2. When you say ...
I am
able to ping lo, ppp0 and eth1. I am able to monitor
the status via Firefox browser and LRP weblet.... does "I" consistently refer to the WinXP host? Can it ping the other end of the ppp connection (204.60.4.42 in the interface list you sent us)? Can the LEAF router itself ping this address?
3. Might this be a DNS issue? (You don't say how your WinXP host does DNS, or how either LEAF router supported DNS queries.) Can the WinXP host ping known-good Internet sites by their IP addresses (try mine if you need one: 63.198.182.124)? If it is a DNS issue, and you need help with it, you are going to have to give us details ... for example, a quick skim of the Shorewall report laves me thinking that Shorewall is NOT set right to allow the uClibc-LEAF router to serve as a DNS forwarder (but I'm not certain of this it was only a quick skim, as I said), but that matters only if the WinXP host uses the router as its DNS forwarder.
4. What *exactly* does "access" mean in "I have not been able to access the the Internet"? The only example you mention is trying to get a Web page, and the browser message you quote sounds like it could be reporting a DNS failure.
I looked through the part of the Shorewall report that covers MASQing LAN traffic to ppp0, and the rules listed look OK. But given my earlier questions, I didn't review the rules as exhaustively as I might if I knew we coule rule out simpler problems.
At 02:43 PM 9/18/2004 -0700, MATTHEW CARTTER wrote:
Problem: Bering-uClibc_2.2 connection problem
I have been using the Dachstein contributed pppoe version by Kenneth Hadley on a home network for the past two years without any problems. The LRP is connected to three PCs running Windows XP professional via a switch. The LRP runs on a 486 with two ISA cards: eth0 uses 8390.o and ne.o; eth1 uses 3c509.o.
For several months now, I have been trying to upgrade to Bering-uClibc using ppp and pppoe, first with 2.1.3 back in July and now and now with 2.2. My ISP is SBC Yahoo DSL. I have the Speedstream 5100b set as a bridge (I am not using pppoe on the modem).
I have not been able to access the the Internet. I am able to ping lo, ppp0 and eth1. I am able to monitor the status via Firefox browser and LRP weblet. I have no "Masqueraded Connections". After 10 to 20 minutes, I get a Windows XP error (Limited or no connectivity) and can no longer access the weblet interface. The connection setting for the Firefox browser 0.9.3 is "Direct connection to the Internet". When I try to connect to a web page , I get "web page could not be found. Please check the name and try again". I get similar results with IE5.
When I restart using the Dashstein disk, the system works fine.
In configuring Shorewall, I was not able to set routefilter and routestopped in the interfaces file as described in Chapter 6 - PPPoE configuration (I got errors at boot up when I did this). After checking several posts on the archive and on the Sorewall sites, I set routefilter to "Yes" in the config file and routestopped for interface eth1 in the routestopped file. I am not sure if this was the correct way to deal with these configuration problems.
I keep thinking that I have made a simple mistake along the way, but I have not been able to find it. A not so simple mistake is also possible. Any help from the members of the Leaf users group would be greatly appreciated.
Below are the text outputs recommended by the "Before You Post" page. Also below are the output messages from the weblet interface.
Thanks.
Matt
Linux firewall 2.4.26 #1 Mon Jun 28 20:08:59 CEST 2004 i486 unknown
address.txt 1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo 2: dummy0: <BROADCAST,NOARP> mtu 1500 qdisc noop link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 3: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:00:1b:4b:a6:f0 brd ff:ff:ff:ff:ff:ff 4: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:a0:24:8d:b3:de brd ff:ff:ff:ff:ff:ff inet 192.168.1.254/24 brd 192.168.1.255 scope global eth1 5: ppp0: <POINTOPOINT,MULTICAST,NOARP,UP> mtu 1492 qdisc pfifo_fast qlen 3 link/ppp inet 66.159.175.184 peer 204.60.4.42/32 scope global ppp0
route.txt 204.60.4.42 dev ppp0 proto kernel scope link src 66.159.175.184 192.168.1.0/24 dev eth1 proto kernel scope link src 192.168.1.254 default via 204.60.4.42 dev ppp0
lsmod.txt Module Size Used by Not tainted softdog 1508 1 ipt_state 336 15 ipt_helper 464 0 (unused) ipt_conntrack 820 0 ipt_REDIRECT 544 0 (unused) ipt_MASQUERADE 1056 1 ip_nat_irc 2152 0 (unused) ip_nat_ftp 2792 0 (unused) iptable_nat 15716 3 [ipt_REDIRECT ipt_MASQUERADE ip_nat_irc ip_nat_ftp] ip_conntrack_irc 2876 1 ip_conntrack_ftp 3484 1 ip_conntrack 18312 2 [ipt_state ipt_helper ipt_conntrack ipt_REDIRECT ipt_MASQUERADE ip_nat_irc ip_nat_ftp iptable_nat ip_conntrack_irc ip_conntrack_ftp] pppoe 6732 1 pppox 924 1 [pppoe] ppp_synctty 4632 0 (unused) ppp_generic 16204 3 [pppoe pppox ppp_synctty] n_hdlc 5792 0 (unused) slhc 4296 0 [ppp_generic] 3c509 8240 1 ne 6148 1 8390 5784 0 [ne] crc32 2648 0 [8390]
shorwall.txt [H[JShorewall-2.0.7 Status at firewall - Wed Sep 18 12:24:57 UTC 1996
Counters reset Wed Sep 18 12:07:32 UTC 1996
Chain INPUT (policy DROP 0 packets, 0 bytes) pkts bytes target prot opt in out source
destination 0 0 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0 0 0 DROP !icmp -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID 8 320 ppp0_in all -- ppp0 * 0.0.0.0/0 0.0.0.0/0 45 11950 eth1_in all -- eth1 * 0.0.0.0/0 0.0.0.0/0 0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 ULOG all -- * * 0.0.0.0/0 0.0.0.0/0 ULOG copy_range 0 nlgroup 1 prefix `Shorewall:INPUT:REJECT:' queue_threshold 1 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
Chain FORWARD (policy DROP 0 packets, 0 bytes) pkts bytes target prot opt in out source
destination 0 0 DROP !icmp -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID 0 0 TCPMSS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU 0 0 ppp0_fwd all -- ppp0 * 0.0.0.0/0 0.0.0.0/0 0 0 eth1_fwd all -- eth1 * 0.0.0.0/0 0.0.0.0/0 0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 ULOG all -- * * 0.0.0.0/0 0.0.0.0/0 ULOG copy_range 0 nlgroup 1 prefix `Shorewall:FORWARD:REJECT:' queue_threshold 1 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy DROP 0 packets, 0 bytes) pkts bytes target prot opt in out source
destination 0 0 ACCEPT all -- * lo 0.0.0.0/0 0.0.0.0/0 0 0 DROP !icmp -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID 0 0 fw2net all -- * ppp0 0.0.0.0/0 0.0.0.0/0 10 730 fw2loc all -- * eth1 0.0.0.0/0 0.0.0.0/0 0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 ULOG all -- * * 0.0.0.0/0 0.0.0.0/0 ULOG copy_range 0 nlgroup 1 prefix `Shorewall:OUTPUT:REJECT:' queue_threshold 1 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
Chain Drop (1 references) pkts bytes target prot opt in out source
destination 8 320 RejectAuth all -- * * 0.0.0.0/0 0.0.0.0/0 8 320 dropBcast all -- * * 0.0.0.0/0 0.0.0.0/0 8 320 dropInvalid all -- * * 0.0.0.0/0 0.0.0.0/0 8 320 DropSMB all -- * * 0.0.0.0/0 0.0.0.0/0 8 320 DropUPnP all -- * * 0.0.0.0/0 0.0.0.0/0 8 320 dropNotSyn all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 DropDNSrep all -- * * 0.0.0.0/0 0.0.0.0/0
Chain DropDNSrep (2 references) pkts bytes target prot opt in out source
destination 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:53
Chain DropSMB (1 references) pkts bytes target prot opt in out source
destination 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:135 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpts:137:139 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:445 0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:135 0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:139 0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:445
Chain DropUPnP (2 references) pkts bytes target prot opt in out source
destination 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:1900
Chain Reject (4 references) pkts bytes target prot opt in out source
destination 3 724 RejectAuth all -- * * 0.0.0.0/0 0.0.0.0/0 3 724 dropBcast all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 dropInvalid all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 RejectSMB all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 DropUPnP all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 dropNotSyn all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 DropDNSrep all -- * * 0.0.0.0/0 0.0.0.0/0
Chain RejectAuth (2 references) pkts bytes target prot opt in out source
destination 0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:113
Chain RejectSMB (1 references) pkts bytes target prot opt in out source
destination 0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:135 0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpts:137:139 0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:445 0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:135 0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:139 0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:445
Chain all2all (3 references) pkts bytes target prot opt in out source
destination 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 3 724 Reject all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 ULOG all -- * * 0.0.0.0/0 0.0.0.0/0 ULOG copy_range 0 nlgroup 1 prefix `Shorewall:all2all:REJECT:' queue_threshold 1 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
Chain dropBcast (2 references) pkts bytes target prot opt in out source
destination 3 724 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 PKTTYPE = broadcast 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 PKTTYPE = multicast
Chain dropInvalid (2 references) pkts bytes target prot opt in out source
destination 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID
Chain dropNotSyn (2 references) pkts bytes target prot opt in out source
destination 8 320 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:!0x16/0x02
Chain dynamic (4 references) pkts bytes target prot opt in out source
destination
Chain eth1_fwd (1 references) pkts bytes target prot opt in out source
destination 0 0 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID,NEW 0 0 loc2net all -- * ppp0 0.0.0.0/0 0.0.0.0/0
Chain eth1_in (1 references) pkts bytes target prot opt in out source
destination 40 11545 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID,NEW 45 11950 loc2fw all -- * * 0.0.0.0/0 0.0.0.0/0
Chain fw2loc (1 references) pkts bytes target prot opt in out source
destination 10 730 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 8 0 0 all2all all -- * * 0.0.0.0/0 0.0.0.0/0
Chain fw2net (1 references) pkts bytes target prot opt in out source
destination 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:53 0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:53 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 8 0 0 all2all all -- * * 0.0.0.0/0 0.0.0.0/0
Chain icmpdef (0 references) pkts bytes target prot opt in out source
destination
Chain loc2fw (1 references) pkts bytes target prot opt in out source
destination 5 405 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 8 5 325 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:53 0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 32 10496 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 multiport dports 67,68 3 724 all2all all -- * * 0.0.0.0/0 0.0.0.0/0
Chain loc2net (1 references) pkts bytes target prot opt in out source
destination 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain net2all (2 references) pkts bytes target prot opt in out source
destination 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 8 320 Drop all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 ULOG all -- * * 0.0.0.0/0 0.0.0.0/0 ULOG copy_range 0 nlgroup 1 prefix `Shorewall:net2all:DROP:' queue_threshold 1 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain net2fw (1 references) pkts bytes target prot opt in out source
destination 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 8 8 320 net2all all -- * * 0.0.0.0/0 0.0.0.0/0
Chain ppp0_fwd (1 references) pkts bytes target prot opt in out source
destination 0 0 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID,NEW 0 0 net2all all -- * eth1 0.0.0.0/0 0.0.0.0/0
Chain ppp0_in (1 references) pkts bytes target prot opt in out source
destination 8 320 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID,NEW 8 320 net2fw all -- * * 0.0.0.0/0 0.0.0.0/0
Chain reject (11 references) pkts bytes target prot opt in out source
destination 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 PKTTYPE = broadcast 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 PKTTYPE = multicast 0 0 DROP all -- * * 192.168.1.255 0.0.0.0/0 0 0 DROP all -- * * 255.255.255.255 0.0.0.0/0 0 0 DROP all -- * * 224.0.0.0/4 0.0.0.0/0 0 0 REJECT tcp -- * * 0.0.0.0/0 0.0.0.0/0 reject-with tcp-reset 0 0 REJECT udp -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable 0 0 REJECT icmp -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-unreachable 0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
Chain shorewall (0 references) pkts bytes target prot opt in out source
destination
Chain smurfs (0 references) pkts bytes target prot opt in out source
destination 0 0 ULOG all -- * * 192.168.1.255 0.0.0.0/0 ULOG copy_range 0 nlgroup 1 prefix `Shorewall:smurfs:DROP:' queue_threshold 1 0 0 DROP all -- * * 192.168.1.255 0.0.0.0/0 0 0 ULOG all -- * * 255.255.255.255 0.0.0.0/0 ULOG copy_range 0 nlgroup 1 prefix `Shorewall:smurfs:DROP:' queue_threshold 1 0 0 DROP all -- * * 255.255.255.255 0.0.0.0/0 0 0 ULOG all -- * * 224.0.0.0/4 0.0.0.0/0 ULOG copy_range 0 nlgroup 1 prefix `Shorewall:smurfs:DROP:' queue_threshold 1 0 0 DROP all -- * * 224.0.0.0/4 0.0.0.0/0
NAT Table
Chain PREROUTING (policy ACCEPT 82 packets, 11818 bytes) pkts bytes target prot opt in out source
destination
Chain POSTROUTING (policy ACCEPT 0 packets, 0 bytes) pkts bytes target prot opt in out source
destination 0 0 ppp0_masq all -- * ppp0 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) pkts bytes target prot opt in out source
destination
Chain ppp0_masq (1 references) pkts bytes target prot opt in out source
destination 0 0 MASQUERADE all -- * * 192.168.1.0/24 0.0.0.0/0
Mangle Table
Chain PREROUTING (policy ACCEPT 112 packets, 20176 bytes) pkts bytes target prot opt in out source
destination 110 20030 pretos all -- * * 0.0.0.0/0 0.0.0.0/0
Chain INPUT (policy ACCEPT 55 packets, 12416 bytes) pkts bytes target prot opt in out source
destination
Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) pkts bytes target prot opt in out source
destination
Chain OUTPUT (policy ACCEPT 12 packets, 876 bytes) pkts bytes target prot opt in out source
destination 10 730 outtos all -- * * 0.0.0.0/0 0.0.0.0/0
Chain POSTROUTING (policy ACCEPT 12 packets, 876 bytes) pkts bytes target prot opt in out source
destination
Chain outtos (1 references) pkts bytes target prot opt in out source
destination 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 TOS set 0x10 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:22 TOS set 0x10 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:21 TOS set 0x10 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:21 TOS set 0x10 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:20 TOS set 0x08 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:20 TOS set 0x08
Chain pretos (1 references) pkts bytes target prot opt in out source
destination 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 TOS set 0x10 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:22 TOS set 0x10 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:21 TOS set 0x10 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:21 TOS set 0x10 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:20 TOS set 0x08 0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:20 TOS set 0x08
udp 17 17 src=192.168.1.2 dst=192.168.1.254 sport=1035 dport=53 src=192.168.1.254 dst=192.168.1.2 sport=53 dport=1035 [ASSURED] use=1
IP Configuration
1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo 2: dummy0: <BROADCAST,NOARP> mtu 1500 qdisc noop link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 3: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:00:1b:4b:a6:f0 brd ff:ff:ff:ff:ff:ff 4: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:a0:24:8d:b3:de brd ff:ff:ff:ff:ff:ff inet 192.168.1.254/24 brd 192.168.1.255 scope global eth1 5: ppp0: <POINTOPOINT,MULTICAST,NOARP,UP> mtu 1492 qdisc pfifo_fast qlen 3 link/ppp inet 66.159.175.184 peer 204.60.4.42/32 scope global ppp0
Routing Rules
0: from all lookup local 32766: from all lookup main 32767: from all lookup default
Table local:
broadcast 192.168.1.0 dev eth1 proto kernel scope link src 192.168.1.254 broadcast 127.255.255.255 dev lo proto kernel scope link src 127.0.0.1 local 66.159.175.184 dev ppp0 proto kernel scope host src 66.159.175.184 local 192.168.1.254 dev eth1 proto kernel scope host src 192.168.1.254 broadcast 192.168.1.255 dev eth1 proto kernel scope link src 192.168.1.254 broadcast 127.0.0.0 dev lo proto kernel scope link src 127.0.0.1 local 127.0.0.1 dev lo proto kernel scope host src 127.0.0.1 local 127.0.0.0/8 dev lo proto kernel scope host src 127.0.0.1
Table main:
204.60.4.42 dev ppp0 proto kernel scope link src 66.159.175.184 192.168.1.0/24 dev eth1 proto kernel scope link src 192.168.1.254 default via 204.60.4.42 dev ppp0
Table default:
iptables.txt Chain PREROUTING (policy ACCEPT 86 packets, 12291 bytes) pkts bytes target prot opt in out source
destination
Chain POSTROUTING (policy ACCEPT 0 packets, 0 bytes) pkts bytes target prot opt in out source
destination 0 0 ppp0_masq all -- * ppp0 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) pkts bytes target prot opt in out source
destination
Chain ppp0_masq (1 references) pkts bytes target prot opt in out source
destination 0 0 MASQUERADE all -- * * 192.168.1.0/24 0.0.0.0/0
The following messages are cut and pasted from the weblet interface:
::Masqueraded Connections::
::Other Connections::
tcp src=192.168.1.1 1062 dst=192.168.1.254 80 --431998 sec. ESTABLISHED tcp src=192.168.1.1 1060 dst=192.168.1.254 80 --0 sec. TIME_WAIT tcp src=192.168.1.1 1059 dst=192.168.1.254 80 --0 sec. TIME_WAIT udp src=192.168.1.2 1035 dst=192.168.1.254 53 --154 sec. tcp src=192.168.1.1 1061 dst=192.168.1.254 80 --115 sec. TIME_WAIT udp src=192.168.1.1 1027 dst=192.168.1.254 53 --131 sec.
::Interfaces::
1: lo: mtu 16436 qdisc noqueue link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo 2: dummy0: mtu 1500 qdisc noop link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 3: eth0: mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:00:1b:4b:a6:f0 brd ff:ff:ff:ff:ff:ff 4: eth1: mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:a0:24:8d:b3:de brd ff:ff:ff:ff:ff:ff inet 192.168.1.254/24 brd 192.168.1.255 scope global eth1 5: ppp0: mtu 1492 qdisc pfifo_fast qlen 3 link/ppp inet 69.0.45.229 peer 204.60.4.42/32 scope global ppp0
::Routes::
204.60.4.42 dev ppp0 proto kernel scope link src 69.0.45.229 192.168.1.0/24 dev eth1 proto kernel scope link src 192.168.1.254 default via 204.60.4.42 dev ppp0
::Statistics::
1: lo: mtu 16436 qdisc noqueue link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 RX: bytes packets errors dropped overrun mcast 13272 158 0 0 0 0 TX: bytes packets errors dropped carrier collsns 13272 158 0 0 0 0 2: dummy0: mtu 1500 qdisc noop link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff RX: bytes packets errors dropped overrun mcast 0 0 0 0 0 0 TX: bytes packets errors dropped carrier collsns 0 0 0 0 0 0 3: eth0: mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:00:1b:4b:a6:f0 brd ff:ff:ff:ff:ff:ff RX: bytes packets errors dropped overrun mcast 14443 194 0 0 0 0 TX: bytes packets errors dropped carrier collsns 9668 159 0 0 0 0 4: eth1: mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:a0:24:8d:b3:de brd ff:ff:ff:ff:ff:ff RX: bytes packets errors dropped overrun mcast 51614 362 0 0 0 0 TX: bytes packets errors dropped carrier collsns 40675 201 0 0 0 0 5: ppp0: mtu 1492 qdisc pfifo_fast qlen 3 link/ppp RX: bytes packets errors dropped overrun mcast 4391 42 0 0 0 0 TX: bytes packets errors dropped carrier collsns 410 9 0 0 0 0
::General System Info::
Uptime: 11:41:13 up 51 min, load average: 0.00, 0.02, 0.00
Kernel:Linux firewall 2.4.26 #1 Mon Jun 28 20:08:59 CEST 2004 i486 unknown
Modules: softdog 1508 1 ipt_state 336 15 ipt_helper 464 0 (unused) ipt_conntrack 820 0 ipt_REDIRECT 544 0 (unused) ipt_MASQUERADE 1056 1 ip_nat_irc 2152 0 (unused) ip_nat_ftp 2792 0 (unused) iptable_nat 15716 3 [ipt_REDIRECT ipt_MASQUERADE ip_nat_irc ip_nat_ftp] ip_conntrack_irc 2876 1 ip_conntrack_ftp 3484 1 ip_conntrack 18312 2 [ipt_state ipt_helper ipt_conntrack ipt_REDIRECT ipt_MASQUERADE ip_nat_irc ip_nat_ftp iptable_nat ip_conntrack_irc ip_conntrack_ftp] pppoe 6732 1 pppox 924 1 [pppoe] ppp_synctty 4632 0 (unused) ppp_generic 16204 3 [pppoe pppox ppp_synctty] n_hdlc 5792 0 (unused) slhc 4296 0 [ppp_generic] 3c509 8240 1 ne 6148 1 8390 5784 0 [ne] crc32 2648 0 [8390]
::Installed Packages::
Name Version Description ===============-==============-============================================== initrd V2.2.0 uClibc- LEAF Bering-uClibc initial filesystem root V2.2.0 uClibc- Core LEAF Bering-uClibc package config 0.4 Core config and backup system package etc V2.2.0 uClibc- local V2.2.0 uClibc- LEAF Bering local package modules V2.2.0 uClibc- Define & contain your LEAF Bering modules iptables 1.2.11 IP packet filter administration tools for 2.4. ppp 2.4.2-1 Point-to-Point Protocol (PPP) daemon, ipv6 ena pppoe 3.5-1 rp-pppoe plugin for pppd shorwall ulogd 1.02 The Netfilter Userspace Logging Daemon dnsmasq 2.13 Rev 1 Dnsmasq is lightweight, easy to configure DNS sh-httpd 1.2.5 Rev 2 Small shell-based web server weblet 1.0.0 Rev 3 http-server content
::CPU Info::
processor : 0 vendor_id : GenuineIntel cpu family : 4 model : 3 model name : 486 DX/2 stepping : 5 fdiv_bug : no hlt_bug : no f00f_bug : no coma_bug : no fpu : yes fpu_exception : yes cpuid level : 1 wp : yes flags : fpu vme bogomips : 33.28
::Running Processes::
PID Uid VmSize Stat Command 1 root 256 S init [2] 2 root SW [keventd] 3 root SWN [ksoftirqd_CPU0] 4 root SW [kswapd] 5 root SW [bdflush] 6 root SW [kupdated] 12573 root 284 S /sbin/syslogd -m 240 1009 root 244 S /sbin/klogd 2738 root 528 S /usr/sbin/pppd call dsl-provider eth0 12934 root 144 S /usr/sbin/watchdog 18567 nobody 324 S /usr/sbin/dnsmasq 3442 root 284 S /usr/sbin/inetd 264 root 296 S /usr/sbin/ulogd -d 26935 root 284 S /usr/sbin/cron 1060 root 292 S -sh 1540 root 288 S /sbin/getty 38400 tty2 12745 root 288 S /bin/sh /usr/sbin/lrcfg 11363 sh-httpd 332 S /bin/sh /usr/sbin/sh-httpd 16503 sh-httpd 288 S /bin/sh /var/sh-www/cgi-bin/viewsys 4131 sh-httpd 192 S sleep 1 18035 sh-httpd 288 S /bin/sh /var/sh-www/cgi-bin/viewsys 14215 sh-httpd 240 S /bin/cat 12881 sh-httpd 292 R ps aux
::messages:: Sep 18 10:50:58 firewall syslogd 1.4.1: restart. Sep 18 10:50:59 firewall kernel: klogd 1.4.1, log source = /proc/kmsg started. Sep 18 10:50:59 firewall kernel: No module symbols loaded. Sep 18 10:50:59 firewall kernel: BIOS-provided physical RAM map: Sep 18 10:50:59 firewall kernel: 16MB LOWMEM available. Sep 18 10:50:59 firewall kernel: DMI not present. Sep 18 10:50:59 firewall kernel: Initializing CPU#0 Sep 18 10:50:59 firewall kernel: Memory: 14280k/16672k available (973k kernel code, 2004k reserved, 111k data, 64k init, 0k highmem) Sep 18 10:50:59 firewall kernel: Dentry cache hash table entries: 4096 (order: 3, 32768 bytes) Sep 18 10:50:59 firewall kernel: Inode cache hash table entries: 2048 (order: 2, 16384 bytes) Sep 18 10:50:59 firewall kernel: Mount cache hash table entries: 512 (order: 0, 4096 bytes) Sep 18 10:50:59 firewall kernel: Buffer cache hash table entries: 1024 (order: 0, 4096 bytes) Sep 18 10:50:59 firewall kernel: Checking 'hlt' instruction... OK. Sep 18 10:50:59 firewall kernel: Linux NET4.0 for Linux 2.4 Sep 18 10:50:59 firewall kernel: Based upon Swansea University Computer Society NET3.039 Sep 18 10:50:59 firewall kernel: Serial driver version 5.05c (2001-07-08) with MANY_PORTS SHARE_IRQ DETECT_IRQ SERIAL_PCI enabled Sep 18 10:50:59 firewall kernel: ttyS00 at 0x03f8 (irq = 4) is a 16550A Sep 18 10:50:59 firewall kernel: ttyS01 at 0x02f8 (irq = 3) is a 16550A Sep 18 10:50:59 firewall kernel: Real Time Clock Driver v1.10f Sep 18 10:50:59 firewall kernel: Floppy drive(s): fd0 is 2.88M Sep 18 10:50:59 firewall kernel: FDC 0 is a National Semiconductor PC87306 Sep 18 10:50:59 firewall kernel: Initializing Cryptographic API Sep 18 10:50:59 firewall kernel: NET4: Linux TCP/IP 1.0 for NET4.0 Sep 18 10:50:59 firewall kernel: IP Protocols: ICMP, UDP, TCP, IGMP Sep 18 10:50:59 firewall kernel: IP: routing cache hash table of 512 buckets, 4Kbytes Sep 18 10:50:59 firewall kernel: TCP: Hash tables configured (established 1024 bind 1024) Sep 18 10:50:59 firewall kernel: NET4: Unix domain sockets 1.0/SMP for Linux NET4.0. Sep 18 10:50:59 firewall kernel: RAMDISK: Compressed image found at block 0 Sep 18 10:50:59 firewall kernel: Freeing initrd memory: 284k freed Sep 18 10:50:59 firewall kernel: Freeing unused kernel memory: 64k freed Sep 18 10:50:59 firewall kernel: ne.c:v1.10 9/23/94 Donald Becker ([EMAIL PROTECTED]) Sep 18 10:50:59 firewall kernel: Last modified Nov 1, 2000 by Paul Gortmaker Sep 18 10:50:59 firewall kernel: NE*000 ethercard probe at 0x300: 00 00 1b 4b a6 f0 Sep 18 10:51:00 firewall kernel: 3c509.c:1.19 16Oct2002 [EMAIL PROTECTED] Sep 18 10:51:00 firewall kernel: http://www.scyld.com/network/3c509.html Sep 18 10:51:00 firewall kernel: CSLIP: code copyright 1989 Regents of the University of California Sep 18 10:51:00 firewall kernel: N_HDLC line discipline registered. Sep 18 10:51:00 firewall kernel: PPP generic driver version 2.4.2 Sep 18 10:51:03 firewall kernel: Software Watchdog Timer: 0.05, timer margin: 60 sec Sep 18 10:51:33 firewall root: Shorewall Started
::syslog:: Sep 18 10:50:59 firewall kernel: Cannot find map file. Sep 18 10:50:59 firewall kernel: Linux version 2.4.26 ([EMAIL PROTECTED]) (gcc version 2.95.3 20010315 (release)) #1 Mon Jun 28 20:08:59 CEST 2004 Sep 18 10:50:59 firewall kernel: BIOS-88: 0000000000000000 - 000000000009f000 (usable) Sep 18 10:50:59 firewall kernel: BIOS-88: 0000000000100000 - 0000000001048000 (usable) Sep 18 10:50:59 firewall kernel: On node 0 totalpages: 4168 Sep 18 10:50:59 firewall kernel: zone(0): 4096 pages. Sep 18 10:50:59 firewall kernel: zone(1): 72 pages. Sep 18 10:50:59 firewall kernel: zone(2): 0 pages. Sep 18 10:50:59 firewall kernel: Kernel command line: BOOT_IMAGE=linux initrd=initrd.lrp init=/linuxrc rw root=/dev/ram0 LEAFCFG=/dev/fd0u1680:msdos Sep 18 10:50:59 firewall kernel: Console: colour VGA+ 80x25 Sep 18 10:50:59 firewall kernel: Calibrating delay loop... 33.28 BogoMIPS Sep 18 10:50:59 firewall kernel: Checking if this processor honours the WP bit even in supervisor mode... Ok. Sep 18 10:50:59 firewall kernel: Page-cache hash table entries: 8192 (order: 3, 32768 bytes) Sep 18 10:50:59 firewall kernel: CPU: Intel 486 DX/2 stepping 05 Sep 18 10:50:59 firewall kernel: POSIX conformance testing by UNIFIX Sep 18 10:50:59 firewall kernel: PCI: System does not support PCI Sep 18 10:50:59 firewall kernel: Initializing RT netlink socket Sep 18 10:50:59 firewall kernel: Starting kswapd Sep 18 10:50:59 firewall kernel: pty: 256 Unix98 ptys configured Sep 18 10:50:59 firewall kernel: RAMDISK driver initialized: 16 RAM disks of 4096K size 1024 blocksize Sep 18 10:50:59 firewall kernel: ip_tables: (C) 2000-2002 Netfilter core team Sep 18 10:50:59 firewall kernel: arp_tables: (C) 2002 David S. Miller Sep 18 10:50:59 firewall kernel: VFS: Mounted root (minix filesystem). Sep 18 10:50:59 firewall kernel: eth0: NE2000 found at 0x300, using IRQ 5. Sep 18 10:51:00 firewall kernel: eth1: 3c5x9 at 0x280, 10baseT port, address 00 a0 24 8d b3 de, IRQ 3. Sep 18 10:51:00 firewall kernel: HDLC line discipline: version $Revision: 3.7 $, maxframe=4096 Sep 18 10:51:01 firewall kernel: ip_conntrack version 2.1 (130 buckets, 1040 max) - 316 bytes per conntrack Sep 18 10:51:03 firewall kernel: eth1: Setting 3c5x9/3c5x9B half-duplex mode if_port: 0, sw_info: 8411 Sep 18 10:51:03 firewall kernel: eth1: Setting Rx mode to 1 addresses.
::daemon.log:: Sep 18 10:51:03 firewall pppd[18678]: Plugin /usr/lib/pppd/rp-pppoe.so loaded. Sep 18 10:51:03 firewall pppd[18678]: RP-PPPoE plugin version 3.3 compiled against pppd 2.4.2 Sep 18 10:51:03 firewall pppd[2738]: pppd 2.4.2 started by root, uid 0 Sep 18 10:51:04 firewall init: Entering runlevel: 2 Sep 18 10:51:05 firewall dnsmasq[18567]: started, version 2.13 cachesize 150 Sep 18 10:51:05 firewall dnsmasq[18567]: read /etc/hosts - 2 addresses Sep 18 10:51:05 firewall dnsmasq[18567]: failed to access /var/lib/misc/dnsmasq.leases: No such file or directory Sep 18 10:51:05 firewall dnsmasq[18567]: reading /etc/resolv.conf Sep 18 10:51:05 firewall dnsmasq[18567]: ignoring nameserver 192.168.1.254 - local interface Sep 18 10:51:05 firewall dnsmasq[18567]: ignoring nameserver 127.0.0.1 - local interface Sep 18 10:51:05 firewall inetd[3442]: Online and ready (2 sockets) Sep 18 10:51:28 firewall pppd[2738]: PPP session is 3645 Sep 18 10:51:28 firewall pppd[2738]: Using interface ppp0 Sep 18 10:51:28 firewall pppd[2738]: Connect: ppp0 <--> eth0 Sep 18 10:51:28 firewall pppd[2738]: Couldn't increase MTU to 1500 Sep 18 10:51:28 firewall pppd[2738]: Couldn't increase MRU to 1500 Sep 18 10:51:31 firewall pppd[2738]: Couldn't increase MRU to 1500 Sep 18 10:51:31 firewall pppd[2738]: PAP authentication succeeded Sep 18 10:51:31 firewall pppd[2738]: peer from calling number 00:90:1A:40:C9:FE authorized Sep 18 10:51:31 firewall pppd[2738]: Cannot determine ethernet address for proxy ARP Sep 18 10:51:31 firewall pppd[2738]: local IP address 69.0.45.229 Sep 18 10:51:31 firewall pppd[2738]: remote IP address 204.60.4.42 Sep 18 10:51:31 firewall pppd[2738]: primary DNS address 204.60.203.179 Sep 18 10:51:31 firewall pppd[2738]: secondary DNS address 66.73.20.40 Sep 18 11:33:04 firewall sh-httpd[3158]: connect from 192.168.1.1 Sep 18 11:33:05 firewall sh-httpd[29211]: connect from 192.168.1.1 Sep 18 11:33:05 firewall inetd[3442]: pid 3158: exit status 1 Sep 18 11:33:05 firewall sh-httpd[25529]: connect from 192.168.1.1 Sep 18 11:33:08 firewall sh-httpd[22898]: connect from 192.168.1.1 Sep 18 11:33:13 firewall sh-httpd[11444]: connect from 192.168.1.1 Sep 18 11:33:15 firewall sh-httpd[15522]: connect from 192.168.1.1 Sep 18 11:33:15 firewall inetd[3442]: pid 15522: exit status 1 Sep 18 11:33:18 firewall sh-httpd[17679]: connect from 192.168.1.1 Sep 18 11:33:20 firewall sh-httpd[27040]: connect from 192.168.1.1 Sep 18 11:33:20 firewall inetd[3442]: pid 27040: exit status 1 Sep 18 11:35:47 firewall sh-httpd[24942]: connect from 192.168.1.1 Sep 18 11:35:47 firewall inetd[3442]: pid 24942: exit status 1 Sep 18 11:35:50 firewall sh-httpd[15035]: connect from 192.168.1.1 Sep 18 11:35:53 firewall sh-httpd[13914]: connect from 192.168.1.1 Sep 18 11:35:53 firewall inetd[3442]: pid 13914: exit status 1 Sep 18 11:36:01 firewall sh-httpd[15742]: connect from 192.168.1.1 Sep 18 11:36:02 firewall inetd[3442]: pid 15742: exit status 1 Sep 18 11:36:07 firewall sh-httpd[5819]: connect from 192.168.1.1 Sep 18 11:36:09 firewall sh-httpd[8076]: connect from 192.168.1.1 Sep 18 11:36:09 firewall inetd[3442]: pid 8076: exit status 1 Sep 18 11:36:31 firewall sh-httpd[24284]: connect from 192.168.1.1 Sep 18 11:36:32 firewall inetd[3442]: pid 24284: exit status 1 Sep 18 11:36:33 firewall sh-httpd[1305]: connect from 192.168.1.1 Sep 18 11:36:34 firewall inetd[3442]: pid 1305: exit status 1 Sep 18 11:36:36 firewall sh-httpd[22750]: connect from 192.168.1.1 Sep 18 11:36:40 firewall sh-httpd[19810]: connect from 192.168.1.1 Sep 18 11:36:41 firewall inetd[3442]: pid 19810: exit status 1 Sep 18 11:38:37 firewall sh-httpd[30080]: connect from 192.168.1.1 Sep 18 11:38:38 firewall inetd[3442]: pid 30080: exit status 1 Sep 18 11:38:39 firewall sh-httpd[4154]: connect from 192.168.1.1 Sep 18 11:38:41 firewall sh-httpd[1174]: connect from 192.168.1.1 Sep 18 11:38:41 firewall inetd[3442]: pid 1174: exit status 1 Sep 18 11:40:36 firewall sh-httpd[15765]: connect from 192.168.1.1 Sep 18 11:40:37 firewall inetd[3442]: pid 15765: exit status 1 Sep 18 11:40:40 firewall sh-httpd[23331]: connect from 192.168.1.1 Sep 18 11:40:43 firewall sh-httpd[7539]: connect from 192.168.1.1 Sep 18 11:40:43 firewall inetd[3442]: pid 7539: exit status 1 Sep 18 11:41:07 firewall sh-httpd[23848]: connect from 192.168.1.1 Sep 18 11:41:07 firewall inetd[3442]: pid 23848: exit status 1 Sep 18 11:41:12 firewall sh-httpd[11363]: connect from 192.168.1.1 Sep 18 11:41:15 firewall sh-httpd[31739]: connect from 192.168.1.1 Sep 18 11:41:15 firewall inetd[3442]: pid 31739: exit status 1 Sep 18 11:41:58 firewall sh-httpd[758]: connect from 192.168.1.1 Sep 18 11:41:58 firewall inetd[3442]: pid 758: exit status 1 Sep 18 11:42:01 firewall sh-httpd[23274]: connect from 192.168.1.1 Sep 18 11:42:03 firewall sh-httpd[12980]: connect from 192.168.1.1 Sep 18 11:42:03 firewall inetd[3442]: pid 12980: exit status 1 Sep 18 11:42:51 firewall sh-httpd[23325]: connect from 192.168.1.1 Sep 18 11:42:51 firewall inetd[3442]: pid 23325: exit status 1 Sep 18 11:42:52 firewall sh-httpd[20176]: connect from 192.168.1.1 Sep 18 11:42:54 firewall sh-httpd[3333]: connect from 192.168.1.1 Sep 18 11:42:55 firewall inetd[3442]: pid 3333: exit status 1 Sep 18 11:43:41 firewall sh-httpd[26010]: connect from 192.168.1.1 Sep 18 11:43:41 firewall inetd[3442]: pid 26010: exit status 1 Sep 18 11:43:43 firewall sh-httpd[26226]: connect from 192.168.1.1 Sep 18 11:43:44 firewall sh-httpd[30367]: connect from 192.168.1.1 Sep 18 11:43:45 firewall inetd[3442]: pid 30367: exit status 1 Sep 18 11:43:55 firewall sh-httpd[20668]: connect from 192.168.1.1 Sep 18 11:43:55 firewall inetd[3442]: pid 20668: exit status 1 Sep 18 11:43:57 firewall sh-httpd[2454]: connect from 192.168.1.1 Sep 18 11:43:59 firewall sh-httpd[2286]: connect from 192.168.1.1 Sep 18 11:43:59 firewall inetd[3442]: pid 2286: exit status 1 Sep 18 11:44:07 firewall sh-httpd[18895]: connect from 192.168.1.1 Sep 18 11:44:07 firewall inetd[3442]: pid 18895: exit status 1 Sep 18 11:44:09 firewall sh-httpd[12779]: connect from 192.168.1.1
::messages concerning the firewall::
Sep 18 10:56:01 firewall Shorewall:net2all:DROP: IN=ppp0 OUT= MAC= SRC=81.192.255.235 DST=69.0.45.229 LEN=60 TOS=00 PREC=0x00 TTL=47 ID=40949 CE DF PROTO=TCP SPT=44551 DPT=23 SEQ=20905596 ACK=0 WINDOW=5840 SYN URGP=0 Sep 18 10:56:04 firewall Shorewall:net2all:DROP: IN=ppp0 OUT= MAC= SRC=81.192.255.235 DST=69.0.45.229 LEN=60 TOS=00 PREC=0x00 TTL=47 ID=40950 CE DF PROTO=TCP SPT=44551 DPT=23 SEQ=20905596 ACK=0 WINDOW=5840 SYN URGP=0 Sep 18 11:15:24 firewall Shorewall:net2all:DROP: IN=ppp0 OUT= MAC= SRC=66.65.179.99 DST=69.0.45.229 LEN=404 TOS=00 PREC=0x00 TTL=118 ID=32445 PROTO=UDP SPT=1164 DPT=1434 LEN=384 Sep 18 11:16:33 firewall Shorewall:net2all:DROP: IN=ppp0 OUT= MAC= SRC=211.96.205.180 DST=69.0.45.229 LEN=48 TOS=00 PREC=0x00 TTL=104 ID=41960 CE DF PROTO=TCP SPT=4353 DPT=554 SEQ=1222527353 ACK=0 WINDOW=64240 SYN URGP=0 Sep 18 11:16:36 firewall Shorewall:net2all:DROP: IN=ppp0 OUT= MAC= SRC=211.96.205.180 DST=69.0.45.229 LEN=48 TOS=00 PREC=0x00 TTL=104 ID=42677 CE DF PROTO=TCP SPT=4353 DPT=554 SEQ=1222527353 ACK=0 WINDOW=64240 SYN URGP=0 Sep 18 11:16:39 firewall Shorewall:net2all:DROP: IN=ppp0 OUT= MAC= SRC=4.234.54.84 DST=69.0.45.229 LEN=48 TOS=00 PREC=0x00 TTL=113 ID=64551 CE DF PROTO=TCP SPT=3566 DPT=17300 SEQ=586480223 ACK=0 WINDOW=8760 SYN URGP=0 Sep 18 11:16:42 firewall Shorewall:net2all:DROP: IN=ppp0 OUT= MAC= SRC=211.96.205.180 DST=69.0.45.229 LEN=48 TOS=00 PREC=0x00 TTL=104 ID=43929 CE DF PROTO=TCP SPT=4353 DPT=554 SEQ=1222527353 ACK=0 WINDOW=64240 SYN URGP=0 Sep 18 11:27:20 firewall Shorewall:net2all:DROP: IN=ppp0 OUT= MAC= SRC=67.70.108.44 DST=69.0.45.229 LEN=48 TOS=00 PREC=0x00 TTL=113 ID=24554 DF PROTO=TCP SPT=4928 DPT=2745 SEQ=643366081 ACK=0 WINDOW=64800 SYN URGP=0 Sep 18 11:27:23 firewall Shorewall:net2all:DROP: IN=ppp0 OUT= MAC= SRC=67.70.108.44 DST=69.0.45.229 LEN=48 TOS=00 PREC=0x00 TTL=113 ID=25507 DF PROTO=TCP SPT=4928 DPT=2745 SEQ=643366081 ACK=0 WINDOW=64800 SYN URGP=0 Sep 18 11:27:23 firewall Shorewall:net2all:DROP: IN=ppp0 OUT= MAC= SRC=67.70.108.44 DST=69.0.45.229 LEN=48 TOS=00 PREC=0x00 TTL=113 ID=25508 DF PROTO=TCP SPT=4929 DPT=2082 SEQ=643406446 ACK=0 WINDOW=64800 SYN URGP=0 Sep 18 11:30:38 firewall Shorewall:net2all:DROP: IN=ppp0 OUT= MAC= SRC=217.255.62.229 DST=69.0.45.229 LEN=40 TOS=00 PREC=0x00 TTL=240 ID=8606 PROTO=TCP SPT=1029 DPT=554 SEQ=757147 ACK=0 WINDOW=4096 SYN URGP=0 Sep 18 11:31:47 firewall Shorewall:net2all:DROP: IN=ppp0 OUT= MAC= SRC=220.201.194.148 DST=69.0.45.229 LEN=48 TOS=00 PREC=0x00 TTL=105 ID=43411 CE DF PROTO=TCP SPT=4717 DPT=1978 SEQ=4180826404 ACK=0 WINDOW=65535 SYN URGP=0 Sep 18 11:31:50 firewall Shorewall:net2all:DROP: IN=ppp0 OUT= MAC= SRC=220.201.194.148 DST=69.0.45.229 LEN=48 TOS=00 PREC=0x00 TTL=105 ID=43756 CE DF PROTO=TCP SPT=4717 DPT=1978 SEQ=4180826404 ACK=0 WINDOW=65535 SYN URGP=0 Sep 18 11:31:56 firewall Shorewall:net2all:DROP: IN=ppp0 OUT= MAC= SRC=220.201.194.148 DST=69.0.45.229 LEN=48 TOS=00 PREC=0x00 TTL=105 ID=44468 CE DF PROTO=TCP SPT=4717 DPT=1978 SEQ=4180826404 ACK=0 WINDOW=65535 SYN URGP=0 Sep 18 11:36:26 firewall Shorewall:net2all:DROP: IN=ppp0 OUT= MAC= SRC=213.33.16.41 DST=69.0.45.229 LEN=48 TOS=00 PREC=0x00 TTL=100 ID=19894 DF PROTO=TCP SPT=22508 DPT=1433 SEQ=3104964744 ACK=0 WINDOW=16384 SYN URGP=0 Sep 18 11:36:29 firewall Shorewall:net2all:DROP: IN=ppp0 OUT= MAC= SRC=213.33.16.41 DST=69.0.45.229 LEN=48 TOS=00 PREC=0x00 TTL=100 ID=20000 DF PROTO=TCP SPT=22508 DPT=1433 SEQ=3104964744 ACK=0 WINDOW=16384 SYN URGP=0 Sep 18 11:36:35 firewall Shorewall:net2all:DROP: IN=ppp0 OUT= MAC= SRC=213.33.16.41 DST=69.0.45.229 LEN=48 TOS=00 PREC=0x00 TTL=100 ID=20431 DF PROTO=TCP SPT=22508 DPT=1433 SEQ=3104964744 ACK=0 WINDOW=16384 SYN URGP=0 Sep 18 11:38:31 firewall Shorewall:net2all:DROP: IN=ppp0 OUT= MAC= SRC=68.0.45.229 DST=69.0.45.229 LEN=574 TOS=00 PREC=0x00 TTL=113 ID=53654 CE PROTO=UDP SPT=666 DPT=1026 LEN=554 Sep 18 11:40:16 firewall Shorewall:net2all:DROP: IN=ppp0 OUT= MAC= SRC=61.149.249.193 DST=69.0.45.229 LEN=40 TOS=00 PREC=0x00 TTL=167 ID=256 PROTO=TCP SPT=1127 DPT=4899 SEQ=1671816 ACK=0 WINDOW=512 SYN URGP=0
------------------------------------------------------- This SF.Net email is sponsored by: YOU BE THE JUDGE. Be one of 170 Project Admins to receive an Apple iPod Mini FREE for your judgement on who ports your project to Linux PPC the best. Sponsored by IBM. Deadline: Sept. 24. Go here: http://sf.net/ppc_contest.php ------------------------------------------------------------------------ leaf-user mailing list: [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/leaf-user SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html
------------------------------------------------------- This SF.Net email is sponsored by: YOU BE THE JUDGE. Be one of 170 Project Admins to receive an Apple iPod Mini FREE for your judgement on who ports your project to Linux PPC the best. Sponsored by IBM. Deadline: Sept. 24. Go here: http://sf.net/ppc_contest.php ------------------------------------------------------------------------ leaf-user mailing list: [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/leaf-user SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html
