Problem: Bering-uClibc_2.1.3 stops after several hours. I have been using the Dachstein contributed pppoe version by Kenneth Hadley on a home network for the past two years without any problems. The LRP is connected to three PCs running Windows XP professional via a switch. The LRP runs on a 486 with two ISA cards: eth0 uses 8390.o and ne.o; eth1 uses 3c509.o.
I decided to upgrade to Bering-uClibc_2.1.3. I have been able to get the system up and running with no error messages (crc32.0 has been added for 8390.o). I am able to monitor the status via Mozilla browser and weblet. After several hours, the firewall status turns to "error" (more than 50 denied packets). Not long after, I lose the connection to the Internet on one or more PCs, and the connection to the internal network is down on all three PCs. This afternoon, I had one PC still connected to the Internet, but was unable to see the other two PCs on the network. When I restart using the Dashstein disk, the system works fine. I have searched the old mail lists and found a report by one user that was somewhat similar and may have been due to a 3c509 driver problem using the old 3Com ISA card (there was no follow up to that message). Before I start pulling cards, I would appreciate any insight that the users of this list have into this problem. I have pasted output messages below. If other output messages are needed, I would be happy to supply them (this problem is reproducible). Thanks. * the exact name of the LEAF distribution and version you are running. Bering-uClibc_2.1.3 * the exact kernel version you are running ash# uname -a Linux firewall 2.4.24 #3 Sun Feb 22 19:25:40 CET 2004 i486 unknown cp /var/log/messages /mnt/messages.txt Jul 10 10:52:07 firewall syslogd 1.4.1: restart. Jul 10 10:52:07 firewall kernel: klogd 1.4.1, log source = /proc/kmsg started. Jul 10 10:52:07 firewall kernel: No module symbols loaded. Jul 10 10:52:07 firewall kernel: BIOS-provided physical RAM map: Jul 10 10:52:07 firewall kernel: 16MB LOWMEM available. Jul 10 10:52:07 firewall kernel: DMI not present. Jul 10 10:52:07 firewall kernel: Initializing CPU#0 Jul 10 10:52:07 firewall kernel: Memory: 14252k/16672k available (995k kernel code, 2032k reserved, 99k data, 80k init, 0k highmem) Jul 10 10:52:07 firewall kernel: Dentry cache hash table entries: 4096 (order: 3, 32768 bytes) Jul 10 10:52:07 firewall kernel: Inode cache hash table entries: 2048 (order: 2, 16384 bytes) Jul 10 10:52:07 firewall kernel: Mount cache hash table entries: 512 (order: 0, 4096 bytes) Jul 10 10:52:07 firewall kernel: Buffer cache hash table entries: 1024 (order: 0, 4096 bytes) Jul 10 10:52:07 firewall kernel: Checking 'hlt' instruction... OK. Jul 10 10:52:07 firewall kernel: Linux NET4.0 for Linux 2.4 Jul 10 10:52:07 firewall kernel: Based upon Swansea University Computer Society NET3.039 Jul 10 10:52:07 firewall kernel: Serial driver version 5.05c (2001-07-08) with MANY_PORTS SHARE_IRQ DETECT_IRQ SERIAL_PCI enabled Jul 10 10:52:07 firewall kernel: ttyS00 at 0x03f8 (irq = 4) is a 16550A Jul 10 10:52:07 firewall kernel: ttyS01 at 0x02f8 (irq = 3) is a 16550A Jul 10 10:52:07 firewall kernel: Real Time Clock Driver v1.10e Jul 10 10:52:07 firewall kernel: Floppy drive(s): fd0 is 2.88M Jul 10 10:52:07 firewall kernel: FDC 0 is a National Semiconductor PC87306 Jul 10 10:52:07 firewall kernel: Initializing Cryptographic API Jul 10 10:52:07 firewall kernel: NET4: Linux TCP/IP 1.0 for NET4.0 Jul 10 10:52:07 firewall kernel: IP Protocols: ICMP, UDP, TCP, IGMP Jul 10 10:52:07 firewall kernel: IP: routing cache hash table of 512 buckets, 4Kbytes Jul 10 10:52:07 firewall kernel: TCP: Hash tables configured (established 1024 bind 1024) Jul 10 10:52:07 firewall kernel: NET4: Unix domain sockets 1.0/SMP for Linux NET4.0. Jul 10 10:52:07 firewall kernel: RAMDISK: Compressed image found at block 0 Jul 10 10:52:07 firewall kernel: Freeing initrd memory: 284k freed Jul 10 10:52:07 firewall kernel: Freeing unused kernel memory: 80k freed Jul 10 10:52:08 firewall kernel: ne.c:v1.10 9/23/94 Donald Becker ([EMAIL PROTECTED]) Jul 10 10:52:08 firewall kernel: Last modified Nov 1, 2000 by Paul Gortmaker Jul 10 10:52:08 firewall kernel: NE*000 ethercard probe at 0x300: 00 00 1b 4b a6 f0 Jul 10 10:52:08 firewall kernel: 3c509.c:1.19 16Oct2002 [EMAIL PROTECTED] Jul 10 10:52:08 firewall kernel: http://www.scyld.com/network/3c509.html Jul 10 10:52:08 firewall kernel: CSLIP: code copyright 1989 Regents of the University of California Jul 10 10:52:08 firewall kernel: N_HDLC line discipline registered. Jul 10 10:52:08 firewall kernel: PPP generic driver version 2.4.2 Jul 10 10:52:09 firewall kernel: Software Watchdog Timer: 0.05, timer margin: 60 sec Jul 10 10:52:29 firewall root: Shorewall Started Jul 10 14:52:07 firewall -- MARK -- * the complete, exact output of ash# ip addr show 1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo 2: dummy0: <BROADCAST,NOARP> mtu 1500 qdisc noop link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 3: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:00:1b:4b:a6:f0 brd ff:ff:ff:ff:ff:ff 4: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:a0:24:8d:b3:de brd ff:ff:ff:ff:ff:ff inet 192.168.1.254/24 brd 192.168.1.255 scope global eth1 5: ppp0: <POINTOPOINT,MULTICAST,NOARP,UP> mtu 1492 qdisc pfifo_fast qlen 3 link/ppp inet 68.164.34.57 peer 172.31.255.251/32 scope global ppp0 * the complete, exact output of ash# ip route show 172.31.255.251 dev ppp0 proto kernel scope link src 68.164.34.57 192.168.1.0/24 dev eth1 proto kernel scope link src 192.168.1.254 default via 172.31.255.251 dev ppp0 * the exact wording of any ping failure responses, including the ping command itself (there are some FAQ entries to help you). Depending on the specific problem, include some or all of: * the exact output of the command below is typically useful for NIC-related problems. ash# lsmod Module Size Used by Not tainted softdog 1508 1 ip_nat_irc 2128 0 (unused) ip_nat_ftp 2736 0 (unused) ip_conntrack_irc 2864 1 ip_conntrack_ftp 3472 1 pppoe 6732 1 pppox 924 1 [pppoe] ppp_synctty 4632 0 (unused) ppp_generic 16204 3 [pppoe pppox ppp_synctty] n_hdlc 5792 0 (unused) slhc 4296 0 [ppp_generic] 3c509 8240 1 ne 6148 1 8390 5784 0 [ne] crc32 2648 0 [8390] * the exact output of the commands below is typically useful for firewall-related problems. ash# /sbin/shorewall status [H [JShorewall-1.4.10e Status at firewall - Wed Jul 10 15:39:58 UTC 1996 Counters reset Wed Jul 10 10:52:29 UTC 1996 Chain INPUT (policy DROP 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0 0 0 DROP !icmp -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID 2926 645K ppp0_in all -- ppp0 * 0.0.0.0/0 0.0.0.0/0 3649 561K eth1_in all -- eth1 * 0.0.0.0/0 0.0.0.0/0 0 0 common all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 ULOG all -- * * 0.0.0.0/0 0.0.0.0/0 ULOG copy_range 0 nlgroup 1 prefix `Shorewall:INPUT:REJECT:' queue_threshold 1 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0 Chain FORWARD (policy DROP 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 0 0 DROP !icmp -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID 1655 78928 TCPMSS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU 11658 9330K ppp0_fwd all -- ppp0 * 0.0.0.0/0 0.0.0.0/0 9812 1335K eth1_fwd all -- eth1 * 0.0.0.0/0 0.0.0.0/0 0 0 common all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 ULOG all -- * * 0.0.0.0/0 0.0.0.0/0 ULOG copy_range 0 nlgroup 1 prefix `Shorewall:FORWARD:REJECT:' queue_threshold 1 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0 Chain OUTPUT (policy DROP 4 packets, 352 bytes) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- * lo 0.0.0.0/0 0.0.0.0/0 0 0 DROP !icmp -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID 1930 126K fw2net all -- * ppp0 0.0.0.0/0 0.0.0.0/0 363 88489 fw2loc all -- * eth1 0.0.0.0/0 0.0.0.0/0 0 0 common all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 ULOG all -- * * 0.0.0.0/0 0.0.0.0/0 ULOG copy_range 0 nlgroup 1 prefix `Shorewall:OUTPUT:REJECT:' queue_threshold 1 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0 Chain all2all (3 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 3291 535K common all -- * * 0.0.0.0/0 0.0.0.0/0 1 88 ULOG all -- * * 0.0.0.0/0 0.0.0.0/0 ULOG copy_range 0 nlgroup 1 prefix `Shorewall:all2all:REJECT:' queue_threshold 1 1 88 reject all -- * * 0.0.0.0/0 0.0.0.0/0 Chain common (5 references) pkts bytes target prot opt in out source destination 1 88 icmpdef icmp -- * * 0.0.0.0/0 0.0.0.0/0 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:135 155 24906 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpts:137:139 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:445 77 3704 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:139 629 30248 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:445 213 10248 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:135 3098 497K DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:1900 40 13126 DROP all -- * * 0.0.0.0/0 255.255.255.255 0 0 DROP all -- * * 0.0.0.0/0 224.0.0.0/4 0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:113 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:53 state NEW 0 0 DROP icmp -- * * 0.0.0.0 0.0.0.0/0 0 0 DROP icmp -- * * 0.0.0.0/0 0.0.0.0 2 84 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x10/0x10 0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x04/0x04 0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x01/0x01 0 0 DROP all -- * * 0.0.0.0/0 192.168.1.255 Chain dynamic (4 references) pkts bytes target prot opt in out source destination Chain eth1_fwd (1 references) pkts bytes target prot opt in out source destination 835 40080 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0 state NEW 9812 1335K loc2net all -- * ppp0 0.0.0.0/0 0.0.0.0/0 Chain eth1_in (1 references) pkts bytes target prot opt in out source destination 3368 540K dynamic all -- * * 0.0.0.0/0 0.0.0.0/0 state NEW 3649 561K loc2fw all -- * * 0.0.0.0/0 0.0.0.0/0 Chain fw2loc (1 references) pkts bytes target prot opt in out source destination 362 88401 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 8 1 88 all2all all -- * * 0.0.0.0/0 0.0.0.0/0 Chain fw2net (1 references) pkts bytes target prot opt in out source destination 52 4048 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:53 1878 122K ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:53 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 8 0 0 all2all all -- * * 0.0.0.0/0 0.0.0.0/0 Chain icmpdef (1 references) pkts bytes target prot opt in out source destination Chain loc2fw (1 references) pkts bytes target prot opt in out source destination 281 21189 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:22 2 66 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 8 58 3753 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:53 18 864 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:80 3290 535K all2all all -- * * 0.0.0.0/0 0.0.0.0/0 Chain loc2net (1 references) pkts bytes target prot opt in out source destination 8977 1295K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 835 40080 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 Chain net2all (2 references) pkts bytes target prot opt in out source destination 11658 9330K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 1022 55444 common all -- * * 0.0.0.0/0 0.0.0.0/0 98 10926 ULOG all -- * * 0.0.0.0/0 0.0.0.0/0 ULOG copy_range 0 nlgroup 1 prefix `Shorewall:net2all:DROP:' queue_threshold 1 98 10926 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 Chain net2fw (1 references) pkts bytes target prot opt in out source destination 1854 585K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 50 3968 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 8 1022 55444 net2all all -- * * 0.0.0.0/0 0.0.0.0/0 Chain ppp0_fwd (1 references) pkts bytes target prot opt in out source destination 0 0 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0 state NEW 11658 9330K net2all all -- * eth1 0.0.0.0/0 0.0.0.0/0 Chain ppp0_in (1 references) pkts bytes target prot opt in out source destination 1072 59412 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0 state NEW 2926 645K net2fw all -- * * 0.0.0.0/0 0.0.0.0/0 Chain reject (5 references) pkts bytes target prot opt in out source destination 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 PKTTYPE = broadcast 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 PKTTYPE = multicast 0 0 DROP all -- * * 192.168.1.255 0.0.0.0/0 0 0 DROP all -- * * 255.255.255.255 0.0.0.0/0 0 0 DROP all -- * * 224.0.0.0/4 0.0.0.0/0 0 0 REJECT tcp -- * * 0.0.0.0/0 0.0.0.0/0 reject-with tcp-reset 0 0 REJECT udp -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable 1 88 REJECT icmp -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-unreachable 0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited Chain shorewall (0 references) pkts bytes target prot opt in out source destination Jul 10 14:17:45 net2all:DROP: IN=ppp0 OUT= SRC=68.164.62.237 DST=68.164.34.57 LEN=48 TOS=00 PREC=0x00 TTL=120 ID=17807 DF PROTO=TCP SPT=1025 DPT=80 SEQ=1052818679 ACK=0 WINDOW=16384 SYN URGP=0 Jul 10 14:17:45 net2all:DROP: IN=ppp0 OUT= SRC=68.164.62.237 DST=68.164.34.57 LEN=48 TOS=00 PREC=0x00 TTL=120 ID=17808 DF PROTO=TCP SPT=4986 DPT=3127 SEQ=1052648977 ACK=0 WINDOW=16384 SYN URGP=0 Jul 10 14:17:45 net2all:DROP: IN=ppp0 OUT= SRC=68.164.62.237 DST=68.164.34.57 LEN=48 TOS=00 PREC=0x00 TTL=120 ID=17809 DF PROTO=TCP SPT=4992 DPT=6129 SEQ=1052701136 ACK=0 WINDOW=16384 SYN URGP=0 Jul 10 14:17:51 net2all:DROP: IN=ppp0 OUT= SRC=68.164.62.237 DST=68.164.34.57 LEN=48 TOS=00 PREC=0x00 TTL=120 ID=19569 DF PROTO=TCP SPT=4978 DPT=1025 SEQ=1052541195 ACK=0 WINDOW=16384 SYN URGP=0 Jul 10 14:39:45 net2all:DROP: IN=ppp0 OUT= SRC=212.113.164.103 DST=68.164.34.57 LEN=48 TOS=00 PREC=0x00 TTL=56 ID=61392 CE PROTO=TCP SPT=13721 DPT=80 SEQ=4129849008 ACK=0 WINDOW=5840 SYN URGP=0 Jul 10 14:39:48 net2all:DROP: IN=ppp0 OUT= SRC=212.113.164.103 DST=68.164.34.57 LEN=48 TOS=00 PREC=0x00 TTL=56 ID=61393 CE PROTO=TCP SPT=13721 DPT=80 SEQ=4129849008 ACK=0 WINDOW=5840 SYN URGP=0 Jul 10 14:39:54 net2all:DROP: IN=ppp0 OUT= SRC=212.113.164.103 DST=68.164.34.57 LEN=48 TOS=00 PREC=0x00 TTL=56 ID=61394 CE PROTO=TCP SPT=13721 DPT=80 SEQ=4129849008 ACK=0 WINDOW=5840 SYN URGP=0 Jul 10 14:40:06 net2all:DROP: IN=ppp0 OUT= SRC=212.113.164.103 DST=68.164.34.57 LEN=48 TOS=00 PREC=0x00 TTL=56 ID=61395 CE PROTO=TCP SPT=13721 DPT=80 SEQ=4129849008 ACK=0 WINDOW=5840 SYN URGP=0 Jul 10 14:40:30 net2all:DROP: IN=ppp0 OUT= SRC=212.113.164.103 DST=68.164.34.57 LEN=48 TOS=00 PREC=0x00 TTL=56 ID=61396 CE PROTO=TCP SPT=13721 DPT=80 SEQ=4129849008 ACK=0 WINDOW=5840 SYN URGP=0 Jul 10 14:41:18 net2all:DROP: IN=ppp0 OUT= SRC=212.113.164.103 DST=68.164.34.57 LEN=48 TOS=00 PREC=0x00 TTL=56 ID=61397 CE PROTO=TCP SPT=13721 DPT=80 SEQ=4129849008 ACK=0 WINDOW=5840 SYN URGP=0 Jul 10 14:42:29 net2all:DROP: IN=ppp0 OUT= SRC=24.84.94.177 DST=68.164.34.57 LEN=48 TOS=00 PREC=0x00 TTL=118 ID=44139 CE DF PROTO=TCP SPT=1692 DPT=4899 SEQ=1583867964 ACK=0 WINDOW=64240 SYN URGP=0 Jul 10 14:43:28 net2all:DROP: IN=ppp0 OUT= SRC=207.218.56.120 DST=68.164.34.57 LEN=836 TOS=00 PREC=0x00 TTL=119 ID=31312 PROTO=UDP SPT=17982 DPT=1026 LEN=816 Jul 10 14:43:29 net2all:DROP: IN=ppp0 OUT= SRC=207.14.70.120 DST=68.164.34.57 LEN=836 TOS=00 PREC=0x00 TTL=119 ID=28242 PROTO=UDP SPT=13124 DPT=1027 LEN=816 Jul 10 14:50:56 net2all:DROP: IN=ppp0 OUT= SRC=63.127.192.148 DST=68.164.34.57 LEN=605 TOS=00 PREC=0x00 TTL=115 ID=39408 CE PROTO=UDP SPT=8135 DPT=1026 LEN=585 Jul 10 14:53:43 net2all:DROP: IN=ppp0 OUT= SRC=200.171.144.85 DST=68.164.34.57 LEN=48 TOS=00 PREC=0x00 TTL=112 ID=6166 DF PROTO=TCP SPT=3224 DPT=25 SEQ=1055829894 ACK=0 WINDOW=16384 SYN URGP=0 Jul 10 14:53:46 net2all:DROP: IN=ppp0 OUT= SRC=200.171.144.85 DST=68.164.34.57 LEN=48 TOS=00 PREC=0x00 TTL=112 ID=6287 DF PROTO=TCP SPT=3224 DPT=25 SEQ=1055829894 ACK=0 WINDOW=16384 SYN URGP=0 Jul 10 15:06:33 net2all:DROP: IN=ppp0 OUT= SRC=68.164.69.226 DST=68.164.34.57 LEN=48 TOS=00 PREC=0x00 TTL=119 ID=30357 DF PROTO=TCP SPT=1435 DPT=5000 SEQ=866378558 ACK=0 WINDOW=64800 SYN URGP=0 Jul 10 15:36:02 net2all:DROP: IN=ppp0 OUT= SRC=211.161.39.129 DST=68.164.34.57 LEN=48 TOS=00 PREC=0x00 TTL=108 ID=1878 DF PROTO=TCP SPT=3793 DPT=1025 SEQ=541056394 ACK=0 WINDOW=64240 SYN URGP=0 Jul 10 15:36:05 net2all:DROP: IN=ppp0 OUT= SRC=211.161.39.129 DST=68.164.34.57 LEN=48 TOS=00 PREC=0x00 TTL=108 ID=2634 DF PROTO=TCP SPT=3793 DPT=1025 SEQ=541056394 ACK=0 WINDOW=64240 SYN URGP=0 Jul 10 15:36:11 net2all:DROP: IN=ppp0 OUT= SRC=211.161.39.129 DST=68.164.34.57 LEN=48 TOS=00 PREC=0x00 TTL=108 ID=3397 DF PROTO=TCP SPT=3793 DPT=1025 SEQ=541056394 ACK=0 WINDOW=64240 SYN URGP=0 NAT Table Chain PREROUTING (policy ACCEPT 5347 packets, 650K bytes) pkts bytes target prot opt in out source destination Chain POSTROUTING (policy ACCEPT 1878 packets, 122K bytes) pkts bytes target prot opt in out source destination 2707 161K ppp0_masq all -- * ppp0 0.0.0.0/0 0.0.0.0/0 Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) pkts bytes target prot opt in out source destination Chain ppp0_masq (1 references) pkts bytes target prot opt in out source destination 829 39802 MASQUERADE all -- * * 192.168.1.0/24 0.0.0.0/0 Mangle Table Chain PREROUTING (policy ACCEPT 28143 packets, 12M bytes) pkts bytes target prot opt in out source destination 28139 12M pretos all -- * * 0.0.0.0/0 0.0.0.0/0 Chain INPUT (policy ACCEPT 6576 packets, 1206K bytes) pkts bytes target prot opt in out source destination Chain FORWARD (policy ACCEPT 21470 packets, 11M bytes) pkts bytes target prot opt in out source destination Chain OUTPUT (policy ACCEPT 2297 packets, 214K bytes) pkts bytes target prot opt in out source destination 2293 214K outtos all -- * * 0.0.0.0/0 0.0.0.0/0 Chain POSTROUTING (policy ACCEPT 23762 packets, 11M bytes) pkts bytes target prot opt in out source destination Chain outtos (1 references) pkts bytes target prot opt in out source destination 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 TOS set 0x10 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:22 TOS set 0x10 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:21 TOS set 0x10 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:21 TOS set 0x10 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:20 TOS set 0x08 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:20 TOS set 0x08 Chain pretos (1 references) pkts bytes target prot opt in out source destination 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 TOS set 0x10 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:22 TOS set 0x10 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:21 TOS set 0x10 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:21 TOS set 0x10 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:20 TOS set 0x08 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:20 TOS set 0x08 tcp 6 414758 ESTABLISHED src=192.168.1.2 dst=205.188.8.32 sport=1360 dport=5190 [UNREPLIED] src=205.188.8.32 dst=68.164.34.57 sport=5190 dport=1360 use=1 tcp 6 414819 ESTABLISHED src=192.168.1.2 dst=64.12.29.198 sport=1362 dport=5190 [UNREPLIED] src=64.12.29.198 dst=68.164.34.57 sport=5190 dport=1362 use=1 ------------------------------------------------------- This SF.Net email sponsored by Black Hat Briefings & Training. Attend Black Hat Briefings & Training, Las Vegas July 24-29 - digital self defense, top technical experts, no vendor pitches, unmatched networking opportunities. Visit www.blackhat.com ------------------------------------------------------------------------ leaf-user mailing list: [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/leaf-user SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html