On Tuesday, May 07, 2013 05:15:09 PM Tom Eastep wrote:
> > Chain INPUT (policy DROP 0 packets, 0 bytes)
> >  pkts bytes target     prot opt in     out     source               
> > destination         
> >   104 10002 ACCEPT     all  --  *      *       0.0.0.0/0            
> > 0.0.0.0/0            ctstate RELATED,ESTABLISHED
> >  
> > Chain FORWARD (policy DROP 0 packets, 0 bytes)
> >  pkts bytes target     prot opt in     out     source               
> > destination         
> >     0     0 ACCEPT     all  --  *      *       0.0.0.0/0            
> > 0.0.0.0/0            ctstate RELATED,ESTABLISHED
> >  
> > Chain OUTPUT (policy DROP 0 packets, 0 bytes)
> >  pkts bytes target     prot opt in     out     source               
> > destination         
> >    98  6364 ACCEPT     all  --  *      *       0.0.0.0/0            
> > 0.0.0.0/0            ctstate RELATED,ESTABLISHED
> >  
> 
> Impossible to tell -- if eth0 is your net interface, then *you* are
> allowing traffic from that interface in /etc/shorewall/routestopped or
> /etc/shorewall/stoppedrules. If it is an internal interface, then your
> firewall is safe from new connections.

These specifically, look to me like everything is open.

wlan0 is internet-connected.  

------------------------------------------------------------------------------
Learn Graph Databases - Download FREE O'Reilly Book
"Graph Databases" is the definitive new guide to graph databases and 
their applications. This 200-page book is written by three acclaimed 
leaders in the field. The early access version is available now. 
Download your free book today! http://p.sf.net/sfu/neotech_d2d_may
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to