Problem: Bering-uClibc_2.2 connection problem
I have been using the Dachstein contributed pppoe
version by Kenneth Hadley on a home network for the
past two years without any problems. The LRP is
connected to three PCs running Windows XP
professional via a switch. The LRP runs on a 486 with
two ISA cards: eth0 uses 8390.o and ne.o; eth1 uses
3c509.o.
For several months now, I have been trying to upgrade
to Bering-uClibc using ppp and pppoe, first with 2.1.3
back in July and now and now with 2.2. My ISP is SBC
Yahoo DSL. I have the Speedstream 5100b set as a
bridge (I am not using pppoe on the modem).
I have not been able to access the the Internet. I am
able to ping lo, ppp0 and eth1. I am able to monitor
the status via Firefox browser and LRP weblet. I have
no "Masqueraded Connections". After 10 to 20 minutes,
I get a Windows XP error (Limited or no connectivity)
and can no longer access the weblet interface. The
connection setting for the Firefox browser 0.9.3 is
"Direct connection to the Internet". When I try to
connect to a web page , I get "web page could not be
found. Please check the name and try again". I get
similar results with IE5.
When I restart using the Dashstein disk, the system
works fine.
In configuring Shorewall, I was not able to set
routefilter and routestopped in the interfaces file as
described in Chapter 6 - PPPoE configuration (I got
errors at boot up when I did this). After checking
several posts on the archive and on the Sorewall
sites, I set routefilter to "Yes" in the config file
and routestopped for interface eth1 in the
routestopped file. I am not sure if this was the
correct way to deal with these configuration problems.
I keep thinking that I have made a simple mistake
along the way, but I have not been able to find it. A
not so simple mistake is also possible. Any help from
the members of the Leaf users group would be greatly
appreciated.
Below are the text outputs recommended by the "Before
You Post" page. Also below are the output messages
from the weblet interface.
Thanks.
Matt
Linux firewall 2.4.26 #1 Mon Jun 28 20:08:59 CEST 2004
i486 unknown
address.txt
1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue
link/loopback 00:00:00:00:00:00 brd
00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
2: dummy0: <BROADCAST,NOARP> mtu 1500 qdisc noop
link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff
3: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc
pfifo_fast qlen 1000
link/ether 00:00:1b:4b:a6:f0 brd ff:ff:ff:ff:ff:ff
4: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc
pfifo_fast qlen 1000
link/ether 00:a0:24:8d:b3:de brd ff:ff:ff:ff:ff:ff
inet 192.168.1.254/24 brd 192.168.1.255 scope
global eth1
5: ppp0: <POINTOPOINT,MULTICAST,NOARP,UP> mtu 1492
qdisc pfifo_fast qlen 3
link/ppp
inet 66.159.175.184 peer 204.60.4.42/32 scope
global ppp0
route.txt
204.60.4.42 dev ppp0 proto kernel scope link src
66.159.175.184
192.168.1.0/24 dev eth1 proto kernel scope link src
192.168.1.254
default via 204.60.4.42 dev ppp0
lsmod.txt
Module Size Used by Not tainted
softdog 1508 1
ipt_state 336 15
ipt_helper 464 0 (unused)
ipt_conntrack 820 0
ipt_REDIRECT 544 0 (unused)
ipt_MASQUERADE 1056 1
ip_nat_irc 2152 0 (unused)
ip_nat_ftp 2792 0 (unused)
iptable_nat 15716 3 [ipt_REDIRECT
ipt_MASQUERADE ip_nat_irc
ip_nat_ftp]
ip_conntrack_irc 2876 1
ip_conntrack_ftp 3484 1
ip_conntrack 18312 2 [ipt_state ipt_helper
ipt_conntrack
ipt_REDIRECT ipt_MASQUERADE ip_nat_irc ip_nat_ftp
iptable_nat
ip_conntrack_irc ip_conntrack_ftp]
pppoe 6732 1
pppox 924 1 [pppoe]
ppp_synctty 4632 0 (unused)
ppp_generic 16204 3 [pppoe pppox
ppp_synctty]
n_hdlc 5792 0 (unused)
slhc 4296 0 [ppp_generic]
3c509 8240 1
ne 6148 1
8390 5784 0 [ne]
crc32 2648 0 [8390]
shorwall.txt
[H[JShorewall-2.0.7 Status at firewall - Wed Sep 18
12:24:57 UTC 1996
Counters reset Wed Sep 18 12:07:32 UTC 1996
Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- lo *
0.0.0.0/0 0.0.0.0/0
0 0 DROP !icmp -- * *
0.0.0.0/0
0.0.0.0/0 state INVALID
8 320 ppp0_in all -- ppp0 *
0.0.0.0/0 0.0.0.0/0
45 11950 eth1_in all -- eth1 *
0.0.0.0/0 0.0.0.0/0
0 0 Reject all -- * *
0.0.0.0/0 0.0.0.0/0
0 0 ULOG all -- * *
0.0.0.0/0
0.0.0.0/0 ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:INPUT:REJECT:' queue_threshold 1
0 0 reject all -- * *
0.0.0.0/0 0.0.0.0/0
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
0 0 DROP !icmp -- * *
0.0.0.0/0
0.0.0.0/0 state INVALID
0 0 TCPMSS tcp -- * *
0.0.0.0/0
0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS clamp
to PMTU
0 0 ppp0_fwd all -- ppp0 *
0.0.0.0/0 0.0.0.0/0
0 0 eth1_fwd all -- eth1 *
0.0.0.0/0 0.0.0.0/0
0 0 Reject all -- * *
0.0.0.0/0 0.0.0.0/0
0 0 ULOG all -- * *
0.0.0.0/0
0.0.0.0/0 ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:FORWARD:REJECT:' queue_threshold 1
0 0 reject all -- * *
0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * lo
0.0.0.0/0 0.0.0.0/0
0 0 DROP !icmp -- * *
0.0.0.0/0
0.0.0.0/0 state INVALID
0 0 fw2net all -- * ppp0
0.0.0.0/0 0.0.0.0/0
10 730 fw2loc all -- * eth1
0.0.0.0/0 0.0.0.0/0
0 0 Reject all -- * *
0.0.0.0/0 0.0.0.0/0
0 0 ULOG all -- * *
0.0.0.0/0
0.0.0.0/0 ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:OUTPUT:REJECT:' queue_threshold 1
0 0 reject all -- * *
0.0.0.0/0 0.0.0.0/0
Chain Drop (1 references)
pkts bytes target prot opt in out source
destination
8 320 RejectAuth all -- * *
0.0.0.0/0
0.0.0.0/0
8 320 dropBcast all -- * *
0.0.0.0/0 0.0.0.0/0
8 320 dropInvalid all -- * *
0.0.0.0/0
0.0.0.0/0
8 320 DropSMB all -- * *
0.0.0.0/0 0.0.0.0/0
8 320 DropUPnP all -- * *
0.0.0.0/0 0.0.0.0/0
8 320 dropNotSyn all -- * *
0.0.0.0/0
0.0.0.0/0
0 0 DropDNSrep all -- * *
0.0.0.0/0
0.0.0.0/0
Chain DropDNSrep (2 references)
pkts bytes target prot opt in out source
destination
0 0 DROP udp -- * *
0.0.0.0/0
0.0.0.0/0 udp spt:53
Chain DropSMB (1 references)
pkts bytes target prot opt in out source
destination
0 0 DROP udp -- * *
0.0.0.0/0
0.0.0.0/0 udp dpt:135
0 0 DROP udp -- * *
0.0.0.0/0
0.0.0.0/0 udp dpts:137:139
0 0 DROP udp -- * *
0.0.0.0/0
0.0.0.0/0 udp dpt:445
0 0 DROP tcp -- * *
0.0.0.0/0
0.0.0.0/0 tcp dpt:135
0 0 DROP tcp -- * *
0.0.0.0/0
0.0.0.0/0 tcp dpt:139
0 0 DROP tcp -- * *
0.0.0.0/0
0.0.0.0/0 tcp dpt:445
Chain DropUPnP (2 references)
pkts bytes target prot opt in out source
destination
0 0 DROP udp -- * *
0.0.0.0/0
0.0.0.0/0 udp dpt:1900
Chain Reject (4 references)
pkts bytes target prot opt in out source
destination
3 724 RejectAuth all -- * *
0.0.0.0/0
0.0.0.0/0
3 724 dropBcast all -- * *
0.0.0.0/0 0.0.0.0/0
0 0 dropInvalid all -- * *
0.0.0.0/0
0.0.0.0/0
0 0 RejectSMB all -- * *
0.0.0.0/0 0.0.0.0/0
0 0 DropUPnP all -- * *
0.0.0.0/0 0.0.0.0/0
0 0 dropNotSyn all -- * *
0.0.0.0/0
0.0.0.0/0
0 0 DropDNSrep all -- * *
0.0.0.0/0
0.0.0.0/0
Chain RejectAuth (2 references)
pkts bytes target prot opt in out source
destination
0 0 reject tcp -- * *
0.0.0.0/0
0.0.0.0/0 tcp dpt:113
Chain RejectSMB (1 references)
pkts bytes target prot opt in out source
destination
0 0 reject udp -- * *
0.0.0.0/0
0.0.0.0/0 udp dpt:135
0 0 reject udp -- * *
0.0.0.0/0
0.0.0.0/0 udp dpts:137:139
0 0 reject udp -- * *
0.0.0.0/0
0.0.0.0/0 udp dpt:445
0 0 reject tcp -- * *
0.0.0.0/0
0.0.0.0/0 tcp dpt:135
0 0 reject tcp -- * *
0.0.0.0/0
0.0.0.0/0 tcp dpt:139
0 0 reject tcp -- * *
0.0.0.0/0
0.0.0.0/0 tcp dpt:445
Chain all2all (3 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * *
0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
3 724 Reject all -- * *
0.0.0.0/0 0.0.0.0/0
0 0 ULOG all -- * *
0.0.0.0/0
0.0.0.0/0 ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:all2all:REJECT:' queue_threshold 1
0 0 reject all -- * *
0.0.0.0/0 0.0.0.0/0
Chain dropBcast (2 references)
pkts bytes target prot opt in out source
destination
3 724 DROP all -- * *
0.0.0.0/0
0.0.0.0/0 PKTTYPE = broadcast
0 0 DROP all -- * *
0.0.0.0/0
0.0.0.0/0 PKTTYPE = multicast
Chain dropInvalid (2 references)
pkts bytes target prot opt in out source
destination
0 0 DROP all -- * *
0.0.0.0/0
0.0.0.0/0 state INVALID
Chain dropNotSyn (2 references)
pkts bytes target prot opt in out source
destination
8 320 DROP tcp -- * *
0.0.0.0/0
0.0.0.0/0 tcp flags:!0x16/0x02
Chain dynamic (4 references)
pkts bytes target prot opt in out source
destination
Chain eth1_fwd (1 references)
pkts bytes target prot opt in out source
destination
0 0 dynamic all -- * *
0.0.0.0/0
0.0.0.0/0 state INVALID,NEW
0 0 loc2net all -- * ppp0
0.0.0.0/0 0.0.0.0/0
Chain eth1_in (1 references)
pkts bytes target prot opt in out source
destination
40 11545 dynamic all -- * *
0.0.0.0/0
0.0.0.0/0 state INVALID,NEW
45 11950 loc2fw all -- * *
0.0.0.0/0 0.0.0.0/0
Chain fw2loc (1 references)
pkts bytes target prot opt in out source
destination
10 730 ACCEPT all -- * *
0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
0 0 ACCEPT icmp -- * *
0.0.0.0/0
0.0.0.0/0 icmp type 8
0 0 all2all all -- * *
0.0.0.0/0 0.0.0.0/0
Chain fw2net (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * *
0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
0 0 ACCEPT tcp -- * *
0.0.0.0/0
0.0.0.0/0 tcp dpt:53
0 0 ACCEPT udp -- * *
0.0.0.0/0
0.0.0.0/0 udp dpt:53
0 0 ACCEPT icmp -- * *
0.0.0.0/0
0.0.0.0/0 icmp type 8
0 0 all2all all -- * *
0.0.0.0/0 0.0.0.0/0
Chain icmpdef (0 references)
pkts bytes target prot opt in out source
destination
Chain loc2fw (1 references)
pkts bytes target prot opt in out source
destination
5 405 ACCEPT all -- * *
0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
0 0 ACCEPT tcp -- * *
0.0.0.0/0
0.0.0.0/0 tcp dpt:22
0 0 ACCEPT icmp -- * *
0.0.0.0/0
0.0.0.0/0 icmp type 8
5 325 ACCEPT udp -- * *
0.0.0.0/0
0.0.0.0/0 udp dpt:53
0 0 ACCEPT tcp -- * *
0.0.0.0/0
0.0.0.0/0 tcp dpt:80
32 10496 ACCEPT udp -- * *
0.0.0.0/0
0.0.0.0/0 multiport dports 67,68
3 724 all2all all -- * *
0.0.0.0/0 0.0.0.0/0
Chain loc2net (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * *
0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
0 0 ACCEPT all -- * *
0.0.0.0/0 0.0.0.0/0
Chain net2all (2 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * *
0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
8 320 Drop all -- * *
0.0.0.0/0 0.0.0.0/0
0 0 ULOG all -- * *
0.0.0.0/0
0.0.0.0/0 ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:net2all:DROP:' queue_threshold 1
0 0 DROP all -- * *
0.0.0.0/0 0.0.0.0/0
Chain net2fw (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * *
0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
0 0 ACCEPT icmp -- * *
0.0.0.0/0
0.0.0.0/0 icmp type 8
8 320 net2all all -- * *
0.0.0.0/0 0.0.0.0/0
Chain ppp0_fwd (1 references)
pkts bytes target prot opt in out source
destination
0 0 dynamic all -- * *
0.0.0.0/0
0.0.0.0/0 state INVALID,NEW
0 0 net2all all -- * eth1
0.0.0.0/0 0.0.0.0/0
Chain ppp0_in (1 references)
pkts bytes target prot opt in out source
destination
8 320 dynamic all -- * *
0.0.0.0/0
0.0.0.0/0 state INVALID,NEW
8 320 net2fw all -- * *
0.0.0.0/0 0.0.0.0/0
Chain reject (11 references)
pkts bytes target prot opt in out source
destination
0 0 DROP all -- * *
0.0.0.0/0
0.0.0.0/0 PKTTYPE = broadcast
0 0 DROP all -- * *
0.0.0.0/0
0.0.0.0/0 PKTTYPE = multicast
0 0 DROP all -- * *
192.168.1.255 0.0.0.0/0
0 0 DROP all -- * *
255.255.255.255 0.0.0.0/0
0 0 DROP all -- * *
224.0.0.0/4 0.0.0.0/0
0 0 REJECT tcp -- * *
0.0.0.0/0
0.0.0.0/0 reject-with tcp-reset
0 0 REJECT udp -- * *
0.0.0.0/0
0.0.0.0/0 reject-with icmp-port-unreachable
0 0 REJECT icmp -- * *
0.0.0.0/0
0.0.0.0/0 reject-with icmp-host-unreachable
0 0 REJECT all -- * *
0.0.0.0/0
0.0.0.0/0 reject-with icmp-host-prohibited
Chain shorewall (0 references)
pkts bytes target prot opt in out source
destination
Chain smurfs (0 references)
pkts bytes target prot opt in out source
destination
0 0 ULOG all -- * *
192.168.1.255
0.0.0.0/0 ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:smurfs:DROP:' queue_threshold 1
0 0 DROP all -- * *
192.168.1.255 0.0.0.0/0
0 0 ULOG all -- * *
255.255.255.255
0.0.0.0/0 ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:smurfs:DROP:' queue_threshold 1
0 0 DROP all -- * *
255.255.255.255 0.0.0.0/0
0 0 ULOG all -- * *
224.0.0.0/4
0.0.0.0/0 ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:smurfs:DROP:' queue_threshold 1
0 0 DROP all -- * *
224.0.0.0/4 0.0.0.0/0
NAT Table
Chain PREROUTING (policy ACCEPT 82 packets, 11818
bytes)
pkts bytes target prot opt in out source
destination
Chain POSTROUTING (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
0 0 ppp0_masq all -- * ppp0
0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
Chain ppp0_masq (1 references)
pkts bytes target prot opt in out source
destination
0 0 MASQUERADE all -- * *
192.168.1.0/24
0.0.0.0/0
Mangle Table
Chain PREROUTING (policy ACCEPT 112 packets, 20176
bytes)
pkts bytes target prot opt in out source
destination
110 20030 pretos all -- * *
0.0.0.0/0 0.0.0.0/0
Chain INPUT (policy ACCEPT 55 packets, 12416 bytes)
pkts bytes target prot opt in out source
destination
Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
Chain OUTPUT (policy ACCEPT 12 packets, 876 bytes)
pkts bytes target prot opt in out source
destination
10 730 outtos all -- * *
0.0.0.0/0 0.0.0.0/0
Chain POSTROUTING (policy ACCEPT 12 packets, 876
bytes)
pkts bytes target prot opt in out source
destination
Chain outtos (1 references)
pkts bytes target prot opt in out source
destination
0 0 TOS tcp -- * *
0.0.0.0/0
0.0.0.0/0 tcp dpt:22 TOS set 0x10
0 0 TOS tcp -- * *
0.0.0.0/0
0.0.0.0/0 tcp spt:22 TOS set 0x10
0 0 TOS tcp -- * *
0.0.0.0/0
0.0.0.0/0 tcp dpt:21 TOS set 0x10
0 0 TOS tcp -- * *
0.0.0.0/0
0.0.0.0/0 tcp spt:21 TOS set 0x10
0 0 TOS tcp -- * *
0.0.0.0/0
0.0.0.0/0 tcp spt:20 TOS set 0x08
0 0 TOS tcp -- * *
0.0.0.0/0
0.0.0.0/0 tcp dpt:20 TOS set 0x08
Chain pretos (1 references)
pkts bytes target prot opt in out source
destination
0 0 TOS tcp -- * *
0.0.0.0/0
0.0.0.0/0 tcp dpt:22 TOS set 0x10
0 0 TOS tcp -- * *
0.0.0.0/0
0.0.0.0/0 tcp spt:22 TOS set 0x10
0 0 TOS tcp -- * *
0.0.0.0/0
0.0.0.0/0 tcp dpt:21 TOS set 0x10
0 0 TOS tcp -- * *
0.0.0.0/0
0.0.0.0/0 tcp spt:21 TOS set 0x10
0 0 TOS tcp -- * *
0.0.0.0/0
0.0.0.0/0 tcp spt:20 TOS set 0x08
0 0 TOS tcp -- * *
0.0.0.0/0
0.0.0.0/0 tcp dpt:20 TOS set 0x08
udp 17 17 src=192.168.1.2 dst=192.168.1.254
sport=1035 dport=53
src=192.168.1.254 dst=192.168.1.2 sport=53 dport=1035
[ASSURED] use=1
IP Configuration
1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue
link/loopback 00:00:00:00:00:00 brd
00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
2: dummy0: <BROADCAST,NOARP> mtu 1500 qdisc noop
link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff
3: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc
pfifo_fast qlen 1000
link/ether 00:00:1b:4b:a6:f0 brd ff:ff:ff:ff:ff:ff
4: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc
pfifo_fast qlen 1000
link/ether 00:a0:24:8d:b3:de brd ff:ff:ff:ff:ff:ff
inet 192.168.1.254/24 brd 192.168.1.255 scope
global eth1
5: ppp0: <POINTOPOINT,MULTICAST,NOARP,UP> mtu 1492
qdisc pfifo_fast qlen 3
link/ppp
inet 66.159.175.184 peer 204.60.4.42/32 scope
global ppp0
Routing Rules
0: from all lookup local
32766: from all lookup main
32767: from all lookup default
Table local:
broadcast 192.168.1.0 dev eth1 proto kernel scope
link src 192.168.1.254
broadcast 127.255.255.255 dev lo proto kernel scope
link src 127.0.0.1
local 66.159.175.184 dev ppp0 proto kernel scope
host src 66.159.175.184
local 192.168.1.254 dev eth1 proto kernel scope host
src 192.168.1.254
broadcast 192.168.1.255 dev eth1 proto kernel scope
link src 192.168.1.254
broadcast 127.0.0.0 dev lo proto kernel scope link
src 127.0.0.1
local 127.0.0.1 dev lo proto kernel scope host src
127.0.0.1
local 127.0.0.0/8 dev lo proto kernel scope host
src 127.0.0.1
Table main:
204.60.4.42 dev ppp0 proto kernel scope link src
66.159.175.184
192.168.1.0/24 dev eth1 proto kernel scope link src
192.168.1.254
default via 204.60.4.42 dev ppp0
Table default:
iptables.txt
Chain PREROUTING (policy ACCEPT 86 packets, 12291
bytes)
pkts bytes target prot opt in out source
destination
Chain POSTROUTING (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
0 0 ppp0_masq all -- * ppp0
0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
Chain ppp0_masq (1 references)
pkts bytes target prot opt in out source
destination
0 0 MASQUERADE all -- * *
192.168.1.0/24
0.0.0.0/0
The following messages are cut and pasted from the
weblet interface:
::Masqueraded Connections::
::Other Connections::
tcp src=192.168.1.1 1062 dst=192.168.1.254 80 --431998
sec. ESTABLISHED
tcp src=192.168.1.1 1060 dst=192.168.1.254 80 --0 sec.
TIME_WAIT
tcp src=192.168.1.1 1059 dst=192.168.1.254 80 --0 sec.
TIME_WAIT
udp src=192.168.1.2 1035 dst=192.168.1.254 53 --154
sec.
tcp src=192.168.1.1 1061 dst=192.168.1.254 80 --115
sec. TIME_WAIT
udp src=192.168.1.1 1027 dst=192.168.1.254 53 --131
sec.
::Interfaces::
1: lo: mtu 16436 qdisc noqueue
link/loopback 00:00:00:00:00:00 brd
00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
2: dummy0: mtu 1500 qdisc noop
link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff
3: eth0: mtu 1500 qdisc pfifo_fast qlen 1000
link/ether 00:00:1b:4b:a6:f0 brd ff:ff:ff:ff:ff:ff
4: eth1: mtu 1500 qdisc pfifo_fast qlen 1000
link/ether 00:a0:24:8d:b3:de brd ff:ff:ff:ff:ff:ff
inet 192.168.1.254/24 brd 192.168.1.255 scope
global eth1
5: ppp0: mtu 1492 qdisc pfifo_fast qlen 3
link/ppp
inet 69.0.45.229 peer 204.60.4.42/32 scope global
ppp0
::Routes::
204.60.4.42 dev ppp0 proto kernel scope link src
69.0.45.229
192.168.1.0/24 dev eth1 proto kernel scope link src
192.168.1.254
default via 204.60.4.42 dev ppp0
::Statistics::
1: lo: mtu 16436 qdisc noqueue
link/loopback 00:00:00:00:00:00 brd
00:00:00:00:00:00
RX: bytes packets errors dropped overrun mcast
13272 158 0 0 0 0
TX: bytes packets errors dropped carrier
collsns
13272 158 0 0 0 0
2: dummy0: mtu 1500 qdisc noop
link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff
RX: bytes packets errors dropped overrun mcast
0 0 0 0 0 0
TX: bytes packets errors dropped carrier
collsns
0 0 0 0 0 0
3: eth0: mtu 1500 qdisc pfifo_fast qlen 1000
link/ether 00:00:1b:4b:a6:f0 brd ff:ff:ff:ff:ff:ff
RX: bytes packets errors dropped overrun mcast
14443 194 0 0 0 0
TX: bytes packets errors dropped carrier
collsns
9668 159 0 0 0 0
4: eth1: mtu 1500 qdisc pfifo_fast qlen 1000
link/ether 00:a0:24:8d:b3:de brd ff:ff:ff:ff:ff:ff
RX: bytes packets errors dropped overrun mcast
51614 362 0 0 0 0
TX: bytes packets errors dropped carrier
collsns
40675 201 0 0 0 0
5: ppp0: mtu 1492 qdisc pfifo_fast qlen 3
link/ppp
RX: bytes packets errors dropped overrun mcast
4391 42 0 0 0 0
TX: bytes packets errors dropped carrier
collsns
410 9 0 0 0 0
::General System Info::
Uptime: 11:41:13 up 51 min, load average: 0.00, 0.02,
0.00
Kernel:Linux firewall 2.4.26 #1 Mon Jun 28 20:08:59
CEST 2004 i486 unknown
Modules:
softdog 1508 1
ipt_state 336 15
ipt_helper 464 0 (unused)
ipt_conntrack 820 0
ipt_REDIRECT 544 0 (unused)
ipt_MASQUERADE 1056 1
ip_nat_irc 2152 0 (unused)
ip_nat_ftp 2792 0 (unused)
iptable_nat 15716 3 [ipt_REDIRECT
ipt_MASQUERADE ip_nat_irc
ip_nat_ftp]
ip_conntrack_irc 2876 1
ip_conntrack_ftp 3484 1
ip_conntrack 18312 2 [ipt_state ipt_helper
ipt_conntrack
ipt_REDIRECT ipt_MASQUERADE ip_nat_irc ip_nat_ftp
iptable_nat
ip_conntrack_irc ip_conntrack_ftp]
pppoe 6732 1
pppox 924 1 [pppoe]
ppp_synctty 4632 0 (unused)
ppp_generic 16204 3 [pppoe pppox
ppp_synctty]
n_hdlc 5792 0 (unused)
slhc 4296 0 [ppp_generic]
3c509 8240 1
ne 6148 1
8390 5784 0 [ne]
crc32 2648 0 [8390]
::Installed Packages::
Name Version Description
===============-==============-==============================================
initrd V2.2.0 uClibc- LEAF Bering-uClibc
initial filesystem
root V2.2.0 uClibc- Core LEAF Bering-uClibc
package
config 0.4 Core config and backup
system package
etc V2.2.0 uClibc-
local V2.2.0 uClibc- LEAF Bering local
package
modules V2.2.0 uClibc- Define & contain your
LEAF Bering modules
iptables 1.2.11 IP packet filter
administration tools for 2.4.
ppp 2.4.2-1 Point-to-Point Protocol
(PPP) daemon, ipv6 ena
pppoe 3.5-1 rp-pppoe plugin for
pppd
shorwall
ulogd 1.02 The Netfilter Userspace
Logging Daemon
dnsmasq 2.13 Rev 1 Dnsmasq is lightweight,
easy to configure DNS
sh-httpd 1.2.5 Rev 2 Small shell-based web
server
weblet 1.0.0 Rev 3 http-server content
::CPU Info::
processor : 0
vendor_id : GenuineIntel
cpu family : 4
model : 3
model name : 486 DX/2
stepping : 5
fdiv_bug : no
hlt_bug : no
f00f_bug : no
coma_bug : no
fpu : yes
fpu_exception : yes
cpuid level : 1
wp : yes
flags : fpu vme
bogomips : 33.28
::Running Processes::
PID Uid VmSize Stat Command
1 root 256 S init [2]
2 root SW [keventd]
3 root SWN [ksoftirqd_CPU0]
4 root SW [kswapd]
5 root SW [bdflush]
6 root SW [kupdated]
12573 root 284 S /sbin/syslogd -m 240
1009 root 244 S /sbin/klogd
2738 root 528 S /usr/sbin/pppd call
dsl-provider eth0
12934 root 144 S /usr/sbin/watchdog
18567 nobody 324 S /usr/sbin/dnsmasq
3442 root 284 S /usr/sbin/inetd
264 root 296 S /usr/sbin/ulogd -d
26935 root 284 S /usr/sbin/cron
1060 root 292 S -sh
1540 root 288 S /sbin/getty 38400 tty2
12745 root 288 S /bin/sh /usr/sbin/lrcfg
11363 sh-httpd 332 S /bin/sh /usr/sbin/sh-httpd
16503 sh-httpd 288 S /bin/sh
/var/sh-www/cgi-bin/viewsys
4131 sh-httpd 192 S sleep 1
18035 sh-httpd 288 S /bin/sh
/var/sh-www/cgi-bin/viewsys
14215 sh-httpd 240 S /bin/cat
12881 sh-httpd 292 R ps aux
::messages::
Sep 18 10:50:58 firewall syslogd 1.4.1: restart.
Sep 18 10:50:59 firewall kernel: klogd 1.4.1, log
source = /proc/kmsg
started.
Sep 18 10:50:59 firewall kernel: No module symbols
loaded.
Sep 18 10:50:59 firewall kernel: BIOS-provided
physical RAM map:
Sep 18 10:50:59 firewall kernel: 16MB LOWMEM
available.
Sep 18 10:50:59 firewall kernel: DMI not present.
Sep 18 10:50:59 firewall kernel: Initializing CPU#0
Sep 18 10:50:59 firewall kernel: Memory: 14280k/16672k
available (973k
kernel code, 2004k reserved, 111k data, 64k init, 0k
highmem)
Sep 18 10:50:59 firewall kernel: Dentry cache hash
table entries: 4096
(order: 3, 32768 bytes)
Sep 18 10:50:59 firewall kernel: Inode cache hash
table entries: 2048
(order: 2, 16384 bytes)
Sep 18 10:50:59 firewall kernel: Mount cache hash
table entries: 512
(order: 0, 4096 bytes)
Sep 18 10:50:59 firewall kernel: Buffer cache hash
table entries: 1024
(order: 0, 4096 bytes)
Sep 18 10:50:59 firewall kernel: Checking 'hlt'
instruction... OK.
Sep 18 10:50:59 firewall kernel: Linux NET4.0 for
Linux 2.4
Sep 18 10:50:59 firewall kernel: Based upon Swansea
University Computer
Society NET3.039
Sep 18 10:50:59 firewall kernel: Serial driver version
5.05c (2001-07-08)
with MANY_PORTS SHARE_IRQ DETECT_IRQ SERIAL_PCI
enabled
Sep 18 10:50:59 firewall kernel: ttyS00 at 0x03f8 (irq
= 4) is a 16550A
Sep 18 10:50:59 firewall kernel: ttyS01 at 0x02f8 (irq
= 3) is a 16550A
Sep 18 10:50:59 firewall kernel: Real Time Clock
Driver v1.10f
Sep 18 10:50:59 firewall kernel: Floppy drive(s): fd0
is 2.88M
Sep 18 10:50:59 firewall kernel: FDC 0 is a National
Semiconductor PC87306
Sep 18 10:50:59 firewall kernel: Initializing
Cryptographic API
Sep 18 10:50:59 firewall kernel: NET4: Linux TCP/IP
1.0 for NET4.0
Sep 18 10:50:59 firewall kernel: IP Protocols: ICMP,
UDP, TCP, IGMP
Sep 18 10:50:59 firewall kernel: IP: routing cache
hash table of 512
buckets, 4Kbytes
Sep 18 10:50:59 firewall kernel: TCP: Hash tables
configured (established
1024 bind 1024)
Sep 18 10:50:59 firewall kernel: NET4: Unix domain
sockets 1.0/SMP for
Linux NET4.0.
Sep 18 10:50:59 firewall kernel: RAMDISK: Compressed
image found at block 0
Sep 18 10:50:59 firewall kernel: Freeing initrd
memory: 284k freed
Sep 18 10:50:59 firewall kernel: Freeing unused kernel
memory: 64k freed
Sep 18 10:50:59 firewall kernel: ne.c:v1.10 9/23/94
Donald Becker
([EMAIL PROTECTED])
Sep 18 10:50:59 firewall kernel: Last modified Nov 1,
2000 by Paul Gortmaker
Sep 18 10:50:59 firewall kernel: NE*000 ethercard
probe at 0x300: 00 00 1b
4b a6 f0
Sep 18 10:51:00 firewall kernel: 3c509.c:1.19
16Oct2002 [EMAIL PROTECTED]
Sep 18 10:51:00 firewall kernel:
http://www.scyld.com/network/3c509.html
Sep 18 10:51:00 firewall kernel: CSLIP: code copyright
1989 Regents of the
University of California
Sep 18 10:51:00 firewall kernel: N_HDLC line
discipline registered.
Sep 18 10:51:00 firewall kernel: PPP generic driver
version 2.4.2
Sep 18 10:51:03 firewall kernel: Software Watchdog
Timer: 0.05, timer
margin: 60 sec
Sep 18 10:51:33 firewall root: Shorewall Started
::syslog::
Sep 18 10:50:59 firewall kernel: Cannot find map file.
Sep 18 10:50:59 firewall kernel: Linux version 2.4.26
([EMAIL PROTECTED])
(gcc version 2.95.3 20010315 (release)) #1 Mon Jun 28
20:08:59 CEST 2004
Sep 18 10:50:59 firewall kernel: BIOS-88:
0000000000000000 -
000000000009f000 (usable)
Sep 18 10:50:59 firewall kernel: BIOS-88:
0000000000100000 -
0000000001048000 (usable)
Sep 18 10:50:59 firewall kernel: On node 0 totalpages:
4168
Sep 18 10:50:59 firewall kernel: zone(0): 4096 pages.
Sep 18 10:50:59 firewall kernel: zone(1): 72 pages.
Sep 18 10:50:59 firewall kernel: zone(2): 0 pages.
Sep 18 10:50:59 firewall kernel: Kernel command line:
BOOT_IMAGE=linux
initrd=initrd.lrp init=/linuxrc rw root=/dev/ram0
LEAFCFG=/dev/fd0u1680:msdos
Sep 18 10:50:59 firewall kernel: Console: colour VGA+
80x25
Sep 18 10:50:59 firewall kernel: Calibrating delay
loop... 33.28 BogoMIPS
Sep 18 10:50:59 firewall kernel: Checking if this
processor honours the WP
bit even in supervisor mode... Ok.
Sep 18 10:50:59 firewall kernel: Page-cache hash table
entries: 8192
(order: 3, 32768 bytes)
Sep 18 10:50:59 firewall kernel: CPU: Intel 486 DX/2
stepping 05
Sep 18 10:50:59 firewall kernel: POSIX conformance
testing by UNIFIX
Sep 18 10:50:59 firewall kernel: PCI: System does not
support PCI
Sep 18 10:50:59 firewall kernel: Initializing RT
netlink socket
Sep 18 10:50:59 firewall kernel: Starting kswapd
Sep 18 10:50:59 firewall kernel: pty: 256 Unix98 ptys
configured
Sep 18 10:50:59 firewall kernel: RAMDISK driver
initialized: 16 RAM disks
of 4096K size 1024 blocksize
Sep 18 10:50:59 firewall kernel: ip_tables: (C)
2000-2002 Netfilter core team
Sep 18 10:50:59 firewall kernel: arp_tables: (C) 2002
David S. Miller
Sep 18 10:50:59 firewall kernel: VFS: Mounted root
(minix filesystem).
Sep 18 10:50:59 firewall kernel: eth0: NE2000 found at
0x300, using IRQ 5.
Sep 18 10:51:00 firewall kernel: eth1: 3c5x9 at 0x280,
10baseT port,
address 00 a0 24 8d b3 de, IRQ 3.
Sep 18 10:51:00 firewall kernel: HDLC line discipline:
version $Revision:
3.7 $, maxframe=4096
Sep 18 10:51:01 firewall kernel: ip_conntrack version
2.1 (130 buckets,
1040 max) - 316 bytes per conntrack
Sep 18 10:51:03 firewall kernel: eth1: Setting
3c5x9/3c5x9B half-duplex
mode if_port: 0, sw_info: 8411
Sep 18 10:51:03 firewall kernel: eth1: Setting Rx mode
to 1 addresses.
::daemon.log::
Sep 18 10:51:03 firewall pppd[18678]: Plugin
/usr/lib/pppd/rp-pppoe.so
loaded.
Sep 18 10:51:03 firewall pppd[18678]: RP-PPPoE plugin
version 3.3 compiled
against pppd 2.4.2
Sep 18 10:51:03 firewall pppd[2738]: pppd 2.4.2
started by root, uid 0
Sep 18 10:51:04 firewall init: Entering runlevel: 2
Sep 18 10:51:05 firewall dnsmasq[18567]: started,
version 2.13 cachesize 150
Sep 18 10:51:05 firewall dnsmasq[18567]: read
/etc/hosts - 2 addresses
Sep 18 10:51:05 firewall dnsmasq[18567]: failed to
access
/var/lib/misc/dnsmasq.leases: No such file or
directory
Sep 18 10:51:05 firewall dnsmasq[18567]: reading
/etc/resolv.conf
Sep 18 10:51:05 firewall dnsmasq[18567]: ignoring
nameserver 192.168.1.254
- local interface
Sep 18 10:51:05 firewall dnsmasq[18567]: ignoring
nameserver 127.0.0.1 -
local interface
Sep 18 10:51:05 firewall inetd[3442]: Online and ready
(2 sockets)
Sep 18 10:51:28 firewall pppd[2738]: PPP session is
3645
Sep 18 10:51:28 firewall pppd[2738]: Using interface
ppp0
Sep 18 10:51:28 firewall pppd[2738]: Connect: ppp0
<--> eth0
Sep 18 10:51:28 firewall pppd[2738]: Couldn't increase
MTU to 1500
Sep 18 10:51:28 firewall pppd[2738]: Couldn't increase
MRU to 1500
Sep 18 10:51:31 firewall pppd[2738]: Couldn't increase
MRU to 1500
Sep 18 10:51:31 firewall pppd[2738]: PAP
authentication succeeded
Sep 18 10:51:31 firewall pppd[2738]: peer from calling
number
00:90:1A:40:C9:FE authorized
Sep 18 10:51:31 firewall pppd[2738]: Cannot determine
ethernet address for
proxy ARP
Sep 18 10:51:31 firewall pppd[2738]: local IP address
69.0.45.229
Sep 18 10:51:31 firewall pppd[2738]: remote IP address
204.60.4.42
Sep 18 10:51:31 firewall pppd[2738]: primary DNS
address 204.60.203.179
Sep 18 10:51:31 firewall pppd[2738]: secondary DNS
address 66.73.20.40
Sep 18 11:33:04 firewall sh-httpd[3158]: connect from
192.168.1.1
Sep 18 11:33:05 firewall sh-httpd[29211]: connect from
192.168.1.1
Sep 18 11:33:05 firewall inetd[3442]: pid 3158: exit
status 1
Sep 18 11:33:05 firewall sh-httpd[25529]: connect from
192.168.1.1
Sep 18 11:33:08 firewall sh-httpd[22898]: connect from
192.168.1.1
Sep 18 11:33:13 firewall sh-httpd[11444]: connect from
192.168.1.1
Sep 18 11:33:15 firewall sh-httpd[15522]: connect from
192.168.1.1
Sep 18 11:33:15 firewall inetd[3442]: pid 15522: exit
status 1
Sep 18 11:33:18 firewall sh-httpd[17679]: connect from
192.168.1.1
Sep 18 11:33:20 firewall sh-httpd[27040]: connect from
192.168.1.1
Sep 18 11:33:20 firewall inetd[3442]: pid 27040: exit
status 1
Sep 18 11:35:47 firewall sh-httpd[24942]: connect from
192.168.1.1
Sep 18 11:35:47 firewall inetd[3442]: pid 24942: exit
status 1
Sep 18 11:35:50 firewall sh-httpd[15035]: connect from
192.168.1.1
Sep 18 11:35:53 firewall sh-httpd[13914]: connect from
192.168.1.1
Sep 18 11:35:53 firewall inetd[3442]: pid 13914: exit
status 1
Sep 18 11:36:01 firewall sh-httpd[15742]: connect from
192.168.1.1
Sep 18 11:36:02 firewall inetd[3442]: pid 15742: exit
status 1
Sep 18 11:36:07 firewall sh-httpd[5819]: connect from
192.168.1.1
Sep 18 11:36:09 firewall sh-httpd[8076]: connect from
192.168.1.1
Sep 18 11:36:09 firewall inetd[3442]: pid 8076: exit
status 1
Sep 18 11:36:31 firewall sh-httpd[24284]: connect from
192.168.1.1
Sep 18 11:36:32 firewall inetd[3442]: pid 24284: exit
status 1
Sep 18 11:36:33 firewall sh-httpd[1305]: connect from
192.168.1.1
Sep 18 11:36:34 firewall inetd[3442]: pid 1305: exit
status 1
Sep 18 11:36:36 firewall sh-httpd[22750]: connect from
192.168.1.1
Sep 18 11:36:40 firewall sh-httpd[19810]: connect from
192.168.1.1
Sep 18 11:36:41 firewall inetd[3442]: pid 19810: exit
status 1
Sep 18 11:38:37 firewall sh-httpd[30080]: connect from
192.168.1.1
Sep 18 11:38:38 firewall inetd[3442]: pid 30080: exit
status 1
Sep 18 11:38:39 firewall sh-httpd[4154]: connect from
192.168.1.1
Sep 18 11:38:41 firewall sh-httpd[1174]: connect from
192.168.1.1
Sep 18 11:38:41 firewall inetd[3442]: pid 1174: exit
status 1
Sep 18 11:40:36 firewall sh-httpd[15765]: connect from
192.168.1.1
Sep 18 11:40:37 firewall inetd[3442]: pid 15765: exit
status 1
Sep 18 11:40:40 firewall sh-httpd[23331]: connect from
192.168.1.1
Sep 18 11:40:43 firewall sh-httpd[7539]: connect from
192.168.1.1
Sep 18 11:40:43 firewall inetd[3442]: pid 7539: exit
status 1
Sep 18 11:41:07 firewall sh-httpd[23848]: connect from
192.168.1.1
Sep 18 11:41:07 firewall inetd[3442]: pid 23848: exit
status 1
Sep 18 11:41:12 firewall sh-httpd[11363]: connect from
192.168.1.1
Sep 18 11:41:15 firewall sh-httpd[31739]: connect from
192.168.1.1
Sep 18 11:41:15 firewall inetd[3442]: pid 31739: exit
status 1
Sep 18 11:41:58 firewall sh-httpd[758]: connect from
192.168.1.1
Sep 18 11:41:58 firewall inetd[3442]: pid 758: exit
status 1
Sep 18 11:42:01 firewall sh-httpd[23274]: connect from
192.168.1.1
Sep 18 11:42:03 firewall sh-httpd[12980]: connect from
192.168.1.1
Sep 18 11:42:03 firewall inetd[3442]: pid 12980: exit
status 1
Sep 18 11:42:51 firewall sh-httpd[23325]: connect from
192.168.1.1
Sep 18 11:42:51 firewall inetd[3442]: pid 23325: exit
status 1
Sep 18 11:42:52 firewall sh-httpd[20176]: connect from
192.168.1.1
Sep 18 11:42:54 firewall sh-httpd[3333]: connect from
192.168.1.1
Sep 18 11:42:55 firewall inetd[3442]: pid 3333: exit
status 1
Sep 18 11:43:41 firewall sh-httpd[26010]: connect from
192.168.1.1
Sep 18 11:43:41 firewall inetd[3442]: pid 26010: exit
status 1
Sep 18 11:43:43 firewall sh-httpd[26226]: connect from
192.168.1.1
Sep 18 11:43:44 firewall sh-httpd[30367]: connect from
192.168.1.1
Sep 18 11:43:45 firewall inetd[3442]: pid 30367: exit
status 1
Sep 18 11:43:55 firewall sh-httpd[20668]: connect from
192.168.1.1
Sep 18 11:43:55 firewall inetd[3442]: pid 20668: exit
status 1
Sep 18 11:43:57 firewall sh-httpd[2454]: connect from
192.168.1.1
Sep 18 11:43:59 firewall sh-httpd[2286]: connect from
192.168.1.1
Sep 18 11:43:59 firewall inetd[3442]: pid 2286: exit
status 1
Sep 18 11:44:07 firewall sh-httpd[18895]: connect from
192.168.1.1
Sep 18 11:44:07 firewall inetd[3442]: pid 18895: exit
status 1
Sep 18 11:44:09 firewall sh-httpd[12779]: connect from
192.168.1.1
::messages concerning the firewall::
Sep 18 10:56:01 firewall Shorewall:net2all:DROP:
IN=ppp0 OUT= MAC=
SRC=81.192.255.235 DST=69.0.45.229 LEN=60 TOS=00
PREC=0x00 TTL=47 ID=40949
CE DF PROTO=TCP SPT=44551 DPT=23 SEQ=20905596 ACK=0
WINDOW=5840 SYN URGP=0
Sep 18 10:56:04 firewall Shorewall:net2all:DROP:
IN=ppp0 OUT= MAC=
SRC=81.192.255.235 DST=69.0.45.229 LEN=60 TOS=00
PREC=0x00 TTL=47 ID=40950
CE DF PROTO=TCP SPT=44551 DPT=23 SEQ=20905596 ACK=0
WINDOW=5840 SYN URGP=0
Sep 18 11:15:24 firewall Shorewall:net2all:DROP:
IN=ppp0 OUT= MAC=
SRC=66.65.179.99 DST=69.0.45.229 LEN=404 TOS=00
PREC=0x00 TTL=118 ID=32445
PROTO=UDP SPT=1164 DPT=1434 LEN=384
Sep 18 11:16:33 firewall Shorewall:net2all:DROP:
IN=ppp0 OUT= MAC=
SRC=211.96.205.180 DST=69.0.45.229 LEN=48 TOS=00
PREC=0x00 TTL=104
ID=41960 CE DF PROTO=TCP SPT=4353 DPT=554
SEQ=1222527353 ACK=0
WINDOW=64240 SYN URGP=0
Sep 18 11:16:36 firewall Shorewall:net2all:DROP:
IN=ppp0 OUT= MAC=
SRC=211.96.205.180 DST=69.0.45.229 LEN=48 TOS=00
PREC=0x00 TTL=104
ID=42677 CE DF PROTO=TCP SPT=4353 DPT=554
SEQ=1222527353 ACK=0
WINDOW=64240 SYN URGP=0
Sep 18 11:16:39 firewall Shorewall:net2all:DROP:
IN=ppp0 OUT= MAC=
SRC=4.234.54.84 DST=69.0.45.229 LEN=48 TOS=00
PREC=0x00 TTL=113 ID=64551
CE DF PROTO=TCP SPT=3566 DPT=17300 SEQ=586480223 ACK=0
WINDOW=8760 SYN
URGP=0
Sep 18 11:16:42 firewall Shorewall:net2all:DROP:
IN=ppp0 OUT= MAC=
SRC=211.96.205.180 DST=69.0.45.229 LEN=48 TOS=00
PREC=0x00 TTL=104
ID=43929 CE DF PROTO=TCP SPT=4353 DPT=554
SEQ=1222527353 ACK=0
WINDOW=64240 SYN URGP=0
Sep 18 11:27:20 firewall Shorewall:net2all:DROP:
IN=ppp0 OUT= MAC=
SRC=67.70.108.44 DST=69.0.45.229 LEN=48 TOS=00
PREC=0x00 TTL=113 ID=24554
DF PROTO=TCP SPT=4928 DPT=2745 SEQ=643366081 ACK=0
WINDOW=64800 SYN URGP=0
Sep 18 11:27:23 firewall Shorewall:net2all:DROP:
IN=ppp0 OUT= MAC=
SRC=67.70.108.44 DST=69.0.45.229 LEN=48 TOS=00
PREC=0x00 TTL=113 ID=25507
DF PROTO=TCP SPT=4928 DPT=2745 SEQ=643366081 ACK=0
WINDOW=64800 SYN URGP=0
Sep 18 11:27:23 firewall Shorewall:net2all:DROP:
IN=ppp0 OUT= MAC=
SRC=67.70.108.44 DST=69.0.45.229 LEN=48 TOS=00
PREC=0x00 TTL=113 ID=25508
DF PROTO=TCP SPT=4929 DPT=2082 SEQ=643406446 ACK=0
WINDOW=64800 SYN URGP=0
Sep 18 11:30:38 firewall Shorewall:net2all:DROP:
IN=ppp0 OUT= MAC=
SRC=217.255.62.229 DST=69.0.45.229 LEN=40 TOS=00
PREC=0x00 TTL=240 ID=8606
PROTO=TCP SPT=1029 DPT=554 SEQ=757147 ACK=0
WINDOW=4096 SYN URGP=0
Sep 18 11:31:47 firewall Shorewall:net2all:DROP:
IN=ppp0 OUT= MAC=
SRC=220.201.194.148 DST=69.0.45.229 LEN=48 TOS=00
PREC=0x00 TTL=105
ID=43411 CE DF PROTO=TCP SPT=4717 DPT=1978
SEQ=4180826404 ACK=0
WINDOW=65535 SYN URGP=0
Sep 18 11:31:50 firewall Shorewall:net2all:DROP:
IN=ppp0 OUT= MAC=
SRC=220.201.194.148 DST=69.0.45.229 LEN=48 TOS=00
PREC=0x00 TTL=105
ID=43756 CE DF PROTO=TCP SPT=4717 DPT=1978
SEQ=4180826404 ACK=0
WINDOW=65535 SYN URGP=0
Sep 18 11:31:56 firewall Shorewall:net2all:DROP:
IN=ppp0 OUT= MAC=
SRC=220.201.194.148 DST=69.0.45.229 LEN=48 TOS=00
PREC=0x00 TTL=105
ID=44468 CE DF PROTO=TCP SPT=4717 DPT=1978
SEQ=4180826404 ACK=0
WINDOW=65535 SYN URGP=0
Sep 18 11:36:26 firewall Shorewall:net2all:DROP:
IN=ppp0 OUT= MAC=
SRC=213.33.16.41 DST=69.0.45.229 LEN=48 TOS=00
PREC=0x00 TTL=100 ID=19894
DF PROTO=TCP SPT=22508 DPT=1433 SEQ=3104964744 ACK=0
WINDOW=16384 SYN
URGP=0
Sep 18 11:36:29 firewall Shorewall:net2all:DROP:
IN=ppp0 OUT= MAC=
SRC=213.33.16.41 DST=69.0.45.229 LEN=48 TOS=00
PREC=0x00 TTL=100 ID=20000
DF PROTO=TCP SPT=22508 DPT=1433 SEQ=3104964744 ACK=0
WINDOW=16384 SYN
URGP=0
Sep 18 11:36:35 firewall Shorewall:net2all:DROP:
IN=ppp0 OUT= MAC=
SRC=213.33.16.41 DST=69.0.45.229 LEN=48 TOS=00
PREC=0x00 TTL=100 ID=20431
DF PROTO=TCP SPT=22508 DPT=1433 SEQ=3104964744 ACK=0
WINDOW=16384 SYN
URGP=0
Sep 18 11:38:31 firewall Shorewall:net2all:DROP:
IN=ppp0 OUT= MAC=
SRC=68.0.45.229 DST=69.0.45.229 LEN=574 TOS=00
PREC=0x00 TTL=113 ID=53654
CE PROTO=UDP SPT=666 DPT=1026 LEN=554
Sep 18 11:40:16 firewall Shorewall:net2all:DROP:
IN=ppp0 OUT= MAC=
SRC=61.149.249.193 DST=69.0.45.229 LEN=40 TOS=00
PREC=0x00 TTL=167 ID=256
PROTO=TCP SPT=1127 DPT=4899 SEQ=1671816 ACK=0
WINDOW=512 SYN URGP=0
-------------------------------------------------------
This SF.Net email is sponsored by: YOU BE THE JUDGE. Be one of 170
Project Admins to receive an Apple iPod Mini FREE for your judgement on
who ports your project to Linux PPC the best. Sponsored by IBM.
Deadline: Sept. 24. Go here: http://sf.net/ppc_contest.php
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html