.0.0.0/0 0.0.0.0/0 0 0 common ah -- * * 0.0.0.0/0 0.0.0.0/0 0 0 LOG ah -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:OUTPUT:REJECT:' 0 0 reject ah -- * * 0.0.0.0/0 0.0.0.0/0 Chain all2all (3 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT ah -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:!0x16/0x02 0 0 common ah -- * * 0.0.0.0/0 0.0.0.0/0 0 0 LOG ah -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:all2all:REJECT:' 0 0 reject ah -- * * 0.0.0.0/0 0.0.0.0/0 Chain common (5 references) pkts bytes target prot opt in out source destination 0 0 icmpdef icmp -- * * 0.0.0.0/0 0.0.0.0/0 0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID 13 1014 REJECT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpts:137:139 reject-with icmp-port-unreachable 0 0 REJECT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:445 reject-with icmp-port-unreachable 0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:135 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:1900 0 0 DROP ah -- * * 0.0.0.0/0 255.255.255.255 0 0 DROP ah -- * * 0.0.0.0/0 224.0.0.0/4 2 120 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:113 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:53 state NEW 0 0 DROP ah -- * * 0.0.0.0/0 192.168.1.255 Chain dynamic (6 references) pkts bytes target prot opt in out source destination Chain eth1_fwd (1 references) pkts bytes target prot opt in out source destination 172K 6996K dynamic ah -- * * 0.0.0.0/0 0.0.0.0/0 172K 6996K loc2net ah -- * ppp0 0.0.0.0/0 0.0.0.0/0 0 0 loc2loc ah -- * eth1 0.0.0.0/0 0.0.0.0/0 0 0 loc2loc ah -- * ppp+ 0.0.0.0/0 0.0.0.0/0 Chain eth1_in (1 references) pkts bytes target prot opt in out source destination 488 49761 dynamic ah -- * * 0.0.0.0/0 0.0.0.0/0 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 8 488 49761 loc2fw ah -- * * 0.0.0.0/0 0.0.0.0/0 Chain fw2loc (2 references) pkts bytes target prot opt in out source destination 255 17273 ACCEPT ah -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:!0x16/0x02 85 17035 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW udp dpts:137:139 0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:137 0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:139 0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW udp spt:137 dpts:1024:65535 0 0 all2all ah -- * * 0.0.0.0/0 0.0.0.0/0 Chain fw2net (1 references) pkts bytes target prot opt in out source destination 2 80 ACCEPT ah -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:!0x16/0x02 0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:53 143 8993 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:53 0 0 ACCEPT 47 -- * * 0.0.0.0/0 0.0.0.0/0 0 0 all2all ah -- * * 0.0.0.0/0 0.0.0.0/0 Chain icmpdef (1 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 8 Chain loc2fw (2 references) pkts bytes target prot opt in out source destination 205 17905 ACCEPT ah -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:!0x16/0x02 0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:22 7 424 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:53 0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:80 233 29368 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW udp dpts:137:139 0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:137 43 2064 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:139 0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW udp spt:137 dpts:1024:65535 0 0 all2all ah -- * * 0.0.0.0/0 0.0.0.0/0 Chain loc2loc (4 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT ah -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:!0x16/0x02 0 0 ACCEPT ah -- * * 0.0.0.0/0 0.0.0.0/0 Chain loc2net (2 references) pkts bytes target prot opt in out source destination 172K 6986K ACCEPT ah -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 46 1840 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:!0x16/0x02 173 8304 ACCEPT ah -- * * 0.0.0.0/0 0.0.0.0/0 Chain net2all (3 references) pkts bytes target prot opt in out source destination 331K 487M ACCEPT ah -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:!0x16/0x02 19 1350 common ah -- * * 0.0.0.0/0 0.0.0.0/0 4 216 LOG ah -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:net2all:DROP:' 4 216 DROP ah -- * * 0.0.0.0/0 0.0.0.0/0 Chain net2fw (1 references) pkts bytes target prot opt in out source destination 141 33906 ACCEPT ah -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp flags:!0x16/0x02 0 0 ACCEPT 47 -- * * 0.0.0.0/0 0.0.0.0/0 0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:1723 0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:1723 0 0 ACCEPT 47 -- * * 0.0.0.0/0 0.0.0.0/0 19 1350 net2all ah -- * * 0.0.0.0/0 0.0.0.0/0 Chain newnotsyn (8 references) pkts bytes target prot opt in out source destination 46 1840 DROP ah -- * * 0.0.0.0/0 0.0.0.0/0 Chain ppp0_fwd (1 references) pkts bytes target prot opt in out source destination 331K 487M dynamic ah -- * * 0.0.0.0/0 0.0.0.0/0 331K 487M net2all ah -- * eth1 0.0.0.0/0 0.0.0.0/0 0 0 net2all ah -- * ppp+ 0.0.0.0/0 0.0.0.0/0 Chain ppp0_in (1 references) pkts bytes target prot opt in out source destination 160 35256 dynamic ah -- * * 0.0.0.0/0 0.0.0.0/0 0 0 DROP icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 8 160 35256 net2fw ah -- * * 0.0.0.0/0 0.0.0.0/0 Chain ppp_fwd (1 references) pkts bytes target prot opt in out source destination 0 0 dynamic ah -- * * 0.0.0.0/0 0.0.0.0/0 0 0 loc2net ah -- * ppp0 0.0.0.0/0 0.0.0.0/0 0 0 loc2loc ah -- * eth1 0.0.0.0/0 0.0.0.0/0 0 0 loc2loc ah -- * ppp+ 0.0.0.0/0 0.0.0.0/0 Chain ppp_in (1 references) pkts bytes target prot opt in out source destination 0 0 dynamic ah -- * * 0.0.0.0/0 0.0.0.0/0 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 8 0 0 loc2fw ah -- * * 0.0.0.0/0 0.0.0.0/0 Chain reject (6 references) pkts bytes target prot opt in out source destination 2 120 REJECT tcp -- * * 0.0.0.0/0 0.0.0.0/0 reject-with tcp-reset 0 0 REJECT ah -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable Chain shorewall (0 references) pkts bytes target prot opt in out source destination Dec 5 01:54:23 net2all:DROP:IN=ppp0 OUT= SRC=xxx.212.216.11 DST=xxx.193.187.112 LEN=48 TOS=0x00 PREC=0x00 TTL=119 ID=34666 DF PROTO=TCP SPT=3227 DPT=80 WINDOW=16384 RES=0x00 SYN URGP=0 Dec 5 01:54:26 net2all:DROP:IN=ppp0 OUT= SRC=xxx.212.216.11 DST=xxx.193.187.112 LEN=48 TOS=0x00 PREC=0x00 TTL=119 ID=35367 DF PROTO=TCP SPT=3227 DPT=80 WINDOW=16384 RES=0x00 SYN URGP=0 Dec 5 02:25:45 net2all:DROP:IN=ppp0 OUT= SRC=xxx.121.247.225 DST=xxx.193.187.112 LEN=60 TOS=0x10 PREC=0x00 TTL=52 ID=17398 DF PROTO=TCP SPT=37688 DPT=21 WINDOW=5840 RES=0x00 SYN URGP=0 Dec 5 02:26:23 net2all:DROP:IN=ppp0 OUT= SRC=xxx.52.72.215 DST=xxx.193.187.112 LEN=60 TOS=0x00 PREC=0x00 TTL=56 ID=32962 DF PROTO=TCP SPT=2539 DPT=111 WINDOW=32120 RES=0x00 SYN URGP=0 Chain PREROUTING (policy ACCEPT 317 packets, 19449 bytes) pkts bytes target prot opt in out source destination Chain POSTROUTING (policy ACCEPT 178 packets, 15635 bytes) pkts bytes target prot opt in out source destination 309 16945 ppp0_masq ah -- * ppp0 0.0.0.0/0 0.0.0.0/0 Chain OUTPUT (policy ACCEPT 176 packets, 15555 bytes) pkts bytes target prot opt in out source destination Chain ppp0_masq (1 references) pkts bytes target prot opt in out source destination 164 7872 MASQUERADE ah -- * * 192.168.1.0/24 0.0.0.0/0 Chain PREROUTING (policy ACCEPT 504K packets, 495M bytes) pkts bytes target prot opt in out source destination 504K 495M pretos ah -- * * 0.0.0.0/0 0.0.0.0/0 Chain INPUT (policy ACCEPT 655 packets, 85815 bytes) pkts bytes target prot opt in out source destination Chain FORWARD (policy ACCEPT 503K packets, 494M bytes) pkts bytes target prot opt in out source destination Chain OUTPUT (policy ACCEPT 530 packets, 50069 bytes) pkts bytes target prot opt in out source destination 503 47282 outtos ah -- * * 0.0.0.0/0 0.0.0.0/0 Chain POSTROUTING (policy ACCEPT 504K packets, 495M bytes) pkts bytes target prot opt in out source destination Chain outtos (1 references) pkts bytes target prot opt in out source destination 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 TOS set 0x10 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:22 TOS set 0x10 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:21 TOS set 0x10 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:21 TOS set 0x10 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:20 TOS set 0x08 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:20 TOS set 0x08 Chain pretos (1 references) pkts bytes target prot opt in out source destination 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 TOS set 0x10 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:22 TOS set 0x10 17 848 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:21 TOS set 0x10 20 1594 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:21 TOS set 0x10 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:20 TOS set 0x08 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:20 TOS set 0x08 tcp 6 27 TIME_WAIT src=192.168.1.1 dst=192.168.1.254 sport=1568 dport=139 src=192.168.1.254 dst=192.168.1.1 sport=139 dport=1568 [ASSURED] use=1 tcp 6 29 TIME_WAIT src=192.168.1.1 dst=192.168.1.254 sport=1569 dport=139 src=192.168.1.254 dst=192.168.1.1 sport=139 dport=1569 [ASSURED] use=1 tcp 6 40 TIME_WAIT src=192.168.1.1 dst=192.168.1.254 sport=1570 dport=139 src=192.168.1.254 dst=192.168.1.1 sport=139 dport=1570 [ASSURED] use=1 tcp 6 42 TIME_WAIT src=192.168.1.1 dst=192.168.1.254 sport=1571 dport=139 src=192.168.1.254 dst=192.168.1.1 sport=139 dport=1571 [ASSURED] use=1 tcp 6 118 TIME_WAIT src=192.168.1.1 dst=192.168.1.254 sport=1572 dport=139 src=192.168.1.254 dst=192.168.1.1 sport=139 dport=1572 [ASSURED] use=1 udp 17 28 src=192.168.1.254 dst=192.168.1.1 sport=138 dport=138 [UNREPLIED] src=192.168.1.1 dst=192.168.1.254 sport=138 dport=138 use=1 udp 17 29 src=192.168.1.1 dst=192.168.1.255 sport=137 dport=137 [UNREPLIED] src=192.168.1.255 dst=192.168.1.1 sport=137 dport=137 use=1 udp 17 28 src=192.168.1.1 dst=192.168.1.255 sport=138 dport=138 [UNREPLIED] src=192.168.1.255 dst=192.168.1.1 sport=138 dport=138 use=1 Which place must I change? My /etc/shorewall/ flies: Shorewall 1.3.10 /etc/shorewall/interfaces net ppp0 - noping loc eth1 detect routestopped loc ppp+ /etc/shorewall/policy loc loc ACCEPT loc net ACCEPT net all DROP info all all REJECT info /etc/shorewall/rules ACCEPT net fw tcp 1723 ACCEPT net fw 47 - ACCEPT fw net 47 - ACCEPT fw loc udp 137:139 ACCEPT fw loc tcp 137,139 ACCEPT fw loc udp 1024: 137 ACCEPT loc fw udp 137:139 ACCEPT loc fw tcp 137,139 ACCEPT loc fw udp 1024: 137 /etc/shorewall/masq ppp0 eth1 /etc/shorewall/tunnels pptpserver net 0.0.0.0/0 Thanks, -Youngdo ------------------------------------------------------- This SF.net email is sponsored by: Microsoft Visual Studio.NET comprehensive development tool, built to increase your productivity. Try a free online hosted session at: http://ads.sourceforge.net/cgi-bin/redirect.pl?micr0003en ------------------------------------------------------------------------ leaf-user mailing list: [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/leaf-user SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html