Hi again

Lynn Avants wrote:

>Protocols and equipment do not necessarily mean
>the same thing. I'm a firm believer that the only
reason
>any ISP uses PPPoE is to try and leverage the extra
>money out of a static ip connection....
>
>Is pump, your interfaces file, and shorewall all
configured to
>get a dhcp lease? IIRC, the default Bering image is
setup for
>a dhcp cable connection by default (granted that the
correct
>driver is loaded for your hardware/NIC).

You are prob. right with the PPPoE and money :)
All standrart Bering1.2 image with my NIC´ i place
But still i don´t get a IP
I´ included a lot of debug info at the bottom of my
mail
all pastet from weblet, so my NIC are ok

---

Ray Olszewski wrote:

>Lynn's advice is correct here, except that "ask your
provider" betokens 
>more optimism than I have on a day-to-day basis about
the helpfulness 
>of 
>ISPs. If your provider is as unhelpful as I'm used to
seeing, see how 
>they 
>say to connect a Windows computer to their system
(they always tell you 
>*that*, normally in the written materials you get
with your 
>hardware).  Possibilities are:
>
>1. In Networking, check "obtain an IP address
automatically". 
>This means the ISP uses DHCP, so follow Lynn's advice
on pump.
>
>2. Install and run a custom app that the ISP
provides. This 
>probably means they use PPPoE.

>Once you know with a bit more certainty which type of
connection you 
>are 
>trying for, you can review your configuration for
errors (and get help 
>here, after providing the customary details about
what you try and how 
>it 
>fails, as you started to do with the PPPoE attempt).

Yes :)) my ISP only support Windows and MacOSX+9, but
lets see what time
will bring to linux, thats a other discussion.
My connection is a ADSL-512/128 thats what i get of
info
but now i know that it´s a cable with a fixed IP, so
pump
must be it ?

---

Jørn wrote:

>Looks to me like you are in Denmark - what provider
are U using?  Maybe 
>there is
>soneone else on the list that have set something up
with you 
>provider...

It´s tele2/get2net ADSL


Best danish and internationale
Regards Lasse








weblet rip:

::Interfaces::
1: lo:  mtu 16436 qdisc noqueue 
    link/loopback 00:00:00:00:00:00 brd
00:00:00:00:00:00
    inet 127.0.0.1/8 brd 127.255.255.255 scope host lo
2: dummy0:  mtu 1500 qdisc noop 
    link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff
3: eth0:  mtu 1500 qdisc pfifo_fast qlen 100
    link/ether 00:0b:2b:02:0d:6d brd ff:ff:ff:ff:ff:ff
4: eth1:  mtu 1500 qdisc pfifo_fast qlen 100
    link/ether 00:0b:2b:02:2a:43 brd ff:ff:ff:ff:ff:ff
    inet 192.168.1.254/24 brd 192.168.1.255 scope
global eth1
5: eth2:  mtu 1500 qdisc noop qlen 100
    link/ether 00:0b:2b:02:2a:4d brd ff:ff:ff:ff:ff:ff
    
::Routes::
192.168.1.0/24 dev eth1  proto kernel  scope link  src
192.168.1.254


::Statistics::
1: lo:  mtu 16436 qdisc noqueue 
    link/loopback 00:00:00:00:00:00 brd
00:00:00:00:00:00
    RX: bytes  packets  errors  dropped overrun mcast 
 
    100        2        0       0       0       0     

    TX: bytes  packets  errors  dropped carrier
collsns 
    100        2        0       0       0       0     

2: dummy0:  mtu 1500 qdisc noop 
    link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast 
 
    0          0        0       0       0       0     

    TX: bytes  packets  errors  dropped carrier
collsns 
    0          0        0       0       0       0     

3: eth0:  mtu 1500 qdisc pfifo_fast qlen 100
    link/ether 00:0b:2b:02:0d:6d brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast 
 
    0          0        0       0       0       0     

    TX: bytes  packets  errors  dropped carrier
collsns 
    1368       4        0       0       0       0     

4: eth1:  mtu 1500 qdisc pfifo_fast qlen 100
    link/ether 00:0b:2b:02:2a:43 brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast 
 
    7840       68       0       0       0       0     

    TX: bytes  packets  errors  dropped carrier
collsns 
    38099      66       0       0       0       0     

5: eth2:  mtu 1500 qdisc noop qlen 100
    link/ether 00:0b:2b:02:2a:4d brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast 
 
    0          0        0       0       0       0     

    TX: bytes  packets  errors  dropped carrier
collsns 
    0          0        0       0       0       0   
    

::Packet Filter::
Shorewall-1.4.2 Chain  at  - Wed Dec 10 16:32:49 UTC
2003

Chain INPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source 
             destination 
        
    0     0 DROP      !icmp --  *      *      
0.0.0.0/0            0.0.0.0/0   
       state INVALID 
    0     0 ACCEPT     all  --  lo     *      
0.0.0.0/0            0.0.0.0/0   
       
    0     0 eth0_in    all  --  eth0   *      
0.0.0.0/0            0.0.0.0/0   
       
    0     0 eth1_in    all  --  eth1   *      
0.0.0.0/0            0.0.0.0/0   
       
    0     0 common     all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       
    0     0 ULOG       all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:INPUT:REJECT:' queue_threshold 1 
    0     0 reject     all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       

Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source 
             destination 
        
    0     0 DROP      !icmp --  *      *      
0.0.0.0/0            0.0.0.0/0   
       state INVALID 
    0     0 eth0_fwd   all  --  eth0   *      
0.0.0.0/0            0.0.0.0/0   
       
    0     0 eth1_fwd   all  --  eth1   *      
0.0.0.0/0            0.0.0.0/0   
       
    0     0 common     all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       
    0     0 ULOG       all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:FORWARD:REJECT:' queue_threshold 1 
    0     0 reject     all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       

Chain OUTPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source 
             destination 
        
    0     0 DROP      !icmp --  *      *      
0.0.0.0/0            0.0.0.0/0   
       state INVALID 
    0     0 ACCEPT     udp  --  *      eth0   
0.0.0.0/0            0.0.0.0/0   
       udp dpts:67:68 
    0     0 ACCEPT     all  --  *      lo     
0.0.0.0/0            0.0.0.0/0   
       
    0     0 fw2net     all  --  *      eth0   
0.0.0.0/0            0.0.0.0/0   
       
    0     0 fw2loc     all  --  *      eth1   
0.0.0.0/0            0.0.0.0/0   
       
    0     0 common     all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       
    0     0 ULOG       all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:OUTPUT:REJECT:' queue_threshold 1 
    0     0 reject     all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       

Chain all2all (3 references)
 pkts bytes target     prot opt in     out     source 
             destination 
        
    0     0 ACCEPT     all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       state NEW tcp flags:!0x16/0x02 
    0     0 common     all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       
    0     0 ULOG       all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:all2all:REJECT:' queue_threshold 1 
    0     0 reject     all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       

Chain common (5 references)
 pkts bytes target     prot opt in     out     source 
             destination 
        
    0     0 icmpdef    icmp --  *      *      
0.0.0.0/0            0.0.0.0/0   
       
    0     0 reject     udp  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       udp dpts:137:139 
    0     0 reject     udp  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       udp dpt:445 
    0     0 reject     tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       tcp dpt:139 
    0     0 reject     tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       tcp dpt:445 
    0     0 reject     tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       tcp dpt:135 
    0     0 DROP       udp  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       udp dpt:1900 
    0     0 DROP       all  --  *      *      
0.0.0.0/0            255.255.255.
255    
    0     0 DROP       all  --  *      *      
0.0.0.0/0            224.0.0.0/4 
       
    0     0 reject     tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       tcp dpt:113 
    0     0 DROP       udp  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       udp spt:53 state NEW 
    0     0 DROP       all  --  *      *      
0.0.0.0/0            192.168.1.25
5      

Chain dynamic (4 references)
 pkts bytes target     prot opt in     out     source 
             destination 
        

Chain eth0_fwd (1 references)
 pkts bytes target     prot opt in     out     source 
             destination 
        
    0     0 dynamic    all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       
    0     0 rfc1918    all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       state NEW 
    0     0 net2all    all  --  *      eth1   
0.0.0.0/0            0.0.0.0/0   
       

Chain eth0_in (1 references)
 pkts bytes target     prot opt in     out     source 
             destination 
        
    0     0 dynamic    all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       
    0     0 ACCEPT     udp  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       udp dpts:67:68 
    0     0 rfc1918    all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       state NEW 
    0     0 net2fw     all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       

Chain eth1_fwd (1 references)
 pkts bytes target     prot opt in     out     source 
             destination 
        
    0     0 dynamic    all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       
    0     0 loc2net    all  --  *      eth0   
0.0.0.0/0            0.0.0.0/0   
       

Chain eth1_in (1 references)
 pkts bytes target     prot opt in     out     source 
             destination 
        
    0     0 dynamic    all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       
    0     0 loc2fw     all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       

Chain fw2loc (1 references)
 pkts bytes target     prot opt in     out     source 
             destination 
        
    0     0 ACCEPT     all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       state NEW tcp flags:!0x16/0x02 
    0     0 ACCEPT     icmp --  *      *      
0.0.0.0/0            0.0.0.0/0   
       icmp type 8 
    0     0 all2all    all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       

Chain fw2net (1 references)
 pkts bytes target     prot opt in     out     source 
             destination 
        
    0     0 ACCEPT     all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       state NEW tcp flags:!0x16/0x02 
    0     0 ACCEPT     tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       state NEW tcp dpt:53 
    0     0 ACCEPT     udp  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       state NEW udp dpt:53 
    0     0 ACCEPT     icmp --  *      *      
0.0.0.0/0            0.0.0.0/0   
       icmp type 8 
    0     0 all2all    all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       

Chain icmpdef (1 references)
 pkts bytes target     prot opt in     out     source 
             destination 
        

Chain loc2fw (1 references)
 pkts bytes target     prot opt in     out     source 
             destination 
        
    0     0 ACCEPT     all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       state NEW tcp flags:!0x16/0x02 
    0     0 ACCEPT     tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       state NEW tcp dpt:22 
    0     0 ACCEPT     icmp --  *      *      
0.0.0.0/0            0.0.0.0/0   
       icmp type 8 
    0     0 ACCEPT     udp  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       state NEW udp dpt:53 
    0     0 ACCEPT     tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       state NEW tcp dpt:80 
    0     0 all2all    all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       

Chain loc2net (1 references)
 pkts bytes target     prot opt in     out     source 
             destination 
        
    0     0 ACCEPT     all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       state NEW tcp flags:!0x16/0x02 
    0     0 ACCEPT     all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       

Chain logdrop (30 references)
 pkts bytes target     prot opt in     out     source 
             destination 
        
    0     0 ULOG       all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:rfc1918:DROP:' queue_threshold 1 
    0     0 DROP       all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       

Chain net2all (2 references)
 pkts bytes target     prot opt in     out     source 
             destination 
        
    0     0 ACCEPT     all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       state NEW tcp flags:!0x16/0x02 
    0     0 common     all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       
    0     0 ULOG       all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:net2all:DROP:' queue_threshold 1 
    0     0 DROP       all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       

Chain net2fw (1 references)
 pkts bytes target     prot opt in     out     source 
             destination 
        
    0     0 ACCEPT     all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       state NEW tcp flags:!0x16/0x02 
    0     0 ACCEPT     icmp --  *      *      
0.0.0.0/0            0.0.0.0/0   
       icmp type 8 
    0     0 net2all    all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       

Chain newnotsyn (7 references)
 pkts bytes target     prot opt in     out     source 
             destination 
        
    0     0 DROP       all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       

Chain reject (10 references)
 pkts bytes target     prot opt in     out     source 
             destination 
        
    0     0 REJECT     tcp  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       reject-with tcp-reset 
    0     0 REJECT     all  --  *      *      
0.0.0.0/0            0.0.0.0/0   
       reject-with icmp-port-unreachable 

Chain rfc1918 (2 references)
 pkts bytes target     prot opt in     out     source 
             destination 
        
    0     0 RETURN     all  --  *      *      
255.255.255.255      0.0.0.0/0   
       
    0     0 DROP       all  --  *      *      
169.254.0.0/16       0.0.0.0/0   
       
    0     0 logdrop    all  --  *      *      
172.16.0.0/12        0.0.0.0/0   
       
    0     0 logdrop    all  --  *      *      
192.0.2.0/24         0.0.0.0/0   
       
    0     0 logdrop    all  --  *      *      
192.168.0.0/16       0.0.0.0/0   
       
    0     0 logdrop    all  --  *      *      
0.0.0.0/7            0.0.0.0/0   
       
    0     0 logdrop    all  --  *      *      
2.0.0.0/8            0.0.0.0/0   
       
    0     0 logdrop    all  --  *      *      
5.0.0.0/8            0.0.0.0/0   
       
    0     0 logdrop    all  --  *      *      
7.0.0.0/8            0.0.0.0/0   
       
    0     0 logdrop    all  --  *      *      
10.0.0.0/8           0.0.0.0/0   
       
    0     0 logdrop    all  --  *      *      
23.0.0.0/8           0.0.0.0/0   
       
    0     0 logdrop    all  --  *      *      
27.0.0.0/8           0.0.0.0/0   
       
    0     0 logdrop    all  --  *      *      
31.0.0.0/8           0.0.0.0/0   
       
    0     0 logdrop    all  --  *      *      
36.0.0.0/7           0.0.0.0/0   
       
    0     0 logdrop    all  --  *      *      
39.0.0.0/8           0.0.0.0/0   
       
    0     0 logdrop    all  --  *      *      
41.0.0.0/8           0.0.0.0/0   
       
    0     0 logdrop    all  --  *      *      
42.0.0.0/8           0.0.0.0/0   
       
    0     0 logdrop    all  --  *      *      
49.0.0.0/8           0.0.0.0/0   
       
    0     0 logdrop    all  --  *      *      
50.0.0.0/8           0.0.0.0/0   
       
    0     0 logdrop    all  --  *      *      
58.0.0.0/7           0.0.0.0/0   
       
    0     0 logdrop    all  --  *      *      
60.0.0.0/8           0.0.0.0/0   
       
    0     0 logdrop    all  --  *      *      
70.0.0.0/7           0.0.0.0/0   
       
    0     0 logdrop    all  --  *      *      
72.0.0.0/5           0.0.0.0/0   
       
    0     0 logdrop    all  --  *      *      
83.0.0.0/8           0.0.0.0/0   
       
    0     0 logdrop    all  --  *      *      
84.0.0.0/6           0.0.0.0/0   
       
    0     0 logdrop    all  --  *      *      
88.0.0.0/5           0.0.0.0/0   
       
    0     0 logdrop    all  --  *      *      
96.0.0.0/3           0.0.0.0/0   
       
    0     0 logdrop    all  --  *      *      
127.0.0.0/8          0.0.0.0/0   
       
    0     0 logdrop    all  --  *      *      
197.0.0.0/8          0.0.0.0/0   
       
    0     0 logdrop    all  --  *      *      
198.18.0.0/15        0.0.0.0/0   
       
    0     0 logdrop    all  --  *      *      
201.0.0.0/8          0.0.0.0/0   
       
    0     0 logdrop    all  --  *      *      
240.0.0.0/4          0.0.0.0/0   


::Masquerading::
Shorewall-1.4.2 NAT at  - Wed Dec 10 16:32:50 UTC 2003

Chain PREROUTING (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source 
             destination         

Chain POSTROUTING (policy ACCEPT 1 packets, 60 bytes)
 pkts bytes target     prot opt in     out     source 
             destination         
    0     0 eth0_masq  all  --  *      eth0   
0.0.0.0/0            0.0.0.0/0          

Chain OUTPUT (policy ACCEPT 1 packets, 60 bytes)
 pkts bytes target     prot opt in     out     source 
             destination         

Chain eth0_masq (1 references)
 pkts bytes target     prot opt in     out     source 
             destination         
    0     0 MASQUERADE  all  --  *      *      
192.168.1.0/24       0.0.0.0/0  
    
    
    
::General System Info::
Uptime:   4:53pm  up 23 min, load average: 0.01, 0.00,
0.00  
Kernel:Linux firewall 2.4.20 #1 Sun May 11 18:53:34
CEST 2003 i586 unknown
  
Modules:
ip_nat_irc              2176   0 (unused)
ip_nat_ftp              2784   0 (unused)
ip_conntrack_irc        2880   1
ip_conntrack_ftp        3648   1
8139too                14100   1
mii                     2092   0 [8139too]

::Installed Packages::
Name            Version        Description
===============-==============-==============================================
initrd          V1.2           LEAF Bering initial
filesystem                
root            V1.2           Core LEAF Bering
package                      
etc             V1.2           LEAF Bering /etc files 
                      
local           V1.2           LEAF Bering local
package                     
modules         V1.2           Define & contain your
LEAF Bering modules     
iptables        1.2.8          IP packet filter
administration tools for 2.4.
pump            0.8.14-2       DHCP/BOOTP client from
Redhat                 
keyboard        0.3            Define your keyboard
settings                 
shorwall        1.4.2          Shoreline Firewall
(Shorewall)                
ulogd           1.0            The Netfilter Userspace
Logging Daemon        
dnscache        1.05a          A fast & secure proxy
DNS server              
weblet          1.2.0          LEAF status via a small
web server            
  
::CPU Info::
processor       : 0
vendor_id       : GenuineIntel
cpu family      : 5
model           : 2
model name      : Pentium 75 - 200
stepping        : 12
cpu MHz         : 119.752
fdiv_bug        : no
hlt_bug         : no
f00f_bug        : yes
coma_bug        : no
fpu             : yes
fpu_exception   : yes
cpuid level     : 1
wp              : yes
flags           : fpu vme de pse tsc msr mce cx8
bogomips        : 238.38
  
::Running Processes::
  PID  Uid     VmSize Stat Command
    1 root        764 S    init [2]   
    2 root            S    [keventd]
    3 root            S    [ksoftirqd_CPU0]
    4 root            S    [kswapd]
    5 root            S    [bdflush]
    6 root            S    [kupdated]
13716 root        816 S    /sbin/syslogd -m 240 
 8149 root        828 S    /sbin/klogd 
16349 root        916 S    pump -i eth0 
19142 root            S    [eth1]
27565 root        720 S    /usr/sbin/watchdog 
 2421 root        776 S    /usr/sbin/inetd 
19626 root        860 S    /usr/sbin/ulogd -d 
19173 dnscache   2048 S    [dnscache]
26468 root        812 S    /usr/sbin/cron 
 5887 root        840 S    -sh 
22777 root        952 S    /sbin/getty 38400 tty2 
 8939 root        840 S    /bin/sh /usr/sbin/lrcfg 
 9150 sh-httpd    856 S    /bin/sh /usr/sbin/sh-httpd 
26182 sh-httpd    836 S    /bin/sh
/var/sh-www/cgi-bin/viewsys 
32746 sh-httpd    892 S    sleep 1 
29140 sh-httpd    900 S    cat 
27692 sh-httpd    836 S    /bin/sh
/var/sh-www/cgi-bin/viewsys 
26569 sh-httpd    936 R    ps aux 


::shorewall.log::
empty

::messages::
Dec 10 16:32:10 firewall syslogd 1.3-3#31.slink1:
restart.
Dec 10 16:32:10 firewall kernel: klogd
1.3-3#31.slink1, log source = /proc/kmsg started.
Dec 10 16:32:10 firewall kernel: No module symbols
loaded.
Dec 10 16:32:10 firewall kernel: BIOS-provided
physical RAM map: 
Dec 10 16:32:10 firewall kernel: 32MB LOWMEM
available. 
Dec 10 16:32:10 firewall kernel: Initializing CPU#0 
Dec 10 16:32:10 firewall kernel: Memory: 30128k/32768k
available (948k kernel code, 2252k reserved, -1176k
data, 64k init, 0k highmem) 
Dec 10 16:32:10 firewall kernel: Dentry cache hash
table entries: 4096 (order: 3, 32768 bytes) 
Dec 10 16:32:10 firewall kernel: Inode cache hash
table entries: 2048 (order: 2, 16384 bytes) 
Dec 10 16:32:10 firewall kernel: Intel Pentium with F0
0F bug - workaround enabled. 
Dec 10 16:32:10 firewall kernel: Checking 'hlt'
instruction... OK. 
Dec 10 16:32:10 firewall kernel: PCI: PCI BIOS
revision 2.10 entry at 0xfd9f1, last bus=0 
Dec 10 16:32:10 firewall kernel: PCI: Using
configuration type 1 
Dec 10 16:32:10 firewall kernel: PCI: Probing PCI
hardware 
Dec 10 16:32:10 firewall kernel: Limiting direct
PCI/PCI transfers. 
Dec 10 16:32:10 firewall kernel: Activating ISA DMA
hang workarounds. 
Dec 10 16:32:10 firewall kernel: Linux NET4.0 for
Linux 2.4 
Dec 10 16:32:10 firewall kernel: Based upon Swansea
University Computer Society NET3.039 
Dec 10 16:32:10 firewall kernel: Serial driver version
5.05c (2001-07-08) with MANY_PORTS SHARE_IRQ
DETECT_IRQ SERIAL_PCI enabled 
Dec 10 16:32:10 firewall kernel: ttyS00 at 0x03f8 (irq
= 4) is a 16550A 
Dec 10 16:32:10 firewall kernel: ttyS01 at 0x02f8 (irq
= 3) is a 16550A 
Dec 10 16:32:10 firewall kernel: Real Time Clock
Driver v1.10e 
Dec 10 16:32:10 firewall kernel: Software Watchdog
Timer: 0.05, timer margin: 60 sec 
Dec 10 16:32:10 firewall kernel: Floppy drive(s): fd0
is 1.44M 
Dec 10 16:32:10 firewall kernel: FDC 0 is a National
Semiconductor PC87306 
Dec 10 16:32:10 firewall kernel: NET4: Linux TCP/IP
1.0 for NET4.0 
Dec 10 16:32:10 firewall kernel: IP Protocols: ICMP,
UDP, TCP, IGMP 
Dec 10 16:32:10 firewall kernel: IP: routing cache
hash table of 512 buckets, 4Kbytes 
Dec 10 16:32:10 firewall kernel: TCP: Hash tables
configured (established 2048 bind 2048) 
Dec 10 16:32:10 firewall kernel: NET4: Unix domain
sockets 1.0/SMP for Linux NET4.0. 
Dec 10 16:32:10 firewall kernel: RAMDISK: Compressed
image found at block 0 
Dec 10 16:32:10 firewall kernel: Freeing initrd
memory: 401k freed 
Dec 10 16:32:10 firewall kernel: Freeing unused kernel
memory: 64k freed 
Dec 10 16:32:11 firewall kernel: 8139too Fast Ethernet
driver 0.9.26 
Dec 10 16:32:11 firewall kernel: eth0: RealTek RTL8139
Fast Ethernet at 0xc2813c00, 00:0b:2b:02:0d:6d, IRQ 11

Dec 10 16:32:11 firewall kernel: eth1: RealTek RTL8139
Fast Ethernet at 0xc2815800, 00:0b:2b:02:2a:43, IRQ 10

Dec 10 16:32:11 firewall kernel: eth2: RealTek RTL8139
Fast Ethernet at 0xc2817400, 00:0b:2b:02:2a:4d, IRQ 9 
Dec 10 16:32:12 firewall kernel: eth0: Setting 100mbps
full-duplex based on auto-negotiated partner ability
41e1. 
Dec 10 16:32:42 firewall kernel: eth1: Setting 100mbps
full-duplex based on auto-negotiated partner ability
45e1. 
Dec 10 16:32:50 firewall root: Shorewall Started

::syslog::
Dec 10 16:32:10 firewall kernel: Cannot find map file.
Dec 10 16:32:10 firewall kernel: Linux version 2.4.20
([EMAIL PROTECTED]) (gcc version 2.95.4 20011002 (Debian
prerelease)) #1 Sun May 11 18:53:34 CEST 2003 
Dec 10 16:32:10 firewall kernel: BIOS-e820:
0000000000000000 - 000000000009fc00 (usable) 
Dec 10 16:32:10 firewall kernel: BIOS-e820:
0000000000100000 - 0000000002000000 (usable) 
Dec 10 16:32:10 firewall kernel: BIOS-e820:
00000000fffc0000 - 0000000100000000 (reserved) 
Dec 10 16:32:10 firewall kernel: On node 0 totalpages:
8192 
Dec 10 16:32:10 firewall kernel: zone(0): 4096 pages. 
Dec 10 16:32:10 firewall kernel: zone(1): 4096 pages. 
Dec 10 16:32:10 firewall kernel: zone(2): 0 pages. 
Dec 10 16:32:10 firewall kernel: Kernel command line:
BOOT_IMAGE=linux initrd=initrd.lrp init=/linuxrc rw
root=/dev/ram0 boot=/dev/fd0u1680:msdos
PKGPATH=/dev/fd0u1680
LRP=root,etc,local,modules,iptables,pump,keyboard,shorwall,ulogd,dnscache,weblet

Dec 10 16:32:10 firewall kernel: Detected 119.752 MHz
processor. 
Dec 10 16:32:10 firewall kernel: Console: colour VGA+
80x25 
Dec 10 16:32:10 firewall kernel: Calibrating delay
loop... 238.38 BogoMIPS 
Dec 10 16:32:10 firewall kernel: Mount-cache hash
table entries: 512 (order: 0, 4096 bytes) 
Dec 10 16:32:10 firewall kernel: Buffer-cache hash
table entries: 1024 (order: 0, 4096 bytes) 
Dec 10 16:32:10 firewall kernel: Page-cache hash table
entries: 8192 (order: 3, 32768 bytes) 
Dec 10 16:32:10 firewall kernel: CPU: Intel Pentium 75
- 200 stepping 0c 
Dec 10 16:32:10 firewall kernel: POSIX conformance
testing by UNIFIX 
Dec 10 16:32:10 firewall kernel: Initializing RT
netlink socket 
Dec 10 16:32:10 firewall kernel: Starting kswapd 
Dec 10 16:32:10 firewall kernel: pty: 256 Unix98 ptys
configured 
Dec 10 16:32:10 firewall kernel: RAMDISK driver
initialized: 16 RAM disks of 4096K size 1024 blocksize

Dec 10 16:32:10 firewall kernel: ip_conntrack version
2.1 (256 buckets, 2048 max) - 320 bytes per conntrack 
Dec 10 16:32:10 firewall kernel: ip_tables: (C)
2000-2002 Netfilter core team 
Dec 10 16:32:10 firewall kernel: arp_tables: (C) 2002
David S. Miller 
Dec 10 16:32:10 firewall kernel: VFS: Mounted root
(minix filesystem).


::debug::
Dec 10 16:32:10 firewall kernel: CPU: After generic,
caps: 000001bf 00000000 00000000 00000000 
Dec 10 16:32:10 firewall kernel: CPU: Common caps:
000001bf 00000000 00000000 00000000 
Dec 10 16:32:11 firewall kernel: eth0: Identified 8139
chip type 'RTL-8139C' 
Dec 10 16:32:11 firewall kernel: eth1: Identified 8139
chip type 'RTL-8139C' 
Dec 10 16:32:11 firewall kernel: eth2: Identified 8139
chip type 'RTL-8139C' 
Dec 10 16:32:12 firewall pumpd[16349]: PUMP: sending
discover 
Dec 10 16:32:12 firewall pumpd[16349]: breq: opcode: 1
Dec 10 16:32:12 firewall pumpd[16349]: breq: hw: 1
Dec 10 16:32:12 firewall pumpd[16349]: breq: hwlength:
6
Dec 10 16:32:12 firewall pumpd[16349]: breq: hopcount:
0
Dec 10 16:32:12 firewall pumpd[16349]: breq: xid:
0x022b6652
Dec 10 16:32:12 firewall pumpd[16349]: breq: secs: 0
Dec 10 16:32:12 firewall pumpd[16349]: breq: flags:
0x0000
Dec 10 16:32:12 firewall pumpd[16349]: breq: ciaddr:
0.0.0.0
Dec 10 16:32:12 firewall pumpd[16349]: breq: yiaddr:
0.0.0.0
Dec 10 16:32:12 firewall pumpd[16349]: breq:
server_ip: 0.0.0.0
Dec 10 16:32:12 firewall pumpd[16349]: breq:
bootp_gw_ip: 0.0.0.0
Dec 10 16:32:12 firewall pumpd[16349]: breq: hwaddr: 
Dec 10 16:32:12 firewall pumpd[16349]: breq:
servername: 
Dec 10 16:32:12 firewall pumpd[16349]: breq: bootfile:

Dec 10 16:32:12 firewall pumpd[16349]: breq: vendor:
0x63 0x82 0x53 0x63
Dec 10 16:32:12 firewall pumpd[16349]: breq: vendor:
53 1 0x01
Dec 10 16:32:12 firewall pumpd[16349]: breq: vendor:
0xff


::daemon.log::
Dec 10 16:32:12 firewall pumpd[16349]: starting at
(uptime 0 days, 0:01:35) Wed Dec 10 16:32:12 2003 
Dec 10 16:32:12 firewall pumpd[16349]: PUMP: sending
discover 
Dec 10 16:32:12 firewall pumpd[16349]: breq: opcode: 1
Dec 10 16:32:12 firewall pumpd[16349]: breq: hw: 1
Dec 10 16:32:12 firewall pumpd[16349]: breq: hwlength:
6
Dec 10 16:32:12 firewall pumpd[16349]: breq: hopcount:
0
Dec 10 16:32:12 firewall pumpd[16349]: breq: xid:
0x022b6652
Dec 10 16:32:12 firewall pumpd[16349]: breq: secs: 0
Dec 10 16:32:12 firewall pumpd[16349]: breq: flags:
0x0000
Dec 10 16:32:12 firewall pumpd[16349]: breq: ciaddr:
0.0.0.0
Dec 10 16:32:12 firewall pumpd[16349]: breq: yiaddr:
0.0.0.0
Dec 10 16:32:12 firewall pumpd[16349]: breq:
server_ip: 0.0.0.0
Dec 10 16:32:12 firewall pumpd[16349]: breq:
bootp_gw_ip: 0.0.0.0
Dec 10 16:32:12 firewall pumpd[16349]: breq: hwaddr: 
Dec 10 16:32:12 firewall pumpd[16349]: breq:
servername: 
Dec 10 16:32:12 firewall pumpd[16349]: breq: bootfile:

Dec 10 16:32:12 firewall pumpd[16349]: breq: vendor:
0x63 0x82 0x53 0x63
Dec 10 16:32:12 firewall pumpd[16349]: breq: vendor:
53 1 0x01
Dec 10 16:32:12 firewall pumpd[16349]: breq: vendor:
0xff
Dec 10 16:32:43 firewall init: Entering runlevel: 2
Dec 10 16:33:05 firewall sh-httpd[12221]: connect from
192.168.1.8
Dec 10 16:33:05 firewall sh-httpd[31464]: connect from
192.168.1.8
Dec 10 16:33:05 firewall sh-httpd[7827]: connect from
192.168.1.8
Dec 10 16:33:05 firewall sh-httpd[8349]: connect from
192.168.1.8
Dec 10 16:50:10 firewall sh-httpd[18836]: connect from
192.168.1.8
Dec 10 16:50:20 firewall sh-httpd[8999]: connect from
192.168.1.8
Dec 10 16:50:27 firewall sh-httpd[22964]: connect from
192.168.1.8
Dec 10 16:50:27 firewall sh-httpd[20626]: connect from
192.168.1.8
Dec 10 16:50:32 firewall sh-httpd[12333]: connect from
192.168.1.8
Dec 10 16:50:38 firewall sh-httpd[20849]: connect from
192.168.1.8
Dec 10 16:52:06 firewall sh-httpd[29249]: connect from
192.168.1.8
Dec 10 16:53:44 firewall sh-httpd[9150]: connect from
192.168.1.8
Dec 10 16:54:49 firewall sh-httpd[5423]: connect from
192.168.1.8
Dec 10 16:54:59 firewall sh-httpd[13646]: connect from
192.168.1.8
Dec 10 16:55:18 firewall sh-httpd[6800]: connect from
192.168.1.8
Dec 10 16:55:46 firewall sh-httpd[5983]: connect from
192.168.1.8
Dec 10 16:56:07 firewall sh-httpd[23340]: connect from
192.168.1.8
Dec 10 16:56:11 firewall sh-httpd[17831]: connect from
192.168.1.8
Dec 10 16:56:30 firewall sh-httpd[23734]: connect from
192.168.1.8


::cron.log::
Dec 10 16:32:50 firewall /usr/sbin/cron[27148]: (CRON)
INFO (pidfile fd = 3)
Dec 10 16:32:50 firewall /usr/sbin/cron[26468]: (CRON)
STARTUP (fork ok)
Dec 10 16:45:01 firewall

Yahoo! Mail (http://dk.mail.yahoo.com) - Gratis: 6 MB lagerplads, spamfilter og 
virusscan


-------------------------------------------------------
This SF.net email is sponsored by: IBM Linux Tutorials.
Become an expert in LINUX or just sharpen your skills.  Sign up for IBM's
Free Linux Tutorials.  Learn everything from the bash shell to sys admin.
Click now! http://ads.osdn.com/?ad_id=1278&alloc_id=3371&op=click
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html

Reply via email to