I've attached the dump as a text file.
Best Wishes
Linda
> We certainly would need a shorewall dump to figure this out.
>
> Prasanna.
>
> On Fri, Nov 7, 2008 at 12:33 PM, <[EMAIL PROTECTED]> wrote:
>> I've blocked an IP-range in my blacklist-file. The row in the file looks
>> like this:
>> 88.191.0.0/16
>>
>> This should block any and all traffic from addresses in the range
>> 88.191.0.0-88.191.255.255 but they still get through to perform brute
>> force attacks on my SSH server.
>>
>> Here's an example from my auth.log for yesterday:
>> Nov 4 20:14:39 dolly sshd[3532]: Invalid user ttf from 88.191.99.69
>> Nov 4 20:14:41 dolly sshd[3532]: Failed password for invalid user ttf
>> from 88.191.99.69 port 37898 ssh2
>>
>> Why is this, and how can I fix it?
>>
>> Best Wishes
>>
>> Linda
>>
>>
>> shorewall version: 4.2.1
>>
>> ip addr show:
>> 1: lo: <LOOPBACK,UP,10000> mtu 16436 qdisc noqueue
>> link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
>> inet 127.0.0.1/8 scope host lo
>> inet6 ::1/128 scope host
>> valid_lft forever preferred_lft forever
>> 2: eth1: <BROADCAST,MULTICAST,UP,10000> mtu 1500 qdisc pfifo_fast qlen
>> 1000
>> link/ether 00:08:a1:3c:12:f3 brd ff:ff:ff:ff:ff:ff
>> inet 192.168.0.102/24 brd 192.168.0.255 scope global eth1
>> inet6 fe80::208:a1ff:fe3c:12f3/64 scope link
>> valid_lft forever preferred_lft forever
>> 3: eth0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast
>> qlen 1000
>> link/ether 00:0e:a6:b0:fc:42 brd ff:ff:ff:ff:ff:ff
>> 4: sit0: <NOARP> mtu 1480 qdisc noop
>> link/sit 0.0.0.0 brd 0.0.0.0
>>
>> ip route show:
>> 192.168.0.0/24 dev eth1 proto kernel scope link src 192.168.0.102
>> default via 192.168.0.1 dev eth1
>>
>>
>>
>> -------------------------------------------------------------------------
>> This SF.Net email is sponsored by the Moblin Your Move Developer's
>> challenge
>> Build the coolest Linux based applications with Moblin SDK & win great
>> prizes
>> Grand prize is a trip for two to an Open Source event anywhere in the
>> world
>> http://moblin-contest.org/redirect.php?banner_id=100&url=/
>> _______________________________________________
>> Shorewall-users mailing list
>> [email protected]
>> https://lists.sourceforge.net/lists/listinfo/shorewall-users
>>
>
>
>
> --
> Want to manage multiple office networks?
> Want to securely connect all your locations?
> Want to do it in a budget?
> www.elinanetworks.com
>
> -------------------------------------------------------------------------
> This SF.Net email is sponsored by the Moblin Your Move Developer's
> challenge
> Build the coolest Linux based applications with Moblin SDK & win great
> prizes
> Grand prize is a trip for two to an Open Source event anywhere in the
> world
> http://moblin-contest.org/redirect.php?banner_id=100&url=/
> _______________________________________________
> Shorewall-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/shorewall-users
>
Shorewall 4.2.1 Dump at dolly.heksebua.com - Fri Nov 7 09:28:49 CET 2008
Shorewall-perl 4.2.1
Counters reset Thu Nov 6 11:20:52 CET 2008
Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
75296 4141K dynamic 0 -- * * 0.0.0.0/0 0.0.0.0/0
state INVALID,NEW
5728K 3212M net2fw 0 -- eth1 * 0.0.0.0/0 0.0.0.0/0
20088 8888K ACCEPT 0 -- lo * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT 0 -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 Drop 0 -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:INPUT:DROP:'
0 0 DROP 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 dynamic 0 -- * * 0.0.0.0/0 0.0.0.0/0
state INVALID,NEW
0 0 ACCEPT 0 -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 Reject 0 -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:FORWARD:REJECT:'
0 0 reject 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
3470K 3538M fw2net 0 -- * eth1 0.0.0.0/0 0.0.0.0/0
20088 8888K ACCEPT 0 -- * lo 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT 0 -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 Reject 0 -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:OUTPUT:REJECT:'
0 0 reject 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain Drop (2 references)
pkts bytes target prot opt in out source destination
3 144 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:113 /* Auth */
9584 841K dropBcast 0 -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 3 code 4 /* Needed ICMP types */
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 11 /* Needed ICMP types */
2440 173K dropInvalid 0 -- * * 0.0.0.0/0 0.0.0.0/0
2 64 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 135,445 /* SMB */
8 532 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpts:137:139 /* SMB */
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:137 dpts:1024:65535 /* SMB */
233 11320 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 135,139,445 /* SMB */
1 32 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:1900 /* UPnP */
1642 79124 dropNotSyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:53 /* Late DNS Replies */
Chain Reject (2 references)
pkts bytes target prot opt in out source destination
0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:113 /* Auth */
0 0 dropBcast 0 -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 3 code 4 /* Needed ICMP types */
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 11 /* Needed ICMP types */
0 0 dropInvalid 0 -- * * 0.0.0.0/0 0.0.0.0/0
0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 135,445 /* SMB */
0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpts:137:139 /* SMB */
0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:137 dpts:1024:65535 /* SMB */
0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 135,139,445 /* SMB */
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:1900 /* UPnP */
0 0 dropNotSyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:53 /* Late DNS Replies */
Chain dropBcast (2 references)
pkts bytes target prot opt in out source destination
2841 533K DROP 0 -- * * 0.0.0.0/0 0.0.0.0/0
ADDRTYPE match dst-type BROADCAST
4303 136K DROP 0 -- * * 0.0.0.0/0 224.0.0.0/4
Chain dropInvalid (2 references)
pkts bytes target prot opt in out source destination
1 40 DROP 0 -- * * 0.0.0.0/0 0.0.0.0/0
state INVALID
Chain dropNotSyn (2 references)
pkts bytes target prot opt in out source destination
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp flags:!0x17/0x02
Chain dynamic (2 references)
pkts bytes target prot opt in out source destination
Chain fw2net (1 references)
pkts bytes target prot opt in out source destination
3469K 3538M ACCEPT 0 -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
1040 91457 ACCEPT 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain logdrop (0 references)
pkts bytes target prot opt in out source destination
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:logdrop:DROP:'
0 0 DROP 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain logreject (0 references)
pkts bytes target prot opt in out source destination
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:logreject:REJECT:'
0 0 reject 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain net2fw (1 references)
pkts bytes target prot opt in out source destination
5655K 3208M ACCEPT 0 -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 3 code 4 /* Needed ICMP types */
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 11 /* Needed ICMP types */
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 8 /* Ping */
1 32 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpts:161:162 /* SNMP */
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:161 /* SNMP */
56054 2735K ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:80 /* HTTP */
3 156 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:443 /* HTTPS */
1 48 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:143 /* IMAP */ LOG flags 0 level 6 prefix
`Shorewall:net2fw:ACCEPT:'
1 48 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:143 /* IMAP */
0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:993 /* IMAPS */ LOG flags 0 level 6 prefix
`Shorewall:net2fw:ACCEPT:'
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:993 /* IMAPS */
2 96 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:3306 /* MySQL */ LOG flags 0 level 6 prefix
`Shorewall:net2fw:ACCEPT:'
2 96 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:3306 /* MySQL */
3 144 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:110 /* POP3 */ LOG flags 0 level 6 prefix
`Shorewall:net2fw:ACCEPT:'
3 144 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:110 /* POP3 */
0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:995 /* POP3S */ LOG flags 0 level 6 prefix
`Shorewall:net2fw:ACCEPT:'
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:995 /* POP3S */
16 792 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:25 /* SMTP */ LOG flags 0 level 6 prefix
`Shorewall:net2fw:ACCEPT:'
16 792 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:25 /* SMTP */
3 144 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:465 /* SMTPS */ LOG flags 0 level 6 prefix
`Shorewall:net2fw:ACCEPT:'
3 144 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:465 /* SMTPS */
7511 450K LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:22 /* SSH */ LOG flags 0 level 6 prefix
`Shorewall:net2fw:ACCEPT:'
7511 450K ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:22 /* SSH */
80 4024 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:10000 /* Webmin */ LOG flags 0 level 6 prefix
`Shorewall:net2fw:ACCEPT:'
80 4024 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:10000 /* Webmin */
26 1548 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:587 /* Submission */ LOG flags 0 level 6 prefix
`Shorewall:net2fw:ACCEPT:'
26 1548 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:587 /* Submission */
42 2220 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpts:5900:5909 /* VNC */
9587 841K Drop 0 -- * * 0.0.0.0/0 0.0.0.0/0
2195 161K LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:net2fw:DROP:'
2195 161K DROP 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain reject (9 references)
pkts bytes target prot opt in out source destination
0 0 DROP 0 -- * * 0.0.0.0/0 0.0.0.0/0
ADDRTYPE match src-type BROADCAST
0 0 DROP 0 -- * * 224.0.0.0/4 0.0.0.0/0
0 0 DROP 2 -- * * 0.0.0.0/0 0.0.0.0/0
3 144 REJECT tcp -- * * 0.0.0.0/0 0.0.0.0/0
reject-with tcp-reset
0 0 REJECT udp -- * * 0.0.0.0/0 0.0.0.0/0
reject-with icmp-port-unreachable
0 0 REJECT icmp -- * * 0.0.0.0/0 0.0.0.0/0
reject-with icmp-host-unreachable
0 0 REJECT 0 -- * * 0.0.0.0/0 0.0.0.0/0
reject-with icmp-host-prohibited
Chain shorewall (0 references)
pkts bytes target prot opt in out source destination
Chain smurfs (0 references)
pkts bytes target prot opt in out source destination
0 0 RETURN 0 -- * * 0.0.0.0 0.0.0.0/0
0 0 LOG 0 -- * * 0.0.0.0/0 0.0.0.0/0
ADDRTYPE match src-type BROADCAST LOG flags 0 level 6 prefix
`Shorewall:smurfs:DROP:'
0 0 DROP 0 -- * * 0.0.0.0/0 0.0.0.0/0
ADDRTYPE match src-type BROADCAST
0 0 LOG 0 -- * * 224.0.0.0/4 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:'
0 0 DROP 0 -- * * 224.0.0.0/4 0.0.0.0/0
Log (/var/log/messages)
Nov 7 01:01:42 net2fw:DROP:IN=eth1 OUT= SRC=219.138.39.9 DST=192.168.0.102
LEN=404 TOS=0x00 PREC=0x00 TTL=51 ID=48276 PROTO=UDP SPT=4220 DPT=1434 LEN=384
Nov 7 01:03:56 net2fw:ACCEPT:IN=eth1 OUT= SRC=204.16.252.100 DST=192.168.0.102
LEN=60 TOS=0x00 PREC=0x00 TTL=38 ID=39181 PROTO=TCP SPT=46067 DPT=587
WINDOW=5840 RES=0x00 SYN URGP=0
Nov 7 01:37:05 net2fw:ACCEPT:IN=eth1 OUT= SRC=204.16.252.100 DST=192.168.0.102
LEN=60 TOS=0x00 PREC=0x00 TTL=33 ID=56359 PROTO=TCP SPT=46968 DPT=587
WINDOW=5840 RES=0x00 SYN URGP=0
Nov 7 02:04:37 net2fw:DROP:IN=eth1 OUT= SRC=218.22.244.45 DST=192.168.0.102
LEN=404 TOS=0x00 PREC=0x00 TTL=117 ID=40676 PROTO=UDP SPT=1481 DPT=1434 LEN=384
Nov 7 04:25:06 net2fw:DROP:IN=eth1 OUT= SRC=202.96.61.149 DST=192.168.0.102
LEN=40 TOS=0x00 PREC=0x00 TTL=238 ID=60840 PROTO=TCP SPT=111 DPT=111 WINDOW=40
RES=0x00 SYN URGP=0
Nov 7 04:33:36 net2fw:ACCEPT:IN=eth1 OUT= SRC=204.16.252.100 DST=192.168.0.102
LEN=60 TOS=0x00 PREC=0x00 TTL=41 ID=56393 PROTO=TCP SPT=37025 DPT=587
WINDOW=5840 RES=0x00 SYN URGP=0
Nov 7 05:57:54 net2fw:DROP:IN=eth1 OUT= SRC=204.228.149.113 DST=192.168.0.102
LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=19155 DF PROTO=TCP SPT=4057 DPT=23
WINDOW=18276 RES=0x00 SYN URGP=0
Nov 7 07:13:36 net2fw:DROP:IN=eth1 OUT= SRC=218.0.1.90 DST=192.168.0.102
LEN=404 TOS=0x00 PREC=0x00 TTL=110 ID=13594 PROTO=UDP SPT=2441 DPT=1434 LEN=384
Nov 7 08:04:04 net2fw:ACCEPT:IN=eth1 OUT= SRC=158.38.34.55 DST=192.168.0.102
LEN=48 TOS=0x00 PREC=0x00 TTL=114 ID=16925 DF PROTO=TCP SPT=1299 DPT=22
WINDOW=64512 RES=0x00 SYN URGP=0
Nov 7 08:07:37 net2fw:ACCEPT:IN=eth1 OUT= SRC=204.16.252.100 DST=192.168.0.102
LEN=60 TOS=0x00 PREC=0x00 TTL=36 ID=60327 PROTO=TCP SPT=37132 DPT=587
WINDOW=5840 RES=0x00 SYN URGP=0
Nov 7 08:16:59 net2fw:ACCEPT:IN=eth1 OUT= SRC=93.123.102.2 DST=192.168.0.102
LEN=48 TOS=0x00 PREC=0x00 TTL=114 ID=25300 PROTO=TCP SPT=55562 DPT=10000
WINDOW=65535 RES=0x00 SYN URGP=0
Nov 7 08:17:39 net2fw:ACCEPT:IN=eth1 OUT= SRC=93.123.102.2 DST=192.168.0.102
LEN=60 TOS=0x00 PREC=0x00 TTL=50 ID=28727 DF PROTO=TCP SPT=45369 DPT=10000
WINDOW=5840 RES=0x00 SYN URGP=0
Nov 7 08:18:55 net2fw:DROP:IN=eth1 OUT= SRC=218.61.126.254 DST=192.168.0.102
LEN=40 TOS=0x00 PREC=0x00 TTL=100 ID=256 PROTO=TCP SPT=6000 DPT=2967
WINDOW=16384 RES=0x00 SYN URGP=0
Nov 7 08:26:31 net2fw:DROP:IN=eth1 OUT= SRC=158.38.31.42 DST=192.168.0.102
LEN=69 TOS=0x00 PREC=0x00 TTL=114 ID=49342 PROTO=UDP SPT=3657 DPT=53 LEN=49
Nov 7 08:26:33 net2fw:DROP:IN=eth1 OUT= SRC=158.38.31.42 DST=192.168.0.102
LEN=58 TOS=0x00 PREC=0x00 TTL=114 ID=49349 PROTO=UDP SPT=3658 DPT=53 LEN=38
Nov 7 08:26:58 net2fw:DROP:IN=eth1 OUT= SRC=159.226.47.213 DST=192.168.0.102
LEN=40 TOS=0x00 PREC=0x00 TTL=108 ID=256 PROTO=TCP SPT=6000 DPT=1433
WINDOW=16384 RES=0x00 SYN URGP=0
Nov 7 08:28:27 net2fw:ACCEPT:IN=eth1 OUT= SRC=158.38.31.42 DST=192.168.0.102
LEN=48 TOS=0x00 PREC=0x00 TTL=114 ID=2967 DF PROTO=TCP SPT=3667 DPT=22
WINDOW=64512 RES=0x00 SYN URGP=0
Nov 7 09:15:21 net2fw:ACCEPT:IN=eth1 OUT= SRC=204.16.252.100 DST=192.168.0.102
LEN=60 TOS=0x00 PREC=0x00 TTL=42 ID=22110 PROTO=TCP SPT=39385 DPT=587
WINDOW=5840 RES=0x00 SYN URGP=0
Nov 7 09:16:33 net2fw:ACCEPT:IN=eth1 OUT= SRC=204.16.252.100 DST=192.168.0.102
LEN=60 TOS=0x00 PREC=0x00 TTL=42 ID=25387 PROTO=TCP SPT=45450 DPT=587
WINDOW=5840 RES=0x00 SYN URGP=0
Nov 7 09:28:08 net2fw:ACCEPT:IN=eth1 OUT= SRC=158.38.31.42 DST=192.168.0.102
LEN=48 TOS=0x00 PREC=0x00 TTL=114 ID=17473 DF PROTO=TCP SPT=4179 DPT=22
WINDOW=64512 RES=0x00 SYN URGP=0
NAT Table
Chain PREROUTING (policy ACCEPT 72874 packets, 4006K bytes)
pkts bytes target prot opt in out source destination
Chain POSTROUTING (policy ACCEPT 2492 packets, 152K bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 2489 packets, 152K bytes)
pkts bytes target prot opt in out source destination
Mangle Table
Chain PREROUTING (policy ACCEPT 5748K packets, 3221M bytes)
pkts bytes target prot opt in out source destination
5748K 3221M tcpre 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain INPUT (policy ACCEPT 5748K packets, 3221M bytes)
pkts bytes target prot opt in out source destination
Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 tcfor 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT 3490K packets, 3547M bytes)
pkts bytes target prot opt in out source destination
3490K 3547M tcout 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain POSTROUTING (policy ACCEPT 3490K packets, 3547M bytes)
pkts bytes target prot opt in out source destination
3490K 3547M tcpost 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain tcfor (1 references)
pkts bytes target prot opt in out source destination
Chain tcout (1 references)
pkts bytes target prot opt in out source destination
Chain tcpost (1 references)
pkts bytes target prot opt in out source destination
Chain tcpre (1 references)
pkts bytes target prot opt in out source destination
Conntrack Table
tcp 6 18 TIME_WAIT src=127.0.0.1 dst=127.0.0.1 sport=40317 dport=143
packets=20 bytes=1402 src=127.0.0.1 dst=127.0.0.1 sport=143 dport=40317
packets=19 bytes=6325 [ASSURED] mark=0 use=1
tcp 6 16 TIME_WAIT src=127.0.0.1 dst=127.0.0.1 sport=40316 dport=143
packets=12 bytes=812 src=127.0.0.1 dst=127.0.0.1 sport=143 dport=40316
packets=13 bytes=1335 [ASSURED] mark=0 use=1
tcp 6 167115 ESTABLISHED src=192.168.0.102 dst=125.95.96.57 sport=80
dport=23561 packets=1 bytes=1464 [UNREPLIED] src=125.95.96.57 dst=192.168.0.102
sport=23561 dport=80 packets=0 bytes=0 mark=0 use=1
tcp 6 22 TIME_WAIT src=127.0.0.1 dst=127.0.0.1 sport=40318 dport=143
packets=18 bytes=1126 src=127.0.0.1 dst=127.0.0.1 sport=143 dport=40318
packets=16 bytes=11097 [ASSURED] mark=0 use=1
tcp 6 34 TIME_WAIT src=127.0.0.1 dst=127.0.0.1 sport=40319 dport=143
packets=18 bytes=1126 src=127.0.0.1 dst=127.0.0.1 sport=143 dport=40319
packets=16 bytes=11056 [ASSURED] mark=0 use=1
tcp 6 111 TIME_WAIT src=217.212.224.186 dst=192.168.0.102 sport=37142
dport=80 packets=5 bytes=506 src=192.168.0.102 dst=217.212.224.186 sport=80
dport=37142 packets=5 bytes=1110 [ASSURED] mark=0 use=1
tcp 6 431999 ESTABLISHED src=158.38.31.42 dst=192.168.0.102 sport=4179
dport=22 packets=209 bytes=19884 src=192.168.0.102 dst=158.38.31.42 sport=22
dport=4179 packets=221 bytes=58740 [ASSURED] mark=0 use=1
tcp 6 128246 ESTABLISHED src=192.168.0.102 dst=136.163.203.3 sport=80
dport=39212 packets=3 bytes=4392 [UNREPLIED] src=136.163.203.3
dst=192.168.0.102 sport=39212 dport=80 packets=0 bytes=0 mark=0 use=1
udp 17 140 src=192.168.0.102 dst=192.168.0.1 sport=32908 dport=53
packets=2 bytes=136 src=192.168.0.1 dst=192.168.0.102 sport=53 dport=32908
packets=2 bytes=185 [ASSURED] mark=0 use=1
tcp 6 128277 ESTABLISHED src=192.168.0.102 dst=136.163.203.3 sport=80
dport=40593 packets=3 bytes=4392 [UNREPLIED] src=136.163.203.3
dst=192.168.0.102 sport=40593 dport=80 packets=0 bytes=0 mark=0 use=1
tcp 6 111 TIME_WAIT src=217.212.224.183 dst=192.168.0.102 sport=47770
dport=80 packets=6 bytes=471 src=192.168.0.102 dst=217.212.224.183 sport=80
dport=47770 packets=5 bytes=702 [ASSURED] mark=0 use=1
tcp 6 55 TIME_WAIT src=158.38.31.42 dst=192.168.0.102 sport=4175 dport=80
packets=32 bytes=4981 src=192.168.0.102 dst=158.38.31.42 sport=80 dport=4175
packets=54 bytes=62263 [ASSURED] mark=0 use=1
tcp 6 8 TIME_WAIT src=127.0.0.1 dst=127.0.0.1 sport=40315 dport=143
packets=20 bytes=1402 src=127.0.0.1 dst=127.0.0.1 sport=143 dport=40315
packets=19 bytes=6774 [ASSURED] mark=0 use=1
tcp 6 431998 ESTABLISHED src=158.38.31.42 dst=192.168.0.102 sport=4033
dport=22 packets=36051 bytes=4013967 src=192.168.0.102 dst=158.38.31.42
sport=22 dport=4033 packets=36056 bytes=1553324 [ASSURED] mark=0 use=1
tcp 6 140888 ESTABLISHED src=82.194.195.149 dst=192.168.0.102 sport=23055
dport=80 packets=7 bytes=288 src=192.168.0.102 dst=82.194.195.149 sport=80
dport=23055 packets=1 bytes=48 [ASSURED] mark=0 use=1
tcp 6 215661 ESTABLISHED src=192.168.0.102 dst=85.93.237.161 sport=80
dport=24692 packets=1 bytes=1464 [UNREPLIED] src=85.93.237.161
dst=192.168.0.102 sport=24692 dport=80 packets=0 bytes=0 mark=0 use=1
tcp 6 30758 ESTABLISHED src=192.168.0.102 dst=81.236.212.179 sport=80
dport=54689 packets=1 bytes=1464 [UNREPLIED] src=81.236.212.179
dst=192.168.0.102 sport=54689 dport=80 packets=0 bytes=0 mark=0 use=1
IP Configuration
1: lo: <LOOPBACK,UP,10000> mtu 16436 qdisc noqueue
inet 127.0.0.1/8 scope host lo
2: eth1: <BROADCAST,MULTICAST,UP,10000> mtu 1500 qdisc pfifo_fast qlen 1000
inet 192.168.0.102/24 brd 192.168.0.255 scope global eth1
IP Stats
1: lo: <LOOPBACK,UP,10000> mtu 16436 qdisc noqueue
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
RX: bytes packets errors dropped overrun mcast
15911710 25263 0 0 0 0
TX: bytes packets errors dropped carrier collsns
15911710 25263 0 0 0 0
2: eth1: <BROADCAST,MULTICAST,UP,10000> mtu 1500 qdisc pfifo_fast qlen 1000
link/ether 00:08:a1:3c:12:f3 brd ff:ff:ff:ff:ff:ff
RX: bytes packets errors dropped overrun mcast
3301347276 5742223 0 0 0 0
TX: bytes packets errors dropped carrier collsns
3591106163 3478579 0 0 0 0
3: eth0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000
link/ether 00:0e:a6:b0:fc:42 brd ff:ff:ff:ff:ff:ff
RX: bytes packets errors dropped overrun mcast
0 0 0 0 0 0
TX: bytes packets errors dropped carrier collsns
0 0 0 0 0 0
4: sit0: <NOARP> mtu 1480 qdisc noop
link/sit 0.0.0.0 brd 0.0.0.0
RX: bytes packets errors dropped overrun mcast
0 0 0 0 0 0
TX: bytes packets errors dropped carrier collsns
0 0 0 0 0 0
/proc
/proc/version = Linux version 2.6.18-6-686 (Debian 2.6.18.dfsg.1-23) ([EMAIL
PROTECTED]) (gcc version 4.1.2 20061115 (prerelease) (Debian 4.1.1-21)) #1 SMP
Mon Oct 13 16:13:09 UTC 2008
/proc/sys/net/ipv4/ip_forward = 1
/proc/sys/net/ipv4/icmp_echo_ignore_all = 0
/proc/sys/net/ipv4/conf/all/proxy_arp = 0
/proc/sys/net/ipv4/conf/all/arp_filter = 0
/proc/sys/net/ipv4/conf/all/arp_ignore = 0
/proc/sys/net/ipv4/conf/all/rp_filter = 1
/proc/sys/net/ipv4/conf/all/log_martians = 1
/proc/sys/net/ipv4/conf/default/proxy_arp = 0
/proc/sys/net/ipv4/conf/default/arp_filter = 0
/proc/sys/net/ipv4/conf/default/arp_ignore = 0
/proc/sys/net/ipv4/conf/default/rp_filter = 0
/proc/sys/net/ipv4/conf/default/log_martians = 1
/proc/sys/net/ipv4/conf/eth1/proxy_arp = 0
/proc/sys/net/ipv4/conf/eth1/arp_filter = 0
/proc/sys/net/ipv4/conf/eth1/arp_ignore = 0
/proc/sys/net/ipv4/conf/eth1/rp_filter = 0
/proc/sys/net/ipv4/conf/eth1/log_martians = 1
/proc/sys/net/ipv4/conf/lo/proxy_arp = 0
/proc/sys/net/ipv4/conf/lo/arp_filter = 0
/proc/sys/net/ipv4/conf/lo/arp_ignore = 0
/proc/sys/net/ipv4/conf/lo/rp_filter = 0
/proc/sys/net/ipv4/conf/lo/log_martians = 1
Routing Rules
0: from all lookup 255
32766: from all lookup main
32767: from all lookup default
Table 255:
broadcast 192.168.0.255 dev eth1 proto kernel scope link src 192.168.0.102
broadcast 127.255.255.255 dev lo proto kernel scope link src 127.0.0.1
broadcast 192.168.0.0 dev eth1 proto kernel scope link src 192.168.0.102
local 192.168.0.102 dev eth1 proto kernel scope host src 192.168.0.102
broadcast 127.0.0.0 dev lo proto kernel scope link src 127.0.0.1
local 127.0.0.1 dev lo proto kernel scope host src 127.0.0.1
local 127.0.0.0/8 dev lo proto kernel scope host src 127.0.0.1
Table default:
Table main:
192.168.0.0/24 dev eth1 proto kernel scope link src 192.168.0.102
default via 192.168.0.1 dev eth1
ARP
? (192.168.0.1) at 00:13:46:85:61:D5 [ether] on eth1
Modules
ip_conntrack 49088 24
ipt_MASQUERADE,ip_nat_tftp,ip_nat_snmp_basic,ip_nat_sip,ip_nat_pptp,ip_nat_irc,ip_nat_h323,ip_nat_ftp,ip_nat_amanda,ip_conntrack_tftp,ip_conntrack_sip,ip_conntrack_pptp,ip_conntrack_netbios_ns,ip_conntrack_irc,ip_conntrack_h323,ip_conntrack_ftp,ip_conntrack_amanda,xt_helper,xt_conntrack,xt_CONNMARK,xt_connmark,xt_state,iptable_nat,ip_nat
ip_conntrack_amanda 4932 1 ip_nat_amanda
ip_conntrack_ftp 7760 1 ip_nat_ftp
ip_conntrack_h323 47676 1 ip_nat_h323
ip_conntrack_irc 6800 1 ip_nat_irc
ip_conntrack_netbios_ns 3040 0
ip_conntrack_pptp 11504 1 ip_nat_pptp
ip_conntrack_sip 7376 1 ip_nat_sip
ip_conntrack_tftp 4344 1 ip_nat_tftp
ip_nat 16876 12
ipt_SAME,ipt_REDIRECT,ipt_NETMAP,ipt_MASQUERADE,ip_nat_tftp,ip_nat_sip,ip_nat_pptp,ip_nat_irc,ip_nat_h323,ip_nat_ftp,ip_nat_amanda,iptable_nat
ip_nat_amanda 2400 0
ip_nat_ftp 3328 0
ip_nat_h323 7104 0
ip_nat_irc 2720 0
ip_nat_pptp 5988 0
ip_nat_sip 4096 0
ip_nat_snmp_basic 9380 0
ip_nat_tftp 1920 0
iptable_filter 3104 1
iptable_mangle 2880 1
iptable_nat 7044 0
iptable_raw 2144 0
ip_tables 13028 4
iptable_raw,iptable_nat,iptable_mangle,iptable_filter
ipt_addrtype 1952 4
ipt_ah 2016 0
ipt_CLUSTERIP 8196 0
ipt_dscp 1792 0
ipt_DSCP 2336 0
ipt_ecn 2304 0
ipt_ECN 3072 0
ipt_hashlimit 8744 0
ipt_iprange 1888 0
ipt_LOG 6112 18
ipt_MASQUERADE 3712 0
ipt_NETMAP 2176 0
ipt_owner 2080 0
ipt_recent 8432 0
ipt_REDIRECT 2176 0
ipt_REJECT 5248 4
ipt_SAME 2496 0
ipt_TCPMSS 4096 0
ipt_tos 1760 0
ipt_TOS 2304 0
ipt_ttl 1984 0
ipt_TTL 2400 0
ipt_ULOG 7780 0
xt_CLASSIFY 1984 0
xt_comment 1952 46
xt_connmark 2144 0
xt_CONNMARK 2464 0
xt_conntrack 2624 0
xt_dccp 3396 0
xt_helper 2560 0
xt_length 2048 0
xt_limit 2752 0
xt_mac 2016 0
xt_mark 1984 0
xt_MARK 2464 0
xt_multiport 3264 4
xt_NFQUEUE 2144 0
xt_physdev 3024 0
xt_pkttype 2016 0
xt_policy 3648 0
xt_realm 1824 0
xt_state 2272 8
xt_tcpmss 2336 0
xt_tcpudp 3136 36
Shorewall has detected the following iptables/netfilter capabilities:
NAT: Available
Packet Mangling: Available
Multi-port Match: Available
Extended Multi-port Match: Available
Connection Tracking Match: Available
Extended Connection Tracking Match Support: Not available
Packet Type Match: Available
Policy Match: Available
Physdev Match: Available
Physdev-is-bridged Support: Available
Packet length Match: Available
IP range Match: Available
Recent Match: Available
Owner Match: Available
Ipset Match: Not available
CONNMARK Target: Available
Extended CONNMARK Target: Available
Connmark Match: Available
Extended Connmark Match: Available
Raw Table: Available
IPP2P Match: Not available
CLASSIFY Target: Available
Extended REJECT: Available
Repeat match: Available
MARK Target: Available
Extended MARK Target: Available
Mangle FORWARD Chain: Available
Comments: Available
Address Type Match: Available
TCPMSS Match: Available
Hashlimit Match: Available
NFQUEUE Target: Available
Realm Match: Available
Helper Match: Available
Connlimit Match: Not available
Time Match: Not available
Traffic Control
Device eth1:
qdisc pfifo_fast 0: bands 3 priomap 1 2 2 2 1 2 0 0 1 1 1 1 1 1 1 1
Sent 3586809135 bytes 3478579 pkt (dropped 0, overlimits 0 requeues 0)
rate 0bit 0pps backlog 0b 0p requeues 0
Device eth0:
qdisc pfifo_fast 0: bands 3 priomap 1 2 2 2 1 2 0 0 1 1 1 1 1 1 1 1
Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0)
rate 0bit 0pps backlog 0b 0p requeues 0
TC Filters
Device eth1:
Device eth0:
-------------------------------------------------------------------------
This SF.Net email is sponsored by the Moblin Your Move Developer's challenge
Build the coolest Linux based applications with Moblin SDK & win great prizes
Grand prize is a trip for two to an Open Source event anywhere in the world
http://moblin-contest.org/redirect.php?banner_id=100&url=/
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users