I am stymied by my inability to establish the simplest connection with my test Bering-uClibc system:
/var/log/shorewall.log: Mar 22 00:38:35 PlatinumWALL Shorewall:net2all:DROP: IN=eth0 OUT= MAC=00:50:04:20:ec:d1:00:01:02:6c:6b:4b:08:00 SRC=192.168.123.150 DST=192.168.123.30 LEN=60 TOS=00 PREC=0x00 TTL=64 ID=31774 DF PROTO=TCP SPT=57576 DPT=22 SEQ=721372925 ACK=0 WINDOW=5840 SYN URGP=0 For those who miss the significance of this log entry, /usr/share/shorewall/rfc1918 has 192.168.0.0/16 commented OUT. Default /usr/share/shorewall/action.AllowSSH: ACCEPT - - tcp 22 Nearest I can tell, with my limited Shorewall experience, is this from `shorewall show': Chain net2all (2 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED 812 125K Drop all -- * * 0.0.0.0/0 0.0.0.0/0 I do not understand how these packets get to this point, much less what is `net2all' in the first place? Am I missing some critical documentation? What do you think? What am I missing? -- Best Regards, mds mds resource 877.596.8237 - Dare to fix things before they break . . . - Our capacity for understanding is inversely proportional to how much we think we know. The more I know, the more I know I don't know . . . --
signature.asc
Description: Digital signature