Problem:  Bering-uClibc_2.1.3 stops after several hours.

I have been using the Dachstein contributed pppoe version by Kenneth
Hadley on a home network for the past two years without any problems. The
LRP is connected to three PCs running Windows XP professional via a
switch.  The LRP runs on a 486 with two ISA cards: eth0 uses 8390.o and
ne.o; eth1 uses 3c509.o.

I decided to upgrade to Bering-uClibc_2.1.3.  I have been able to get the
system up and running with no error messages (crc32.0 has been added for
8390.o).  I am able to monitor the status via Mozilla browser and weblet. 
After several hours, the firewall status turns to "error" (more than 50
denied packets).  Not long after, I lose the connection to the Internet on
one or more PCs, and the connection to the internal network is down on all
three PCs.  This afternoon, I had one PC still connected to the Internet,
but was unable to see the other two PCs on the network.

When I restart using the Dashstein disk, the system works fine.

I have searched the old mail lists and found a report by one user that was
somewhat similar and may have been due to a 3c509 driver problem using the
old 3Com ISA card (there was no follow up to that message).

Before I start pulling cards, I would appreciate any insight that the
users of this list have into this problem.  I have pasted output messages
below.  If other output messages are needed, I would be happy to supply
them (this problem is reproducible).

Thanks.

* the exact name of the LEAF distribution and version you are running.

Bering-uClibc_2.1.3

* the exact kernel version you are running

ash# uname -a

Linux firewall 2.4.24 #3 Sun Feb 22 19:25:40 CET 2004 i486 unknown


cp /var/log/messages /mnt/messages.txt

Jul 10 10:52:07 firewall syslogd 1.4.1: restart.
Jul 10 10:52:07 firewall kernel: klogd 1.4.1, log source = /proc/kmsg
started.
Jul 10 10:52:07 firewall kernel: No module symbols loaded.
Jul 10 10:52:07 firewall kernel: BIOS-provided physical RAM map:
Jul 10 10:52:07 firewall kernel: 16MB LOWMEM available.
Jul 10 10:52:07 firewall kernel: DMI not present.
Jul 10 10:52:07 firewall kernel: Initializing CPU#0
Jul 10 10:52:07 firewall kernel: Memory: 14252k/16672k available (995k
kernel code, 2032k reserved, 99k data, 80k init, 0k highmem)
Jul 10 10:52:07 firewall kernel: Dentry cache hash table entries: 4096
(order: 3, 32768 bytes)
Jul 10 10:52:07 firewall kernel: Inode cache hash table entries: 2048
(order: 2, 16384 bytes)
Jul 10 10:52:07 firewall kernel: Mount cache hash table entries: 512
(order: 0, 4096 bytes)
Jul 10 10:52:07 firewall kernel: Buffer cache hash table entries: 1024
(order: 0, 4096 bytes)
Jul 10 10:52:07 firewall kernel: Checking 'hlt' instruction... OK.
Jul 10 10:52:07 firewall kernel: Linux NET4.0 for Linux 2.4
Jul 10 10:52:07 firewall kernel: Based upon Swansea University Computer
Society NET3.039
Jul 10 10:52:07 firewall kernel: Serial driver version 5.05c (2001-07-08)
with MANY_PORTS SHARE_IRQ DETECT_IRQ SERIAL_PCI enabled
Jul 10 10:52:07 firewall kernel: ttyS00 at 0x03f8 (irq = 4) is a 16550A
Jul 10 10:52:07 firewall kernel: ttyS01 at 0x02f8 (irq = 3) is a 16550A
Jul 10 10:52:07 firewall kernel: Real Time Clock Driver v1.10e
Jul 10 10:52:07 firewall kernel: Floppy drive(s): fd0 is 2.88M
Jul 10 10:52:07 firewall kernel: FDC 0 is a National Semiconductor PC87306
Jul 10 10:52:07 firewall kernel: Initializing Cryptographic API
Jul 10 10:52:07 firewall kernel: NET4: Linux TCP/IP 1.0 for NET4.0
Jul 10 10:52:07 firewall kernel: IP Protocols: ICMP, UDP, TCP, IGMP
Jul 10 10:52:07 firewall kernel: IP: routing cache hash table of 512
buckets, 4Kbytes
Jul 10 10:52:07 firewall kernel: TCP: Hash tables configured (established
1024 bind 1024)
Jul 10 10:52:07 firewall kernel: NET4: Unix domain sockets 1.0/SMP for
Linux NET4.0.
Jul 10 10:52:07 firewall kernel: RAMDISK: Compressed image found at block 0
Jul 10 10:52:07 firewall kernel: Freeing initrd memory: 284k freed
Jul 10 10:52:07 firewall kernel: Freeing unused kernel memory: 80k freed
Jul 10 10:52:08 firewall kernel: ne.c:v1.10 9/23/94 Donald Becker
([EMAIL PROTECTED])
Jul 10 10:52:08 firewall kernel: Last modified Nov 1, 2000 by Paul Gortmaker
Jul 10 10:52:08 firewall kernel: NE*000 ethercard probe at 0x300: 00 00 1b
4b a6 f0
Jul 10 10:52:08 firewall kernel: 3c509.c:1.19 16Oct2002 [EMAIL PROTECTED]
Jul 10 10:52:08 firewall kernel: http://www.scyld.com/network/3c509.html
Jul 10 10:52:08 firewall kernel: CSLIP: code copyright 1989 Regents of the
University of California
Jul 10 10:52:08 firewall kernel: N_HDLC line discipline registered.
Jul 10 10:52:08 firewall kernel: PPP generic driver version 2.4.2
Jul 10 10:52:09 firewall kernel: Software Watchdog Timer: 0.05, timer
margin: 60 sec
Jul 10 10:52:29 firewall root: Shorewall Started
Jul 10 14:52:07 firewall -- MARK --

* the complete, exact output of

ash# ip addr show

1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
2: dummy0: <BROADCAST,NOARP> mtu 1500 qdisc noop
    link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff
3: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000
    link/ether 00:00:1b:4b:a6:f0 brd ff:ff:ff:ff:ff:ff
4: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000
    link/ether 00:a0:24:8d:b3:de brd ff:ff:ff:ff:ff:ff
    inet 192.168.1.254/24 brd 192.168.1.255 scope global eth1
5: ppp0: <POINTOPOINT,MULTICAST,NOARP,UP> mtu 1492 qdisc pfifo_fast qlen 3
    link/ppp
    inet 68.164.34.57 peer 172.31.255.251/32 scope global ppp0


* the complete, exact output of

ash# ip route show

172.31.255.251 dev ppp0  proto kernel  scope link  src 68.164.34.57
192.168.1.0/24 dev eth1  proto kernel  scope link  src 192.168.1.254
default via 172.31.255.251 dev ppp0


* the exact wording of any ping failure responses, including the ping
command itself (there are some FAQ entries to help you).

Depending on the specific problem, include some or all of:

* the exact output of the command below is typically useful for
NIC-related problems.

ash# lsmod

Module                  Size  Used by    Not tainted
softdog                 1508   1
ip_nat_irc              2128   0 (unused)
ip_nat_ftp              2736   0 (unused)
ip_conntrack_irc        2864   1
ip_conntrack_ftp        3472   1
pppoe                   6732   1
pppox                    924   1 [pppoe]
ppp_synctty             4632   0 (unused)
ppp_generic            16204   3 [pppoe pppox ppp_synctty]
n_hdlc                  5792   0 (unused)
slhc                    4296   0 [ppp_generic]
3c509                   8240   1
ne                      6148   1
8390                    5784   0 [ne]
crc32                   2648   0 [8390]


* the exact output of the commands below is typically useful for
firewall-related problems.

ash# /sbin/shorewall status

 [H [JShorewall-1.4.10e Status at firewall - Wed Jul 10 15:39:58 UTC 1996

Counters reset Wed Jul 10 10:52:29 UTC 1996

Chain INPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source              
destination
    0     0 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0
    0     0 DROP      !icmp --  *      *       0.0.0.0/0           
0.0.0.0/0           state INVALID
 2926  645K ppp0_in    all  --  ppp0   *       0.0.0.0/0            0.0.0.0/0
 3649  561K eth1_in    all  --  eth1   *       0.0.0.0/0            0.0.0.0/0
    0     0 common     all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 ULOG       all  --  *      *       0.0.0.0/0           
0.0.0.0/0           ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:INPUT:REJECT:' queue_threshold 1
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source              
destination
    0     0 DROP      !icmp --  *      *       0.0.0.0/0           
0.0.0.0/0           state INVALID
 1655 78928 TCPMSS     tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0           tcp flags:0x06/0x02 TCPMSS clamp to PMTU
11658 9330K ppp0_fwd   all  --  ppp0   *       0.0.0.0/0            0.0.0.0/0
 9812 1335K eth1_fwd   all  --  eth1   *       0.0.0.0/0            0.0.0.0/0
    0     0 common     all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 ULOG       all  --  *      *       0.0.0.0/0           
0.0.0.0/0           ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:FORWARD:REJECT:' queue_threshold 1
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain OUTPUT (policy DROP 4 packets, 352 bytes)
 pkts bytes target     prot opt in     out     source              
destination
    0     0 ACCEPT     all  --  *      lo      0.0.0.0/0            0.0.0.0/0
    0     0 DROP      !icmp --  *      *       0.0.0.0/0           
0.0.0.0/0           state INVALID
 1930  126K fw2net     all  --  *      ppp0    0.0.0.0/0            0.0.0.0/0
  363 88489 fw2loc     all  --  *      eth1    0.0.0.0/0            0.0.0.0/0
    0     0 common     all  --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 ULOG       all  --  *      *       0.0.0.0/0           
0.0.0.0/0           ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:OUTPUT:REJECT:' queue_threshold 1
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain all2all (3 references)
 pkts bytes target     prot opt in     out     source              
destination
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0           
0.0.0.0/0           state RELATED,ESTABLISHED
 3291  535K common     all  --  *      *       0.0.0.0/0            0.0.0.0/0
    1    88 ULOG       all  --  *      *       0.0.0.0/0           
0.0.0.0/0           ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:all2all:REJECT:' queue_threshold 1
    1    88 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain common (5 references)
 pkts bytes target     prot opt in     out     source              
destination
    1    88 icmpdef    icmp --  *      *       0.0.0.0/0            0.0.0.0/0
    0     0 DROP       udp  --  *      *       0.0.0.0/0           
0.0.0.0/0           udp dpt:135
  155 24906 DROP       udp  --  *      *       0.0.0.0/0           
0.0.0.0/0           udp dpts:137:139
    0     0 DROP       udp  --  *      *       0.0.0.0/0           
0.0.0.0/0           udp dpt:445
   77  3704 DROP       tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0           tcp dpt:139
  629 30248 DROP       tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0           tcp dpt:445
  213 10248 DROP       tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0           tcp dpt:135
 3098  497K DROP       udp  --  *      *       0.0.0.0/0           
0.0.0.0/0           udp dpt:1900
   40 13126 DROP       all  --  *      *       0.0.0.0/0           
255.255.255.255
    0     0 DROP       all  --  *      *       0.0.0.0/0           
224.0.0.0/4
    0     0 reject     tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0           tcp dpt:113
    0     0 DROP       udp  --  *      *       0.0.0.0/0           
0.0.0.0/0           udp spt:53 state NEW
    0     0 DROP       icmp --  *      *       0.0.0.0              0.0.0.0/0
    0     0 DROP       icmp --  *      *       0.0.0.0/0            0.0.0.0
    2    84 ACCEPT     tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0           tcp flags:0x10/0x10
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0           tcp flags:0x04/0x04
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0           tcp flags:0x01/0x01
    0     0 DROP       all  --  *      *       0.0.0.0/0           
192.168.1.255

Chain dynamic (4 references)
 pkts bytes target     prot opt in     out     source              
destination

Chain eth1_fwd (1 references)
 pkts bytes target     prot opt in     out     source              
destination
  835 40080 dynamic    all  --  *      *       0.0.0.0/0           
0.0.0.0/0           state NEW
 9812 1335K loc2net    all  --  *      ppp0    0.0.0.0/0            0.0.0.0/0

Chain eth1_in (1 references)
 pkts bytes target     prot opt in     out     source              
destination
 3368  540K dynamic    all  --  *      *       0.0.0.0/0           
0.0.0.0/0           state NEW
 3649  561K loc2fw     all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain fw2loc (1 references)
 pkts bytes target     prot opt in     out     source              
destination
  362 88401 ACCEPT     all  --  *      *       0.0.0.0/0           
0.0.0.0/0           state RELATED,ESTABLISHED
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0           
0.0.0.0/0           icmp type 8
    1    88 all2all    all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain fw2net (1 references)
 pkts bytes target     prot opt in     out     source              
destination
   52  4048 ACCEPT     all  --  *      *       0.0.0.0/0           
0.0.0.0/0           state RELATED,ESTABLISHED
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0           state NEW tcp dpt:53
 1878  122K ACCEPT     udp  --  *      *       0.0.0.0/0           
0.0.0.0/0           state NEW udp dpt:53
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0           
0.0.0.0/0           icmp type 8
    0     0 all2all    all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain icmpdef (1 references)
 pkts bytes target     prot opt in     out     source              
destination

Chain loc2fw (1 references)
 pkts bytes target     prot opt in     out     source              
destination
  281 21189 ACCEPT     all  --  *      *       0.0.0.0/0           
0.0.0.0/0           state RELATED,ESTABLISHED
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0           state NEW tcp dpt:22
    2    66 ACCEPT     icmp --  *      *       0.0.0.0/0           
0.0.0.0/0           icmp type 8
   58  3753 ACCEPT     udp  --  *      *       0.0.0.0/0           
0.0.0.0/0           state NEW udp dpt:53
   18   864 ACCEPT     tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0           state NEW tcp dpt:80
 3290  535K all2all    all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain loc2net (1 references)
 pkts bytes target     prot opt in     out     source              
destination
 8977 1295K ACCEPT     all  --  *      *       0.0.0.0/0           
0.0.0.0/0           state RELATED,ESTABLISHED
  835 40080 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain net2all (2 references)
 pkts bytes target     prot opt in     out     source              
destination
11658 9330K ACCEPT     all  --  *      *       0.0.0.0/0           
0.0.0.0/0           state RELATED,ESTABLISHED
 1022 55444 common     all  --  *      *       0.0.0.0/0            0.0.0.0/0
   98 10926 ULOG       all  --  *      *       0.0.0.0/0           
0.0.0.0/0           ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:net2all:DROP:' queue_threshold 1
   98 10926 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain net2fw (1 references)
 pkts bytes target     prot opt in     out     source              
destination
 1854  585K ACCEPT     all  --  *      *       0.0.0.0/0           
0.0.0.0/0           state RELATED,ESTABLISHED
   50  3968 ACCEPT     icmp --  *      *       0.0.0.0/0           
0.0.0.0/0           icmp type 8
 1022 55444 net2all    all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain ppp0_fwd (1 references)
 pkts bytes target     prot opt in     out     source              
destination
    0     0 dynamic    all  --  *      *       0.0.0.0/0           
0.0.0.0/0           state NEW
11658 9330K net2all    all  --  *      eth1    0.0.0.0/0            0.0.0.0/0

Chain ppp0_in (1 references)
 pkts bytes target     prot opt in     out     source              
destination
 1072 59412 dynamic    all  --  *      *       0.0.0.0/0           
0.0.0.0/0           state NEW
 2926  645K net2fw     all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain reject (5 references)
 pkts bytes target     prot opt in     out     source              
destination
    0     0 DROP       all  --  *      *       0.0.0.0/0           
0.0.0.0/0           PKTTYPE = broadcast
    0     0 DROP       all  --  *      *       0.0.0.0/0           
0.0.0.0/0           PKTTYPE = multicast
    0     0 DROP       all  --  *      *       192.168.1.255        0.0.0.0/0
    0     0 DROP       all  --  *      *       255.255.255.255      0.0.0.0/0
    0     0 DROP       all  --  *      *       224.0.0.0/4          0.0.0.0/0
    0     0 REJECT     tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0           reject-with tcp-reset
    0     0 REJECT     udp  --  *      *       0.0.0.0/0           
0.0.0.0/0           reject-with icmp-port-unreachable
    1    88 REJECT     icmp --  *      *       0.0.0.0/0           
0.0.0.0/0           reject-with icmp-host-unreachable
    0     0 REJECT     all  --  *      *       0.0.0.0/0           
0.0.0.0/0           reject-with icmp-host-prohibited

Chain shorewall (0 references)
 pkts bytes target     prot opt in     out     source              
destination

Jul 10 14:17:45 net2all:DROP: IN=ppp0 OUT= SRC=68.164.62.237
DST=68.164.34.57 LEN=48 TOS=00 PREC=0x00 TTL=120 ID=17807 DF PROTO=TCP
SPT=1025 DPT=80 SEQ=1052818679 ACK=0 WINDOW=16384 SYN URGP=0
Jul 10 14:17:45 net2all:DROP: IN=ppp0 OUT= SRC=68.164.62.237
DST=68.164.34.57 LEN=48 TOS=00 PREC=0x00 TTL=120 ID=17808 DF PROTO=TCP
SPT=4986 DPT=3127 SEQ=1052648977 ACK=0 WINDOW=16384 SYN URGP=0
Jul 10 14:17:45 net2all:DROP: IN=ppp0 OUT= SRC=68.164.62.237
DST=68.164.34.57 LEN=48 TOS=00 PREC=0x00 TTL=120 ID=17809 DF PROTO=TCP
SPT=4992 DPT=6129 SEQ=1052701136 ACK=0 WINDOW=16384 SYN URGP=0
Jul 10 14:17:51 net2all:DROP: IN=ppp0 OUT= SRC=68.164.62.237
DST=68.164.34.57 LEN=48 TOS=00 PREC=0x00 TTL=120 ID=19569 DF PROTO=TCP
SPT=4978 DPT=1025 SEQ=1052541195 ACK=0 WINDOW=16384 SYN URGP=0
Jul 10 14:39:45 net2all:DROP: IN=ppp0 OUT= SRC=212.113.164.103
DST=68.164.34.57 LEN=48 TOS=00 PREC=0x00 TTL=56 ID=61392 CE PROTO=TCP
SPT=13721 DPT=80 SEQ=4129849008 ACK=0 WINDOW=5840 SYN URGP=0
Jul 10 14:39:48 net2all:DROP: IN=ppp0 OUT= SRC=212.113.164.103
DST=68.164.34.57 LEN=48 TOS=00 PREC=0x00 TTL=56 ID=61393 CE PROTO=TCP
SPT=13721 DPT=80 SEQ=4129849008 ACK=0 WINDOW=5840 SYN URGP=0
Jul 10 14:39:54 net2all:DROP: IN=ppp0 OUT= SRC=212.113.164.103
DST=68.164.34.57 LEN=48 TOS=00 PREC=0x00 TTL=56 ID=61394 CE PROTO=TCP
SPT=13721 DPT=80 SEQ=4129849008 ACK=0 WINDOW=5840 SYN URGP=0
Jul 10 14:40:06 net2all:DROP: IN=ppp0 OUT= SRC=212.113.164.103
DST=68.164.34.57 LEN=48 TOS=00 PREC=0x00 TTL=56 ID=61395 CE PROTO=TCP
SPT=13721 DPT=80 SEQ=4129849008 ACK=0 WINDOW=5840 SYN URGP=0
Jul 10 14:40:30 net2all:DROP: IN=ppp0 OUT= SRC=212.113.164.103
DST=68.164.34.57 LEN=48 TOS=00 PREC=0x00 TTL=56 ID=61396 CE PROTO=TCP
SPT=13721 DPT=80 SEQ=4129849008 ACK=0 WINDOW=5840 SYN URGP=0
Jul 10 14:41:18 net2all:DROP: IN=ppp0 OUT= SRC=212.113.164.103
DST=68.164.34.57 LEN=48 TOS=00 PREC=0x00 TTL=56 ID=61397 CE PROTO=TCP
SPT=13721 DPT=80 SEQ=4129849008 ACK=0 WINDOW=5840 SYN URGP=0
Jul 10 14:42:29 net2all:DROP: IN=ppp0 OUT= SRC=24.84.94.177
DST=68.164.34.57 LEN=48 TOS=00 PREC=0x00 TTL=118 ID=44139 CE DF PROTO=TCP
SPT=1692 DPT=4899 SEQ=1583867964 ACK=0 WINDOW=64240 SYN URGP=0
Jul 10 14:43:28 net2all:DROP: IN=ppp0 OUT= SRC=207.218.56.120
DST=68.164.34.57 LEN=836 TOS=00 PREC=0x00 TTL=119 ID=31312 PROTO=UDP
SPT=17982 DPT=1026 LEN=816
Jul 10 14:43:29 net2all:DROP: IN=ppp0 OUT= SRC=207.14.70.120
DST=68.164.34.57 LEN=836 TOS=00 PREC=0x00 TTL=119 ID=28242 PROTO=UDP
SPT=13124 DPT=1027 LEN=816
Jul 10 14:50:56 net2all:DROP: IN=ppp0 OUT= SRC=63.127.192.148
DST=68.164.34.57 LEN=605 TOS=00 PREC=0x00 TTL=115 ID=39408 CE PROTO=UDP
SPT=8135 DPT=1026 LEN=585
Jul 10 14:53:43 net2all:DROP: IN=ppp0 OUT= SRC=200.171.144.85
DST=68.164.34.57 LEN=48 TOS=00 PREC=0x00 TTL=112 ID=6166 DF PROTO=TCP
SPT=3224 DPT=25 SEQ=1055829894 ACK=0 WINDOW=16384 SYN URGP=0
Jul 10 14:53:46 net2all:DROP: IN=ppp0 OUT= SRC=200.171.144.85
DST=68.164.34.57 LEN=48 TOS=00 PREC=0x00 TTL=112 ID=6287 DF PROTO=TCP
SPT=3224 DPT=25 SEQ=1055829894 ACK=0 WINDOW=16384 SYN URGP=0
Jul 10 15:06:33 net2all:DROP: IN=ppp0 OUT= SRC=68.164.69.226
DST=68.164.34.57 LEN=48 TOS=00 PREC=0x00 TTL=119 ID=30357 DF PROTO=TCP
SPT=1435 DPT=5000 SEQ=866378558 ACK=0 WINDOW=64800 SYN URGP=0
Jul 10 15:36:02 net2all:DROP: IN=ppp0 OUT= SRC=211.161.39.129
DST=68.164.34.57 LEN=48 TOS=00 PREC=0x00 TTL=108 ID=1878 DF PROTO=TCP
SPT=3793 DPT=1025 SEQ=541056394 ACK=0 WINDOW=64240 SYN URGP=0
Jul 10 15:36:05 net2all:DROP: IN=ppp0 OUT= SRC=211.161.39.129
DST=68.164.34.57 LEN=48 TOS=00 PREC=0x00 TTL=108 ID=2634 DF PROTO=TCP
SPT=3793 DPT=1025 SEQ=541056394 ACK=0 WINDOW=64240 SYN URGP=0
Jul 10 15:36:11 net2all:DROP: IN=ppp0 OUT= SRC=211.161.39.129
DST=68.164.34.57 LEN=48 TOS=00 PREC=0x00 TTL=108 ID=3397 DF PROTO=TCP
SPT=3793 DPT=1025 SEQ=541056394 ACK=0 WINDOW=64240 SYN URGP=0

NAT Table

Chain PREROUTING (policy ACCEPT 5347 packets, 650K bytes)
 pkts bytes target     prot opt in     out     source              
destination

Chain POSTROUTING (policy ACCEPT 1878 packets, 122K bytes)
 pkts bytes target     prot opt in     out     source              
destination
 2707  161K ppp0_masq  all  --  *      ppp0    0.0.0.0/0            0.0.0.0/0

Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source              
destination

Chain ppp0_masq (1 references)
 pkts bytes target     prot opt in     out     source              
destination
  829 39802 MASQUERADE  all  --  *      *       192.168.1.0/24      
0.0.0.0/0

Mangle Table

Chain PREROUTING (policy ACCEPT 28143 packets, 12M bytes)
 pkts bytes target     prot opt in     out     source              
destination
28139   12M pretos     all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain INPUT (policy ACCEPT 6576 packets, 1206K bytes)
 pkts bytes target     prot opt in     out     source              
destination

Chain FORWARD (policy ACCEPT 21470 packets, 11M bytes)
 pkts bytes target     prot opt in     out     source              
destination

Chain OUTPUT (policy ACCEPT 2297 packets, 214K bytes)
 pkts bytes target     prot opt in     out     source              
destination
 2293  214K outtos     all  --  *      *       0.0.0.0/0            0.0.0.0/0

Chain POSTROUTING (policy ACCEPT 23762 packets, 11M bytes)
 pkts bytes target     prot opt in     out     source              
destination

Chain outtos (1 references)
 pkts bytes target     prot opt in     out     source              
destination
    0     0 TOS        tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0           tcp dpt:22 TOS set 0x10
    0     0 TOS        tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0           tcp spt:22 TOS set 0x10
    0     0 TOS        tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0           tcp dpt:21 TOS set 0x10
    0     0 TOS        tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0           tcp spt:21 TOS set 0x10
    0     0 TOS        tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0           tcp spt:20 TOS set 0x08
    0     0 TOS        tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0           tcp dpt:20 TOS set 0x08

Chain pretos (1 references)
 pkts bytes target     prot opt in     out     source              
destination
    0     0 TOS        tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0           tcp dpt:22 TOS set 0x10
    0     0 TOS        tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0           tcp spt:22 TOS set 0x10
    0     0 TOS        tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0           tcp dpt:21 TOS set 0x10
    0     0 TOS        tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0           tcp spt:21 TOS set 0x10
    0     0 TOS        tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0           tcp spt:20 TOS set 0x08
    0     0 TOS        tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0           tcp dpt:20 TOS set 0x08

tcp      6 414758 ESTABLISHED src=192.168.1.2 dst=205.188.8.32 sport=1360
dport=5190 [UNREPLIED] src=205.188.8.32 dst=68.164.34.57 sport=5190
dport=1360 use=1
tcp      6 414819 ESTABLISHED src=192.168.1.2 dst=64.12.29.198 sport=1362
dport=5190 [UNREPLIED] src=64.12.29.198 dst=68.164.34.57 sport=5190
dport=1362 use=1






-------------------------------------------------------
This SF.Net email sponsored by Black Hat Briefings & Training.
Attend Black Hat Briefings & Training, Las Vegas July 24-29 - 
digital self defense, top technical experts, no vendor pitches, 
unmatched networking opportunities. Visit www.blackhat.com
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html

Reply via email to