Here is the dump with it started.
While I had it in the 'cleared' state, all this time since my last post,
email came in, but it was from an address already in the whitelist for spam
assasin, so still not sure whats going on. The other email I sent last night
that I was told today was delayed another 9 hours, has still not arrived, ,
odd...
==
Steve
----- Original Message -----
From: "Tom Eastep" <[email protected]>
To: <[email protected]>
Sent: Thursday, November 26, 2015 2:52 PM
Subject: Re: [Shorewall-users] Shorewall 4.5.21.6
On 11/26/2015 9:43 AM, Teknoskillz wrote:
Tom:
Thanks for that assistance.
Shorewall dump said the /var/log/messages file was not present. Had to
edit /etc/rsyslog.d/50-default.conf
and uncomment out 3 lines , and restart syslog, now the dump works.
Dumped it to a text file, attached here to this message.
We need to see a dump taken when Shorewall is in the 'started' state,
and when mail is being rejected.
-Tom
--
Tom Eastep \ When I die, I want to go like my Grandfather who
Shoreline, \ died peacefully in his sleep. Not screaming like
Washington, USA \ all of the passengers in his car
http://shorewall.net \________________________________________________
------------------------------------------------------------------------------
Go from Idea to Many App Stores Faster with Intel(R) XDK
Give your users amazing mobile app experiences with Intel(R) XDK.
Use one codebase in this all-in-one HTML5 development environment.
Design, debug & build mobile apps & 2D/3D high-impact games for multiple
OSs.
http://pubads.g.doubleclick.net/gampad/clk?id=254741551&iu=/4140
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users
Shorewall is running
State:Started (Thu Nov 26 15:37:43 EST 2015) from /etc/shorewall/
/var/lib/shorewall/firewall was compiled by Shorewall version 4.5.21.6
Counters reset Thu Nov 26 15:37:43 EST 2015
Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
272 39103 net2fw all -- eth0 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix "Shorewall:INPUT:REJECT:"
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
[goto]
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix "Shorewall:FORWARD:REJECT:"
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
[goto]
Chain OUTPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
201 109K fw2net all -- * eth0 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- * lo 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain Broadcast (2 references)
pkts bytes target prot opt in out source destination
49 13765 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
ADDRTYPE match dst-type BROADCAST
1 32 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
ADDRTYPE match dst-type MULTICAST
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
ADDRTYPE match dst-type ANYCAST
Chain Drop (1 references)
pkts bytes target prot opt in out source destination
52 13917 all -- * * 0.0.0.0/0 0.0.0.0/0
52 13917 Broadcast all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmptype 3 code 4 /* Needed ICMP types */
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmptype 11 /* Needed ICMP types */
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 135,445 /* SMB */
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpts:137:139 /* SMB */
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:137 dpts:1024:65535 /* SMB */
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 135,139,445 /* SMB */
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:1900 /* UPnP */
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp flags:!0x17/0x02
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:53 /* Late DNS Replies */
Chain Reject (2 references)
pkts bytes target prot opt in out source destination
0 0 all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 Broadcast all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmptype 3 code 4 /* Needed ICMP types */
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmptype 11 /* Needed ICMP types */
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID
0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 135,445 /* SMB */
0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpts:137:139 /* SMB */
0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:137 dpts:1024:65535 /* SMB */
0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0
multiport dports 135,139,445 /* SMB */
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:1900 /* UPnP */
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp flags:!0x17/0x02
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:53 /* Late DNS Replies */
Chain dynamic (1 references)
pkts bytes target prot opt in out source destination
Chain fw2net (1 references)
pkts bytes target prot opt in out source destination
168 106K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
33 2674 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain logdrop (0 references)
pkts bytes target prot opt in out source destination
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain logflags (5 references)
pkts bytes target prot opt in out source destination
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 4 level 6 prefix "Shorewall:logflags:DROP:"
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain logreject (0 references)
pkts bytes target prot opt in out source destination
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
Chain net2fw (1 references)
pkts bytes target prot opt in out source destination
82 15497 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID,NEW,UNTRACKED
82 15497 smurfs all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate INVALID,NEW,UNTRACKED
189 17414 tcpflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
190 23606 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
ctstate RELATED,ESTABLISHED
0 0 ~log0 all -- * * 108.59.0.0/16 0.0.0.0/0
[goto]
0 0 ~log0 all -- * * 173.95.0.0/16 0.0.0.0/0
[goto]
0 0 ACCEPT icmp -- * * 50.136.0.0/16 0.0.0.0/0
icmptype 8 /* Ping */
0 0 ACCEPT tcp -- * * 50.198.0.0/16 0.0.0.0/0
tcp dpt:22 /* SSH */
0 0 ACCEPT tcp -- * * 173.162.0.0/16 0.0.0.0/0
tcp dpt:22 /* SSH */
0 0 ACCEPT tcp -- * * 75.68.0.0/16 0.0.0.0/0
tcp dpt:22 /* SSH */
0 0 ACCEPT tcp -- * * 202.22.143.149 0.0.0.0/0
tcp dpt:22 /* SSH */
0 0 ACCEPT tcp -- * * 216.87.0.195 0.0.0.0/0
tcp dpt:22 /* SSH */
0 0 ACCEPT tcp -- * * 216.65.65.26 0.0.0.0/0
tcp dpt:22 /* SSH */
0 0 ACCEPT tcp -- * * 176.74.162.0/25 0.0.0.0/0
tcp dpt:22 /* SSH */
0 0 ACCEPT tcp -- * * 176.74.172.32/27 0.0.0.0/0
tcp dpt:22 /* SSH */
0 0 ACCEPT tcp -- * * 24.91.0.0/16 0.0.0.0/0
tcp dpt:22 /* SSH */
0 0 ACCEPT tcp -- * * 76.119.0.0/16 0.0.0.0/0
tcp dpt:22 /* SSH */
0 0 ACCEPT tcp -- * * 67.186.0.0/16 0.0.0.0/0
tcp dpt:22 /* SSH */
0 0 ACCEPT tcp -- * * 73.4.0.0/16 0.0.0.0/0
tcp dpt:22 /* SSH */
0 0 ACCEPT tcp -- * * 76.127.0.0/16 0.0.0.0/0
tcp dpt:22 /* SSH */
2 104 ACCEPT tcp -- * * 50.136.0.0/16 0.0.0.0/0
tcp dpt:22 /* SSH */
0 0 ACCEPT tcp -- * * 73.142.0.0/16 0.0.0.0/0
tcp dpt:22 /* SSH */
0 0 ACCEPT tcp -- * * 64.251.0.0/16 0.0.0.0/0
tcp dpt:22 /* SSH */
0 0 ACCEPT tcp -- * * 73.238.0.0/16 0.0.0.0/0
tcp dpt:22 /* SSH */
4 240 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:80 /* HTTP */
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:443 /* HTTPS */
0 0 ACCEPT tcp -- * * 50.136.0.0/16 0.0.0.0/0
tcp dpt:21 /* FTP */
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:53 /* DNS */
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:53 /* DNS */
24 1236 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:25 /* SMTP */
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:465 /* SMTPS */
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:143 /* IMAP */
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:993 /* IMAPS */
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:110 /* POP3 */
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:995 /* POP3S */
0 0 ACCEPT tcp -- * * 202.22.143.149 0.0.0.0/0
tcp dpt:4949
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:26111
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:26150
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:26050
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:26995
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:20000
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:10000
52 13917 Drop all -- * * 0.0.0.0/0 0.0.0.0/0
2 120 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix "Shorewall:net2fw:DROP:"
2 120 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain reject (7 references)
pkts bytes target prot opt in out source destination
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
ADDRTYPE match src-type BROADCAST
0 0 DROP all -- * * 224.0.0.0/4 0.0.0.0/0
0 0 DROP 2 -- * * 0.0.0.0/0 0.0.0.0/0
0 0 REJECT tcp -- * * 0.0.0.0/0 0.0.0.0/0
reject-with tcp-reset
0 0 REJECT udp -- * * 0.0.0.0/0 0.0.0.0/0
reject-with icmp-port-unreachable
0 0 REJECT icmp -- * * 0.0.0.0/0 0.0.0.0/0
reject-with icmp-host-unreachable
0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0
reject-with icmp-host-prohibited
Chain shorewall (0 references)
pkts bytes target prot opt in out source destination
0 0 all -- * * 0.0.0.0/0 0.0.0.0/0
recent: SET name: %CURRENTTIME side: source mask: 255.255.255.255
Chain smurflog (2 references)
pkts bytes target prot opt in out source destination
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix "Shorewall:smurfs:DROP:"
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain smurfs (1 references)
pkts bytes target prot opt in out source destination
11 3302 RETURN all -- * * 0.0.0.0 0.0.0.0/0
0 0 smurflog all -- * * 0.0.0.0/0 0.0.0.0/0
[goto] ADDRTYPE match src-type BROADCAST
0 0 smurflog all -- * * 224.0.0.0/4 0.0.0.0/0
[goto]
Chain tcpflags (1 references)
pkts bytes target prot opt in out source destination
0 0 logflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
[goto] tcp flags:0x3F/0x29
0 0 logflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
[goto] tcp flags:0x3F/0x00
0 0 logflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
[goto] tcp flags:0x06/0x06
0 0 logflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
[goto] tcp flags:0x03/0x03
0 0 logflags tcp -- * * 0.0.0.0/0 0.0.0.0/0
[goto] tcp spt:0 flags:0x17/0x02
Chain ~log0 (2 references)
pkts bytes target prot opt in out source destination
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 4 prefix "Shorewall:net2fw:DROP:"
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Log (/var/log/messages)
Nov 26 15:38:09 net2fw:DROP:IN=eth0 OUT= SRC=118.97.147.27 DST=65.111.162.249 LE
N=60 TOS=0x08 PREC=0x20 TTL=53 ID=38882 DF PROTO=TCP SPT=54451 DPT=22 WINDOW=584
0 RES=0x00 SYN URGP=0
Nov 26 15:38:12 net2fw:DROP:IN=eth0 OUT= SRC=118.97.147.27 DST=65.111.162.249 LE
N=60 TOS=0x08 PREC=0x20 TTL=53 ID=38883 DF PROTO=TCP SPT=54451 DPT=22 WINDOW=584
0 RES=0x00 SYN URGP=0
NAT Table
Chain PREROUTING (policy ACCEPT 724 packets, 59288 bytes)
pkts bytes target prot opt in out source destination
Chain INPUT (policy ACCEPT 6 packets, 344 bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 19 packets, 1526 bytes)
pkts bytes target prot opt in out source destination
Chain POSTROUTING (policy ACCEPT 19 packets, 1526 bytes)
pkts bytes target prot opt in out source destination
Mangle Table
Chain PREROUTING (policy ACCEPT 858 packets, 83645 bytes)
pkts bytes target prot opt in out source destination
1108 102K tcpre all -- * * 0.0.0.0/0 0.0.0.0/0
Chain INPUT (policy ACCEPT 195 packets, 33681 bytes)
pkts bytes target prot opt in out source destination
272 39103 tcin all -- * * 0.0.0.0/0 0.0.0.0/0
Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 MARK all -- * * 0.0.0.0/0 0.0.0.0/0
MARK and 0xffffff00
0 0 tcfor all -- * * 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT 123 packets, 23208 bytes)
pkts bytes target prot opt in out source destination
205 114K tcout all -- * * 0.0.0.0/0 0.0.0.0/0
Chain POSTROUTING (policy ACCEPT 123 packets, 23208 bytes)
pkts bytes target prot opt in out source destination
205 114K tcpost all -- * * 0.0.0.0/0 0.0.0.0/0
Chain tcfor (1 references)
pkts bytes target prot opt in out source destination
Chain tcin (1 references)
pkts bytes target prot opt in out source destination
Chain tcout (1 references)
pkts bytes target prot opt in out source destination
Chain tcpost (1 references)
pkts bytes target prot opt in out source destination
Chain tcpre (1 references)
pkts bytes target prot opt in out source destination
Raw Table
Chain PREROUTING (policy ACCEPT 857 packets, 83593 bytes)
pkts bytes target prot opt in out source destination
0 0 CT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:10080 CT helper amanda
0 0 CT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:21 CT helper ftp
0 0 CT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:1719 CT helper RAS
0 0 CT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:1720 CT helper Q.931
0 0 CT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:6667 CT helper irc
401 31494 CT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:137 CT helper netbios-ns
0 0 CT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:1723 CT helper pptp
0 0 CT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:6566 CT helper sane
0 0 CT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:5060 CT helper sip
0 0 CT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:161 CT helper snmp
0 0 CT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:69 CT helper tftp
Chain OUTPUT (policy ACCEPT 123 packets, 23208 bytes)
pkts bytes target prot opt in out source destination
0 0 CT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:10080 CT helper amanda
0 0 CT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:21 CT helper ftp
0 0 CT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:1719 CT helper RAS
0 0 CT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:1720 CT helper Q.931
0 0 CT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:6667 CT helper irc
0 0 CT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:137 CT helper netbios-ns
0 0 CT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:1723 CT helper pptp
0 0 CT tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:6566 CT helper sane
0 0 CT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:5060 CT helper sip
0 0 CT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:161 CT helper snmp
0 0 CT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:69 CT helper tftp
Conntrack Table (60 out of 65536)
grep: /proc/net/nf_conntrack: No such file or directory
IP Configuration
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group defaul
t
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP gr
oup default qlen 1000
inet 65.111.162.249/25 brd 65.111.162.255 scope global eth0
valid_lft forever preferred_lft forever
IP Stats
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT
group default
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
RX: bytes packets errors dropped overrun mcast
5751576 40534 0 0 0 0
TX: bytes packets errors dropped carrier collsns
5751576 40534 0 0 0 0
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP mo
de DEFAULT group default qlen 1000
link/ether 00:ef:26:56:06:4f brd ff:ff:ff:ff:ff:ff
RX: bytes packets errors dropped overrun mcast
1957097053 25973131 0 700 0 0
TX: bytes packets errors dropped carrier collsns
1351252732 1484893 0 0 0 0
Routing Rules
0: from all lookup local
32766: from all lookup main
32767: from all lookup default
Table default:
Table local:
local 65.111.162.249 dev eth0 proto kernel scope host src 65.111.162.249
local 127.0.0.1 dev lo proto kernel scope host src 127.0.0.1
broadcast 65.111.162.255 dev eth0 proto kernel scope link src 65.111.162.249
broadcast 65.111.162.128 dev eth0 proto kernel scope link src 65.111.162.249
broadcast 127.255.255.255 dev lo proto kernel scope link src 127.0.0.1
broadcast 127.0.0.0 dev lo proto kernel scope link src 127.0.0.1
local 127.0.0.0/8 dev lo proto kernel scope host src 127.0.0.1
Table main:
65.111.162.128/25 dev eth0 proto kernel scope link src 65.111.162.249
default via 65.111.162.129 dev eth0
Per-IP Counters
iptaccount is not installed
NF Accounting
No NF Accounting defined (nfacct not found)
Events
/proc
/proc/version = Linux version 3.13.0-68-generic (buildd@lgw01-46) (gcc versio
n 4.8.2 (Ubuntu 4.8.2-19ubuntu1) ) #111-Ubuntu SMP Fri Nov 6 18:17:06 UTC 2015
/proc/sys/net/ipv4/ip_forward = 1
/proc/sys/net/ipv4/icmp_echo_ignore_all = 0
/proc/sys/net/ipv4/conf/all/proxy_arp = 0
/proc/sys/net/ipv4/conf/all/arp_filter = 0
/proc/sys/net/ipv4/conf/all/arp_ignore = 0
/proc/sys/net/ipv4/conf/all/rp_filter = 1
/proc/sys/net/ipv4/conf/all/log_martians = 0
/proc/sys/net/ipv4/conf/default/proxy_arp = 0
/proc/sys/net/ipv4/conf/default/arp_filter = 0
/proc/sys/net/ipv4/conf/default/arp_ignore = 0
/proc/sys/net/ipv4/conf/default/rp_filter = 1
/proc/sys/net/ipv4/conf/default/log_martians = 1
/proc/sys/net/ipv4/conf/eth0/proxy_arp = 0
/proc/sys/net/ipv4/conf/eth0/arp_filter = 0
/proc/sys/net/ipv4/conf/eth0/arp_ignore = 0
/proc/sys/net/ipv4/conf/eth0/rp_filter = 1
/proc/sys/net/ipv4/conf/eth0/log_martians = 1
/proc/sys/net/ipv4/conf/lo/proxy_arp = 0
/proc/sys/net/ipv4/conf/lo/arp_filter = 0
/proc/sys/net/ipv4/conf/lo/arp_ignore = 0
/proc/sys/net/ipv4/conf/lo/rp_filter = 1
/proc/sys/net/ipv4/conf/lo/log_martians = 1
ARP
? (65.111.162.129) at 00:15:f9:06:3f:42 [ether] on eth0
Modules
ip_set 41249 1 xt_set
iptable_filter 12810 1
iptable_mangle 12695 1
iptable_nat 13011 0
iptable_raw 12678 1
ip_tables 27239 4 iptable_filter,iptable_mangle,iptable_nat,iptabl
e_raw
ipt_ah 12806 0
ipt_CLUSTERIP 13633 0
ipt_ECN 12529 0
ipt_MASQUERADE 12880 0
ipt_REJECT 12541 4
ipt_rpfilter 12546 0
ipt_ULOG 14273 0
nf_conntrack 97202 35 nf_nat_ftp,nf_nat_irc,nf_nat_sip,nf_nat_amanda,
xt_CT,nf_nat_snmp_basic,nf_conntrack_netbios_ns,nf_conntrack_proto_gre,xt_helper
,ipt_MASQUERADE,nf_conntrack_proto_udplite,nf_nat,xt_state,xt_connlimit,nf_nat_h
323,nf_nat_ipv4,nf_nat_pptp,nf_nat_tftp,xt_conntrack,nf_conntrack_amanda,ipt_CLU
STERIP,nf_conntrack_proto_sctp,nf_conntrack_netlink,nf_conntrack_broadcast,xt_co
nnmark,nf_conntrack_ftp,nf_conntrack_irc,nf_conntrack_sip,iptable_nat,nf_conntra
ck_h323,nf_conntrack_ipv4,nf_conntrack_pptp,nf_conntrack_sane,nf_conntrack_snmp,
nf_conntrack_tftp
nf_conntrack_amanda 13041 3 nf_nat_amanda
nf_conntrack_broadcast 12589 2 nf_conntrack_netbios_ns,nf_conntrack_snmp
nf_conntrack_ftp 18638 3 nf_nat_ftp
nf_conntrack_h323 73895 5 nf_nat_h323
nf_conntrack_ipv4 15012 29
nf_conntrack_irc 13518 3 nf_nat_irc
nf_conntrack_netbios_ns 12665 2
nf_conntrack_netlink 36223 0
nf_conntrack_pptp 19258 3 nf_nat_pptp
nf_conntrack_proto_gre 14434 1 nf_conntrack_pptp
nf_conntrack_proto_sctp 18822 0
nf_conntrack_proto_udplite 13281 0
nf_conntrack_sane 13143 2
nf_conntrack_sip 28460 3 nf_nat_sip
nf_conntrack_snmp 12857 3 nf_nat_snmp_basic
nf_conntrack_tftp 13121 3 nf_nat_tftp
nf_defrag_ipv4 12758 2 xt_TPROXY,nf_conntrack_ipv4
nf_defrag_ipv6 34768 1 xt_TPROXY
nf_nat 21841 12 nf_nat_ftp,nf_nat_irc,nf_nat_sip,nf_nat_amanda,
ipt_MASQUERADE,nf_nat_proto_gre,nf_nat_h323,nf_nat_ipv4,nf_nat_pptp,nf_nat_tftp,
xt_nat,iptable_nat
nf_nat_amanda 12491 0
nf_nat_ftp 12770 0
nf_nat_h323 17720 0
nf_nat_ipv4 13263 1 iptable_nat
nf_nat_irc 12723 0
nf_nat_pptp 13115 0
nf_nat_proto_gre 13009 1 nf_nat_pptp
nf_nat_sip 17186 0
nf_nat_snmp_basic 17302 0
nf_nat_tftp 12489 0
xt_addrtype 12635 5
xt_AUDIT 12678 0
xt_CHECKSUM 12549 0
xt_CLASSIFY 12507 0
xt_comment 12504 45
xt_connlimit 12636 0
xt_connmark 12755 0
xt_conntrack 12760 6
xt_CT 12956 22
xt_dccp 12606 0
xt_dscp 12597 0
xt_DSCP 12629 0
xt_hashlimit 17618 0
xt_helper 12583 0
xt_iprange 12783 0
xt_length 12536 0
xt_limit 12711 0
xt_LOG 17717 6
xt_mac 12492 0
xt_mark 12563 1
xt_multiport 12798 4
xt_nat 12681 0
xt_NFLOG 12537 0
xt_NFQUEUE 12776 0
xt_owner 12534 0
xt_physdev 12587 0
xt_pkttype 12504 0
xt_policy 12582 0
xt_realm 12498 0
xt_recent 18498 1
xt_sctp 12853 0
xt_set 13181 0
xt_state 12578 0
xt_statistic 12601 0
xt_tcpmss 12501 0
xt_TCPMSS 12664 0
xt_tcpudp 12884 72
xt_time 12661 0
xt_TPROXY 17356 0
Shorewall has detected the following iptables/netfilter capabilities:
ACCOUNT Target (ACCOUNT_TARGET): Not available
Address Type Match (ADDRTYPE): Available
Amanda Helper: Available
Arptables JF: Not available
AUDIT Target (AUDIT_TARGET): Available
Basic Filter (BASIC_FILTER): Available
Capabilities Version (CAPVERSION): 40515
Checksum Target: Available
CLASSIFY Target (CLASSIFY_TARGET): Available
Comments (COMMENTS): Available
Condition Match (CONDITION_MATCH): Not available
Connection Tracking Match (CONNTRACK_MATCH): Available
Connlimit Match (CONNLIMIT_MATCH): Available
Connmark Match (CONNMARK_MATCH): Available
CONNMARK Target (CONNMARK): Available
CT Target (CT_TARGET): Available
DSCP Match (DSCP_MATCH): Available
DSCP Target (DSCP_TARGET): Available
Enhanced Multi-port Match (EMULIPORT): Available
Extended Connection Tracking Match Support (NEW_CONNTRACK_MATCH): Available
Extended Connmark Match (XCONNMARK_MATCH): Available
Extended CONNMARK Target (XCONNMARK): Available
Extended MARK Target 2 (EXMARK): Available
Extended MARK Target (XMARK): Available
Extended Multi-port Match (XMULIPORT): Available
Extended REJECT (ENHANCED_REJECT): Available
FLOW Classifier (FLOW_FILTER): Available
FTP-0 Helper: Not available
FTP Helper: Available
fwmark route mask (FWMARK_RT_MASK): Available
Geo IP match: Not available
Goto Support (GOTO_TARGET): Available
H323 Helper: Available
Hashlimit Match (HASHLIMIT_MATCH): Available
Header Match (HEADER_MATCH): Not available
Helper Match (HELPER_MATCH): Available
IMQ Target (IMQ_TARGET): Not available
IPMARK Target (IPMARK_TARGET): Not available
IPP2P Match (IPP2P_MATCH): Not available
IP range Match(IPRANGE_MATCH): Available
ipset V5 (IPSET_V5): Not available
iptables -S (IPTABLES_S): Available
IRC-0 Helper: Not available
IRC Helper: Available
Kernel Version (KERNELVERSION): 31300
LOGMARK Target (LOGMARK_TARGET): Not available
LOG Target (LOG_TARGET): Available
Mangle FORWARD Chain (MANGLE_FORWARD): Available
Mark in the filter table (MARK_ANYWHERE): Available
MARK Target (MARK): Available
MASQUERADE Target: Available
Multi-port Match (MULTIPORT): Available
NAT (NAT_ENABLED): Available
Netbios_ns Helper: Available
New tos Match: Available
NFAcct match: Not available
NFLOG Target (NFLOG_TARGET): Available
NFQUEUE Target (NFQUEUE_TARGET): Available
Owner Match (OWNER_MATCH): Available
Owner Name Match (OWNER_NAME_MATCH): Available
Packet length Match (LENGTH_MATCH): Available
Packet Mangling (MANGLE_ENABLED): Available
Packet Type Match (USEPKTTYPE): Available
Persistent SNAT (PERSISTENT_SNAT): Available
Physdev-is-bridged Support (PHYSDEV_BRIDGE): Available
Physdev Match (PHYSDEV_MATCH): Available
Policy Match (POLICY_MATCH): Available
PPTP Helper: Available
Rawpost Table (RAWPOST_TABLE): Not available
Raw Table (RAW_TABLE): Available
Realm Match (REALM_MATCH): Available
Recent Match "--reap" option (REAP_OPTION): Not available
Recent Match (RECENT_MATCH): Available
Repeat match (KLUDGEFREE): Available
RPFilter match: Available
SANE-0 Helper: Not available
SANE Helper: Available
SIP-0 Helper: Not available
SIP Helper: Available
SNMP Helper: Available
Statistic Match (STATISTIC_MATCH): Available
TCPMSS Match (TCPMSS_MATCH): Available
TFTP-0 Helper: Not available
TFTP Helper: Available
Time Match (TIME_MATCH): Available
TPROXY Target (TPROXY_TARGET): Available
UDPLITE Port Redirection: Not available
ULOG Target (ULOG_TARGET): Available
Netid State Recv-Q Send-Q Local Address:Port Peer Address:Port
tcp UNCONN 0 0 *:20000 *:*
users:(("miniserv.pl",2296,6))
tcp UNCONN 0 0 *:26150 *:*
users:(("darkplaces64",24577,11))
tcp UNCONN 0 0 *:10000 *:*
users:(("miniserv.pl",3058,6))
tcp UNCONN 0 0 65.111.162.249:53 *:*
users:(("named",1284,535),("named",1284,534),("named",1284,533),("named",1284,5
32),("named",1284,531),("named",1284,530),("named",1284,529),("named",1284,528))
tcp UNCONN 0 0 127.0.0.1:53 *:*
users:(("named",1284,527),("named",1284,526),("named",1284,525),("named",1284,5
24),("named",1284,523),("named",1284,522),("named",1284,521),("named",1284,520))
tcp UNCONN 0 0 65.111.162.249:123 *:*
users:(("ntpd",3315,19))
tcp UNCONN 0 0 127.0.0.1:123 *:*
users:(("ntpd",3315,18))
tcp UNCONN 0 0 *:123 *:*
users:(("ntpd",3315,16))
tcp LISTEN 0 10 65.111.162.249:53 *:*
users:(("named",1284,22))
tcp LISTEN 0 10 127.0.0.1:53 *:*
users:(("named",1284,21))
tcp LISTEN 0 128 *:22 *:*
users:(("sshd",1237,3))
tcp LISTEN 0 128 127.0.0.1:11000 *:*
users:(("/usr/share/webm",3003,3))
tcp LISTEN 0 100 *:25 *:*
users:(("master",1568,12))
tcp LISTEN 0 128 127.0.0.1:953 *:*
users:(("named",1284,23))
tcp LISTEN 0 128 *:20000 *:*
users:(("miniserv.pl",2296,5))
tcp LISTEN 0 100 *:993 *:*
users:(("dovecot",1216,38))
tcp LISTEN 0 100 *:995 *:*
users:(("dovecot",1216,25))
tcp LISTEN 0 128 127.0.0.1:10023 *:*
users:(("/usr/sbin/postg",1333,6))
tcp LISTEN 0 50 127.0.0.1:3306 *:*
users:(("mysqld",1272,10))
tcp LISTEN 0 100 *:587 *:*
users:(("master",1568,106))
tcp LISTEN 0 100 *:110 *:*
users:(("dovecot",1216,23))
tcp LISTEN 0 128 127.0.0.1:783 *:*
users:(("spamd child",16647,5),("spamd child",16646,5),("/usr/sbin/spamd",16645
,5))
tcp LISTEN 0 100 *:143 *:*
users:(("dovecot",1216,36))
tcp LISTEN 0 128 *:10000 *:*
users:(("miniserv.pl",3058,5))
tcp CLOSE-WAIT 1 0 127.0.0.1:11000 127.0.0.1:36383
users:(("/usr/share/webm",3003,4))
tcp ESTAB 0 5108 65.111.162.249:22 50.136.116.163:51384
users:(("sshd",32628,3))
Traffic Control
Device eth0:
qdisc pfifo_fast 0: root refcnt 2 bands 3 priomap 1 2 2 2 1 2 0 0 1 1 1 1 1 1 1
1
Sent 1351290828 bytes 1484933 pkt (dropped 0, overlimits 0 requeues 3)
backlog 0b 0p requeues 3
------------------------------------------------------------------------------
Go from Idea to Many App Stores Faster with Intel(R) XDK
Give your users amazing mobile app experiences with Intel(R) XDK.
Use one codebase in this all-in-one HTML5 development environment.
Design, debug & build mobile apps & 2D/3D high-impact games for multiple OSs.
http://pubads.g.doubleclick.net/gampad/clk?id=254741551&iu=/4140
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users