Hello All,
Please be patient with me, I am new to the Linux world and I am not a
security expert.
I built a uClibc firewall version 2.0 Linux firewall kernel 2.4.20 from the
image Bering-uClibc_2.0_img_bering-uclibc-1680.exe and I have been
compromised. I have included a lot of information here because I need to
know how the hackers compromised this machine and I want to give you as much
information as you need to help me figure it how. For the most part this is
a default configuration with no special services needed or running, I setup
dropbear (default config) but have not removed the package yet. The
Shorewall is set to accept all outbound traffic and paranoid ALL inbound, I
have not changed anything in this configuration file. Please see
Configuration and rules below for more detail and please let me know if you
need any additional information.
Thank you in advance to all that will help me. I am learning, and I am sure
this is NOT an issue with the shorewall product but with my configuration.
Please also remember who you are addressing (dope newbie/wannabie) so please
if you could. :)
Ken
[EMAIL PROTECTED]
Issue:
===============-==============-=============================================
=
My shorewall has been compromised. I need to find out how they are
compromising this machine repeatedly and what I need to do to stop it! The
hackers have already used the shorewall box to spam others on the internet
and god knows what else.
I have a CISCO PIX 515 behind the shorewall firewall with eth0 set to
192.168.1.99. As far as I can tell it has not been compromised and I have
not noticed any strange events internally on my home network (yet). (I am
told the PIX cannot be configured for dhcp so I am using shorewall for this;
unfortunately in my area I have a choice between Comcast and dialup). The
version of uClibc I am using may need some patches but I am not sure about
this as I downloaded this image and set it up less than a month ago, please
let me know if there are any critical updates that I need to apply. I have
read the installation/user guides and have read hundreds of man pages and I
can only hope I did everything right.
This clip is from my shorewall.log:0: Note the date on the first entry and
the source IP. The problem is that the SRC is my IP and I do not have an IP
192.43.244.18 on my network. I have added 123.1.1.1 to my blacklist. Since
this IP has been added to my blacklist it still shows up in my log and looks
something like the log from DEC 20 below with
Shorewall:blacklst:DROP:IN=eth0 OUT=eth1 SRC=123.1.1.1 DST=192.168.1.99.
This is bad because this IP is eth0 to my CISCO PIX 515.
Jan 1 00:00:00 firewall Shorewall:all2all:REJECT: IN= OUT=eth0 MAC=
SRC=12.213.227.185 DST=192.43.244.18 LEN=60 TOS=00 PREC=0x00 TTL=64 ID=0 DF
PROTO=TCP SPT=4083 DPT=37 SEQ=3441321937 ACK=0 WINDOW=5840 SYN URGP=0
Dec 21 10:19:38 firewall Shorewall:logdrop:DROP: IN=eth0 OUT=
MAC=00:a0:c9:68:18:28:00:01:5c:22:5d:42:08:00 SRC=123.1.1.1
DST=12.213.227.185 LEN=783 TOS=00 PREC=0x00 TTL=112 ID=28872 PROTO=UDP
SPT=14833 DPT=1026 LEN=763
Dec 21 15:13:10 firewall Shorewall:net2all:DROP: IN=eth0 OUT=
MAC=00:a0:c9:68:18:28:00:01:5c:22:5d:42:08:00 SRC=205.240.153.242
DST=12.213.227.185 LEN=60 TOS=00 PREC=0x00 TTL=49 ID=13109 DF PROTO=TCP
SPT=1787 DPT=21 SEQ=3260295433 ACK=0 WINDOW=5840 SYN URGP=0
Also SRC IP 66.218.70.35 has seemingly exploited the uClibc firewall. The
IP 192.168.1.99 is eth0 for my CISCO PIX 515.
You can see shorewall start and then 66.218.70.35 (v4.vc.scd.yahoo.com
[66.218.70.35]) is out eth1, looks bad to me. The hacker is using several
boxes from yahoo IP's: v3.vc.scd.yahoo.com [66.218.70.45],
v1.vc.scd.yahoo.com [66.218.70.32], v13.vc.scd.yahoo.com [66.218.70.34]
Dec 20 14:59:16 firewall dhcpcd.exe: interface eth0 has been configured with
new IP=12.213.227.185
Dec 20 14:59:23 firewall root: Shorewall Started
Dec 20 15:41:06 firewall kernel: Shorewall:blacklst:DROP:IN=eth0 OUT=eth1
SRC=66.218.70.35 DST=192.168.1.99 LEN=44 TOS=0x00 PREC=0x00 TTL=51 ID=2091
DF PROTO=TCP SPT=5001 DPT=10468 WINDOW=65535 RES=0x00 ACK SYN URGP=0
Configuration:
===============-==============-=============================================
=
The Shoewall box has two Intel Pro 100 NIC's. Eth0 to internet with dhcp,
routefilter, blacklist, rfc1918 and dropunclean set to yes.
I had set blacklist logging to 6 (informational) and then changed it to 4
(ergent) just to see if this would show different events in the log.
Eth0 pulls dhcp IP 12.213.227.185 from Comcast.
Eth1 is configured with default address 192.168.1.254.
Incoming ICMP on port 8 set to DROP packets.
Ident Port 113 set to DROP packets.
Modules Loaded:
===============-==============-=============================================
=
Modules:
softdog 1476 1
ip_nat_irc 2176 0 (unused)
ip_nat_ftp 2784 0 (unused)
ip_conntrack_irc 2880 1
ip_conntrack_ftp 3648 1
eepro100 17892 2
mii 2092 0 [eepro100]
Installed Packages:
Name Version Description
===============-==============-=============================================
=
initrd V2.0 uClibc-0. LEAF Bering initial filesystem
root V2.0 uClibc-0. Core LEAF Bering package
config 0.1 Core config and backup system package
etc V2.0 uClibc-0.
local V2.0 uClibc-0. LEAF Bering local package
modules V2.0 uClibc-0. Define & contain your LEAF Bering modules
iptables 1.2.8 IP packet filter administration tools for
2.4.
dhcpcd 1.3.22pl4-7 dhcpcd is a RFC2131 and RFC1541 compliant
DHCP
keyboard 0.3 Define your keyboard settings
shorwall 1.4.5 Shoreline Firewall (Shorewall)
ulogd 1.02 The Netfilter Userspace Logging Daemon
dnscache 1.05a A fast & secure proxy DNS server, patched for
dropbear 0.38 Dropbear SSH 2 server and key generator.
weblet 1.2.2-4 LEAF status via a small web server
Running Process:
===============-==============-=============================================
=
PID Uid VmSize Stat Command
1 root 256 S init [2]
2 root SW [keventd]
3 root SWN [ksoftirqd_CPU0]
4 root SW [kswapd]
5 root SW [bdflush]
6 root SW [kupdated]
28918 root 280 S /sbin/syslogd -m 240
12413 root 240 S /sbin/klogd
20139 root 280 S /sbin/dhcpcd-bin -Y -N -D -d eth0
31742 root 308 S /usr/sbin/dropbear -p 22 -r
/etc/dropbear/dropbear_rs
15242 root 144 S /usr/sbin/watchdog
5006 root 280 S /usr/sbin/inetd
25734 root 280 S /usr/sbin/ulogd -d
30415 root 1216 S [dnscache]
24224 root 288 S /usr/sbin/cron
30450 root 268 S /sbin/getty 38400 tty1
29007 root 268 S /sbin/getty 38400 tty2
1707 sh-httpd 328 S /bin/sh /usr/sbin/sh-httpd
302 sh-httpd 308 S /bin/sh /var/sh-www/cgi-bin/viewsys
28628 root 196 S [sleep]
15224 root 240 S [cat]
27609 sh-httpd 308 R /bin/sh /var/sh-www/cgi-bin/viewsys
12982 root 288 R [ps]
Firewall Rules:
===============-==============-=============================================
=
Shorewall-1.4.5 Chain at - Mon Dec 22 13:42:32 UTC 2003
Chain INPUT (policy DROP 2 packets, 420 bytes)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- lo * 0.0.0.0/0
0.0.0.0/0
0 0 DROP !icmp -- * * 0.0.0.0/0
0.0.0.0/0
state INVALID
0 0 eth0_in all -- eth0 * 0.0.0.0/0
0.0.0.0/0
0 0 eth1_in all -- eth1 * 0.0.0.0/0
0.0.0.0/0
0 0 common all -- * * 0.0.0.0/0
0.0.0.0/0
0 0 ULOG all -- * * 0.0.0.0/0
0.0.0.0/0
ULOG copy_range 0 nlgroup 1 prefix `Shorewall:INPUT:REJECT:'
queue_threshold 1
0 0 reject all -- * * 0.0.0.0/0
0.0.0.0/0
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
0 0 DROP !icmp -- * * 0.0.0.0/0
0.0.0.0/0
state INVALID
0 0 eth0_fwd all -- eth0 * 0.0.0.0/0
0.0.0.0/0
0 0 eth1_fwd all -- eth1 * 0.0.0.0/0
0.0.0.0/0
0 0 common all -- * * 0.0.0.0/0
0.0.0.0/0
0 0 ULOG all -- * * 0.0.0.0/0
0.0.0.0/0
ULOG copy_range 0 nlgroup 1 prefix `Shorewall:FORWARD:REJECT:'
queue_threshold 1
0 0 reject all -- * * 0.0.0.0/0
0.0.0.0/0
Chain OUTPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * lo 0.0.0.0/0
0.0.0.0/0
0 0 DROP !icmp -- * * 0.0.0.0/0
0.0.0.0/0
state INVALID
0 0 ACCEPT udp -- * eth0 0.0.0.0/0
0.0.0.0/0
udp dpts:67:68
0 0 fw2net all -- * eth0 0.0.0.0/0
0.0.0.0/0
0 0 all2all all -- * eth1 0.0.0.0/0
0.0.0.0/0
0 0 common all -- * * 0.0.0.0/0
0.0.0.0/0
0 0 ULOG all -- * * 0.0.0.0/0
0.0.0.0/0
ULOG copy_range 0 nlgroup 1 prefix `Shorewall:OUTPUT:REJECT:'
queue_threshold 1
0 0 reject all -- * * 0.0.0.0/0
0.0.0.0/0
Chain all2all (3 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0
0.0.0.0/0
state NEW tcp flags:!0x16/0x02
0 0 common all -- * * 0.0.0.0/0
0.0.0.0/0
0 0 ULOG all -- * * 0.0.0.0/0
0.0.0.0/0
ULOG copy_range 0 nlgroup 1 prefix `Shorewall:all2all:REJECT:'
queue_threshold 1
0 0 reject all -- * * 0.0.0.0/0
0.0.0.0/0
Chain badpkt (2 references)
pkts bytes target prot opt in out source
destination
0 0 ULOG !tcp -- * * 0.0.0.0/0
0.0.0.0/0
ULOG copy_range 0 nlgroup 1 prefix `Shorewall:badpkt:DROP:'
queue_threshold 1
0 0 ULOG tcp -- * * 0.0.0.0/0
0.0.0.0/0
ULOG copy_range 0 nlgroup 1 prefix `Shorewall:badpkt:DROP:'
queue_threshold 1
0 0 DROP all -- * * 0.0.0.0/0
0.0.0.0/0
Chain blacklst (2 references)
pkts bytes target prot opt in out source
destination
0 0 LOG all -- * * 66.218.70.32
0.0.0.0/0
LOG flags 0 level 4 prefix `Shorewall:blacklst:DROP:'
0 0 DROP all -- * * 66.218.70.32
0.0.0.0/0
0 0 LOG all -- * * 66.218.70.46
0.0.0.0/0
LOG flags 0 level 4 prefix `Shorewall:blacklst:DROP:'
0 0 DROP all -- * * 66.218.70.46
0.0.0.0/0
0 0 LOG all -- * * 66.218.70.32
0.0.0.0/0
LOG flags 0 level 4 prefix `Shorewall:blacklst:DROP:'
0 0 DROP all -- * * 66.218.70.32
0.0.0.0/0
0 0 LOG all -- * * 66.218.70.33
0.0.0.0/0
LOG flags 0 level 4 prefix `Shorewall:blacklst:DROP:'
0 0 DROP all -- * * 66.218.70.33
0.0.0.0/0
0 0 LOG all -- * * 66.218.70.34
0.0.0.0/0
LOG flags 0 level 4 prefix `Shorewall:blacklst:DROP:'
0 0 DROP all -- * * 66.218.70.34
0.0.0.0/0
0 0 LOG all -- * * 66.218.70.35
0.0.0.0/0
LOG flags 0 level 4 prefix `Shorewall:blacklst:DROP:'
0 0 DROP all -- * * 66.218.70.35
0.0.0.0/0
0 0 LOG all -- * * 66.218.70.41
0.0.0.0/0
LOG flags 0 level 4 prefix `Shorewall:blacklst:DROP:'
0 0 DROP all -- * * 66.218.70.41
0.0.0.0/0
0 0 LOG all -- * * 66.218.70.45
0.0.0.0/0
LOG flags 0 level 4 prefix `Shorewall:blacklst:DROP:'
0 0 DROP all -- * * 66.218.70.45
0.0.0.0/0
0 0 LOG all -- * * 66.232.141.16
0.0.0.0/0
LOG flags 0 level 4 prefix `Shorewall:blacklst:DROP:'
0 0 DROP all -- * * 66.232.141.16
0.0.0.0/0
0 0 LOG all -- * * 123.1.1.1
0.0.0.0/0
LOG flags 0 level 4 prefix `Shorewall:blacklst:DROP:'
0 0 DROP all -- * * 123.1.1.1
0.0.0.0/0
Chain common (5 references)
pkts bytes target prot opt in out source
destination
0 0 icmpdef icmp -- * * 0.0.0.0/0
0.0.0.0/0
0 0 reject udp -- * * 0.0.0.0/0
0.0.0.0/0
udp dpts:137:139
0 0 reject udp -- * * 0.0.0.0/0
0.0.0.0/0
udp dpt:445
0 0 reject tcp -- * * 0.0.0.0/0
0.0.0.0/0
tcp dpt:139
0 0 reject tcp -- * * 0.0.0.0/0
0.0.0.0/0
tcp dpt:445
0 0 reject tcp -- * * 0.0.0.0/0
0.0.0.0/0
tcp dpt:135
0 0 DROP udp -- * * 0.0.0.0/0
0.0.0.0/0
udp dpt:1900
0 0 DROP all -- * * 0.0.0.0/0
255.255.255.
255
0 0 DROP all -- * * 0.0.0.0/0
224.0.0.0/4
0 0 reject tcp -- * * 0.0.0.0/0
0.0.0.0/0
tcp dpt:113
0 0 DROP udp -- * * 0.0.0.0/0
0.0.0.0/0
udp spt:53 state NEW
0 0 DROP all -- * * 0.0.0.0/0
255.255.255.
255
0 0 DROP all -- * * 0.0.0.0/0
192.168.1.25
5
Chain dynamic (4 references)
pkts bytes target prot opt in out source
destination
Chain eth0_fwd (1 references)
pkts bytes target prot opt in out source
destination
0 0 dynamic all -- * * 0.0.0.0/0
0.0.0.0/0
0 0 badpkt all -- * * 0.0.0.0/0
0.0.0.0/0
unclean
0 0 rfc1918 all -- * * 0.0.0.0/0
0.0.0.0/0
state NEW
0 0 blacklst all -- * * 0.0.0.0/0
0.0.0.0/0
0 0 net2all all -- * eth1 0.0.0.0/0
0.0.0.0/0
Chain eth0_in (1 references)
pkts bytes target prot opt in out source
destination
0 0 dynamic all -- * * 0.0.0.0/0
0.0.0.0/0
0 0 badpkt all -- * * 0.0.0.0/0
0.0.0.0/0
unclean
0 0 ACCEPT udp -- * * 0.0.0.0/0
0.0.0.0/0
udp dpts:67:68
0 0 rfc1918 all -- * * 0.0.0.0/0
0.0.0.0/0
state NEW
0 0 blacklst all -- * * 0.0.0.0/0
0.0.0.0/0
0 0 net2fw all -- * * 0.0.0.0/0
0.0.0.0/0
Chain eth1_fwd (1 references)
pkts bytes target prot opt in out source
destination
0 0 dynamic all -- * * 0.0.0.0/0
0.0.0.0/0
0 0 loc2net all -- * eth0 0.0.0.0/0
0.0.0.0/0
Chain eth1_in (1 references)
pkts bytes target prot opt in out source
destination
0 0 dynamic all -- * * 0.0.0.0/0
0.0.0.0/0
0 0 loc2fw all -- * * 0.0.0.0/0
0.0.0.0/0
Chain fw2net (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0
0.0.0.0/0
state NEW tcp flags:!0x16/0x02
0 0 ACCEPT tcp -- * * 0.0.0.0/0
0.0.0.0/0
state NEW tcp dpt:53
0 0 ACCEPT udp -- * * 0.0.0.0/0
0.0.0.0/0
state NEW udp dpt:53
0 0 ACCEPT icmp -- * * 0.0.0.0/0
0.0.0.0/0
icmp type 8
0 0 all2all all -- * * 0.0.0.0/0
0.0.0.0/0
Chain icmpdef (1 references)
pkts bytes target prot opt in out source
destination
Chain loc2fw (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0
0.0.0.0/0
state NEW tcp flags:!0x16/0x02
0 0 ACCEPT tcp -- * * 0.0.0.0/0
0.0.0.0/0
state NEW tcp dpt:80
0 0 ACCEPT tcp -- * * 0.0.0.0/0
0.0.0.0/0
state NEW tcp dpt:53
0 0 ACCEPT udp -- * * 0.0.0.0/0
0.0.0.0/0
state NEW udp dpt:53
0 0 ACCEPT tcp -- * * 0.0.0.0/0
0.0.0.0/0
state NEW tcp dpt:22
0 0 ACCEPT icmp -- * * 0.0.0.0/0
0.0.0.0/0
icmp type 8
0 0 all2all all -- * * 0.0.0.0/0
0.0.0.0/0
Chain loc2net (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0
0.0.0.0/0
state NEW tcp flags:!0x16/0x02
0 0 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0
Chain logdrop (30 references)
pkts bytes target prot opt in out source
destination
0 0 ULOG all -- * * 0.0.0.0/0
0.0.0.0/0
ULOG copy_range 0 nlgroup 1 prefix `Shorewall:logdrop:DROP:'
queue_threshold 1
0 0 DROP all -- * * 0.0.0.0/0
0.0.0.0/0
Chain net2all (2 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0
0.0.0.0/0
state NEW tcp flags:!0x16/0x02
0 0 common all -- * * 0.0.0.0/0
0.0.0.0/0
0 0 ULOG all -- * * 0.0.0.0/0
0.0.0.0/0
ULOG copy_range 0 nlgroup 1 prefix `Shorewall:net2all:DROP:'
queue_threshold 1
0 0 DROP all -- * * 0.0.0.0/0
0.0.0.0/0
Chain net2fw (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0
0.0.0.0/0
state NEW tcp flags:!0x16/0x02
0 0 DROP icmp -- * * 0.0.0.0/0
0.0.0.0/0
icmp type 8
0 0 DROP tcp -- * * 0.0.0.0/0
0.0.0.0/0
state NEW tcp dpt:67
0 0 DROP udp -- * * 0.0.0.0/0
0.0.0.0/0
state NEW udp dpt:67
0 0 DROP tcp -- * * 0.0.0.0/0
0.0.0.0/0
state NEW tcp dpt:68
0 0 DROP udp -- * * 0.0.0.0/0
0.0.0.0/0
state NEW udp dpt:68
0 0 DROP tcp -- * * 0.0.0.0/0
0.0.0.0/0
state NEW tcp dpt:113
0 0 DROP udp -- * * 0.0.0.0/0
0.0.0.0/0
state NEW udp dpt:113
0 0 DROP tcp -- * * 0.0.0.0/0
0.0.0.0/0
I have added a lot more ports to DROP but have only included those that
specifically were set to allow or open in the default config. Like port
113, I have set to DROP.
Chain newnotsyn (6 references)
pkts bytes target prot opt in out source
destination
0 0 DROP all -- * * 0.0.0.0/0
0.0.0.0/0
Chain reject (10 references)
pkts bytes target prot opt in out source
destination
0 0 REJECT tcp -- * * 0.0.0.0/0
0.0.0.0/0
reject-with tcp-reset
0 0 REJECT udp -- * * 0.0.0.0/0
0.0.0.0/0
reject-with icmp-port-unreachable
0 0 REJECT icmp -- * * 0.0.0.0/0
0.0.0.0/0
reject-with icmp-host-unreachable
0 0 REJECT all -- * * 0.0.0.0/0
0.0.0.0/0
reject-with icmp-host-prohibited
Chain rfc1918 (2 references)
pkts bytes target prot opt in out source
destination
0 0 RETURN all -- * * 255.255.255.255
0.0.0.0/0
0 0 DROP all -- * * 169.254.0.0/16
0.0.0.0/0
0 0 logdrop all -- * * 172.16.0.0/12
0.0.0.0/0
0 0 logdrop all -- * * 192.0.2.0/24
0.0.0.0/0
0 0 logdrop all -- * * 192.168.0.0/16
0.0.0.0/0
0 0 logdrop all -- * * 0.0.0.0/7
0.0.0.0/0
0 0 logdrop all -- * * 2.0.0.0/8
0.0.0.0/0
0 0 logdrop all -- * * 5.0.0.0/8
0.0.0.0/0
0 0 logdrop all -- * * 7.0.0.0/8
0.0.0.0/0
0 0 logdrop all -- * * 10.0.0.0/8
0.0.0.0/0
0 0 logdrop all -- * * 23.0.0.0/8
0.0.0.0/0
0 0 logdrop all -- * * 27.0.0.0/8
0.0.0.0/0
0 0 logdrop all -- * * 31.0.0.0/8
0.0.0.0/0
0 0 logdrop all -- * * 36.0.0.0/7
0.0.0.0/0
0 0 logdrop all -- * * 39.0.0.0/8
0.0.0.0/0
0 0 logdrop all -- * * 41.0.0.0/8
0.0.0.0/0
0 0 logdrop all -- * * 42.0.0.0/8
0.0.0.0/0
0 0 logdrop all -- * * 49.0.0.0/8
0.0.0.0/0
0 0 logdrop all -- * * 50.0.0.0/8
0.0.0.0/0
0 0 logdrop all -- * * 58.0.0.0/7
0.0.0.0/0
0 0 logdrop all -- * * 60.0.0.0/8
0.0.0.0/0
0 0 logdrop all -- * * 70.0.0.0/7
0.0.0.0/0
0 0 logdrop all -- * * 72.0.0.0/5
0.0.0.0/0
0 0 logdrop all -- * * 83.0.0.0/8
0.0.0.0/0
0 0 logdrop all -- * * 84.0.0.0/6
0.0.0.0/0
0 0 logdrop all -- * * 88.0.0.0/5
0.0.0.0/0
0 0 logdrop all -- * * 96.0.0.0/3
0.0.0.0/0
0 0 logdrop all -- * * 127.0.0.0/8
0.0.0.0/0
0 0 logdrop all -- * * 197.0.0.0/8
0.0.0.0/0
0 0 logdrop all -- * * 198.18.0.0/15
0.0.0.0/0
0 0 logdrop all -- * * 201.0.0.0/8
0.0.0.0/0
0 0 logdrop all -- * * 240.0.0.0/4
0.0.0.0/0
Shorewall-1.4.5 NAT at - Mon Dec 22 13:42:32 UTC 2003
Chain PREROUTING (policy ACCEPT 5 packets, 1186 bytes)
pkts bytes target prot opt in out source
destination
Chain POSTROUTING (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
0 0 eth0_masq all -- * eth0 0.0.0.0/0
0.0.0.0/0
Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
Chain eth0_masq (1 references)
pkts bytes target prot opt in out source
destination
0 0 MASQUERADE all -- * * 192.168.1.0/24 0.0.0.0
INTERFACES:
===============-==============-=============================================
=
1: lo: mtu 16436 qdisc noqueue
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
2: dummy0: mtu 1500 qdisc noop
link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff
3: eth0: mtu 1500 qdisc pfifo_fast qlen 100
link/ether 00:a0:c9:68:18:28 brd ff:ff:ff:ff:ff:ff
inet 12.213.227.185/24 brd 255.255.255.255 scope global eth0
4: eth1: mtu 1500 qdisc pfifo_fast qlen 100
link/ether 00:d0:b7:75:e8:17 brd ff:ff:ff:ff:ff:ff
inet 192.168.1.254/24 brd 192.168.1.255 scope global eth1
ROUTES:
===============-==============-=============================================
=
12.213.227.0/24 dev eth0 proto kernel scope link src 12.213.227.185
192.168.1.0/24 dev eth1 proto kernel scope link src 192.168.1.254
default via 12.213.227.1 dev eth0
-------------------------------------------------------
This SF.net email is sponsored by: IBM Linux Tutorials.
Become an expert in LINUX or just sharpen your skills. Sign up for IBM's
Free Linux Tutorials. Learn everything from the bash shell to sys admin.
Click now! http://ads.osdn.com/?ad_id78&alloc_id371&op=click
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html