I have what strikes me as an odd problem with shorewall.
Let me describe my setup.
My desktop (alfred) is connected to the network
through an ADSL modem.
I am running rp-pppoe, and this works perfectly.
I have a small home network, with two LANs;
an Ethernet LAN (including a machine running Windows XP),
and a WiFi LAN, including the laptop (william) I am using now.
All the computers except for the Windows machine
are running linux-2.6.10 under Fedora-3.
When running shorewall, I am able to connect to the internet
(for mail, news and browsing) from all computers _except_ the desktop.
When I am on the desktop, all connection to the internet is refused.
There is one other failure;
I am running httpd on my desktop,
and I cannot access this from the other computers.
As soon as I stop shorewall (with "service shorewall stop" as
superuser)
all these problems disappear.
Now for the information which it was suggested should accompany any query
-----------------------------------------------
[root@alfred tim]# shorewall version
1.4.8
[root@alfred tim]# ip addr show
1: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000
link/ether 00:e0:18:98:f7:2b brd ff:ff:ff:ff:ff:ff
inet 10.0.0.1/8 brd 10.255.255.255 scope global eth0
2: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 brd 127.255.255.255 scope host lo
3: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000
link/ether 00:40:f4:6e:07:a1 brd ff:ff:ff:ff:ff:ff
inet 192.168.1.1/24 brd 192.168.1.255 scope global eth1
4: eth2: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000
link/ether 00:02:2d:4a:52:80 brd ff:ff:ff:ff:ff:ff
inet 192.168.3.1/24 brd 192.168.3.255 scope global eth2
5: ppp0: <POINTOPOINT,MULTICAST,NOARP,UP> mtu 1492 qdisc pfifo_fast qlen 3
link/ppp
inet 83.70.163.56 peer 159.134.155.26/32 scope global ppp0
[root@alfred tim]# ip route show
159.134.155.26 dev ppp0 proto kernel scope link src 83.70.163.56
192.168.3.0/24 dev eth2 proto kernel scope link src 192.168.3.1
192.168.1.0/24 dev eth1 proto kernel scope link src 192.168.1.1
169.254.0.0/16 dev eth2 scope link
10.0.0.0/8 dev eth0 proto kernel scope link src 10.0.0.1
default via 83.70.163.56 dev ppp0 scope link
default via 159.134.155.26 dev ppp0
[root@alfred tim]# /sbin/shorewall reset
Loading /usr/share/shorewall/functions...
Processing /etc/shorewall/params ...
Processing /etc/shorewall/shorewall.conf...
Shorewall Counters Reset
[root@alfred tim]# uucico -S tcdmath
[root@alfred tim]# /sbin/shorewall status > /tmp/status.txt
I am using two-interfaces.tgz with slight modifications for rp-pppoe.
-----------------------------------------------
Finally, here is /tmp/status.txt after trying to collect my UUCP mail
with uucico (above).
I''ve used this, even though it is rather an unusual application,
because it may be easier to determine what goes wrong.
(The uucp command is effectively equivalent to "telnet salmon uucp",
which works from my laptop
======================[tim@william ~]$ telnet salmon uucp
Trying 134.226.81.11...
Connected to salmon.
Escape character is ''^]''.
login: ^]
telnet> quit
Connection closed.
======================but not from the desktop, where I get
======================[tim@alfred ~]$ telnet salmon uucp
Trying 134.226.81.11...
telnet: connect to address 134.226.81.11: Connection refused
======================I get the same result if I try "ssh salmon".)
----------- /tmp/status.txt ----------------
[H[2JShorewall-1.4.8 Status at alfred.murphy.ie - Sat Jan 8 03:05:57 GMT
2005
Counters reset Sat Jan 8 03:04:58 GMT 2005
Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
29 3189 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
0 0 DROP !icmp -- * * 0.0.0.0/0 0.0.0.0/0
state INVALID
27 1831 ppp0_in all -- ppp0 * 0.0.0.0/0 0.0.0.0/0
1 236 eth1_in all -- eth1 * 0.0.0.0/0 0.0.0.0/0
137 10528 eth2_in all -- eth2 * 0.0.0.0/0 0.0.0.0/0
0 0 common all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:INPUT:REJECT:''
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
0 0 DROP !icmp -- * * 0.0.0.0/0 0.0.0.0/0
state INVALID
0 0 TCPMSS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp flags:0x06/0x02 TCPMSS clamp to PMTU
26 1688 ppp0_fwd all -- ppp0 * 0.0.0.0/0 0.0.0.0/0
4 170 eth1_fwd all -- eth1 * 0.0.0.0/0 0.0.0.0/0
24 1592 eth2_fwd all -- eth2 * 0.0.0.0/0 0.0.0.0/0
0 0 common all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:FORWARD:REJECT:''
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
29 3189 ACCEPT all -- * lo 0.0.0.0/0 0.0.0.0/0
0 0 DROP !icmp -- * * 0.0.0.0/0 0.0.0.0/0
state INVALID
29 1896 fw2net all -- * ppp0 0.0.0.0/0 0.0.0.0/0
2 356 fw2loc all -- * eth1 0.0.0.0/0 0.0.0.0/0
75 8198 fw2loc all -- * eth2 0.0.0.0/0 0.0.0.0/0
2 340 common all -- * * 0.0.0.0/0 0.0.0.0/0
2 340 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:OUTPUT:REJECT:''
2 340 reject all -- * * 0.0.0.0/0 0.0.0.0/0
Chain all2all (3 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp flags:!0x16/0x02
10 1774 common all -- * * 0.0.0.0/0 0.0.0.0/0
5 836 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:all2all:REJECT:''
5 836 reject all -- * * 0.0.0.0/0 0.0.0.0/0
Chain common (5 references)
pkts bytes target prot opt in out source
destination
0 0 icmpdef icmp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:135
1 236 reject udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpts:137:139
0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:445
0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:139
0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:445
0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:135
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:1900
0 0 DROP all -- * * 0.0.0.0/0
255.255.255.255
0 0 DROP all -- * * 0.0.0.0/0
224.0.0.0/4
0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:113
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp spt:53 state NEW
2 356 DROP all -- * * 0.0.0.0/0
192.168.1.255
2 346 DROP all -- * * 0.0.0.0/0
192.168.3.255
Chain dynamic (6 references)
pkts bytes target prot opt in out source
destination
Chain eth1_fwd (1 references)
pkts bytes target prot opt in out source
destination
0 0 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
state NEW
4 170 loc2net all -- * ppp0 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- * eth2 0.0.0.0/0 0.0.0.0/0
Chain eth1_in (1 references)
pkts bytes target prot opt in out source
destination
1 236 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
state NEW
1 236 loc2fw all -- * * 0.0.0.0/0 0.0.0.0/0
Chain eth2_fwd (1 references)
pkts bytes target prot opt in out source
destination
2 126 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
state NEW
24 1592 loc2net all -- * ppp0 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- * eth1 0.0.0.0/0 0.0.0.0/0
Chain eth2_in (1 references)
pkts bytes target prot opt in out source
destination
2 388 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
state NEW
137 10528 loc2fw all -- * * 0.0.0.0/0 0.0.0.0/0
Chain fw2loc (2 references)
pkts bytes target prot opt in out source
destination
72 7524 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp flags:!0x16/0x02
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 8
5 1030 all2all all -- * * 0.0.0.0/0 0.0.0.0/0
Chain fw2net (1 references)
pkts bytes target prot opt in out source
destination
26 1714 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp flags:!0x16/0x02
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp dpt:53
1 62 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW udp dpt:53
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 8
2 120 all2all all -- * * 0.0.0.0/0 0.0.0.0/0
Chain icmpdef (1 references)
pkts bytes target prot opt in out source
destination
Chain loc2fw (2 references)
pkts bytes target prot opt in out source
destination
135 10140 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp flags:!0x16/0x02
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp dpt:22
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 8
3 624 all2all all -- * * 0.0.0.0/0 0.0.0.0/0
Chain loc2net (2 references)
pkts bytes target prot opt in out source
destination
26 1636 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp flags:!0x16/0x02
2 126 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain net2all (3 references)
pkts bytes target prot opt in out source
destination
26 1688 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp flags:!0x16/0x02
0 0 common all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:net2all:DROP:''
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain net2fw (1 references)
pkts bytes target prot opt in out source
destination
27 1831 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp flags:!0x16/0x02
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 8
0 0 net2all all -- * * 0.0.0.0/0 0.0.0.0/0
Chain newnotsyn (7 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT tcp -- eth2 * 0.0.0.0/0 0.0.0.0/0
tcp flags:0x10/0x10
0 0 ACCEPT tcp -- eth2 * 0.0.0.0/0 0.0.0.0/0
tcp flags:0x04/0x04
0 0 ACCEPT tcp -- eth2 * 0.0.0.0/0 0.0.0.0/0
tcp flags:0x01/0x01
0 0 RETURN all -- eth2 * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:newnotsyn:DROP:''
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain ppp0_fwd (1 references)
pkts bytes target prot opt in out source
destination
0 0 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
state NEW
2 96 net2all all -- * eth1 0.0.0.0/0 0.0.0.0/0
24 1592 net2all all -- * eth2 0.0.0.0/0 0.0.0.0/0
Chain ppp0_in (1 references)
pkts bytes target prot opt in out source
destination
0 0 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
state NEW
27 1831 net2fw all -- * * 0.0.0.0/0 0.0.0.0/0
Chain reject (11 references)
pkts bytes target prot opt in out source
destination
3 180 REJECT tcp -- * * 0.0.0.0/0 0.0.0.0/0
reject-with tcp-reset
5 1232 REJECT udp -- * * 0.0.0.0/0 0.0.0.0/0
reject-with icmp-port-unreachable
0 0 REJECT icmp -- * * 0.0.0.0/0 0.0.0.0/0
reject-with icmp-host-unreachable
0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0
reject-with icmp-host-prohibited
Chain shorewall (0 references)
pkts bytes target prot opt in out source
destination
Jan 8 03:02:45 OUTPUT:REJECT:IN= OUT=eth0 SRC=10.0.0.1 DST=10.255.255.255
LEN=170 TOS=0x00 PREC=0x00 TTL=64 ID=21592 DF PROTO=UDP SPT=631 DPT=631
LEN=150
Jan 8 03:03:16 OUTPUT:REJECT:IN= OUT=eth0 SRC=10.0.0.1 DST=10.255.255.255
LEN=170 TOS=0x00 PREC=0x00 TTL=64 ID=21595 DF PROTO=UDP SPT=631 DPT=631
LEN=150
Jan 8 03:03:48 OUTPUT:REJECT:IN= OUT=eth0 SRC=10.0.0.1 DST=10.255.255.255
LEN=170 TOS=0x00 PREC=0x00 TTL=64 ID=21598 DF PROTO=UDP SPT=631 DPT=631
LEN=150
Jan 8 03:03:54 all2all:REJECT:IN=eth2 OUT= SRC=192.168.3.5 DST=192.168.3.1
LEN=328 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=UDP SPT=68 DPT=67 LEN=308
Jan 8 03:03:54 all2all:REJECT:IN= OUT=eth2 SRC=192.168.3.1 DST=192.168.3.5
LEN=328 TOS=0x00 PREC=0x00 TTL=64 ID=89 DF PROTO=UDP SPT=67 DPT=68 LEN=308
Jan 8 03:03:57 all2all:REJECT:IN=eth2 OUT= SRC=192.168.3.5 DST=192.168.3.1
LEN=328 TOS=0x00 PREC=0x00 TTL=64 ID=1 DF PROTO=UDP SPT=68 DPT=67 LEN=308
Jan 8 03:03:57 all2all:REJECT:IN= OUT=eth2 SRC=192.168.3.1 DST=192.168.3.5
LEN=328 TOS=0x00 PREC=0x00 TTL=64 ID=90 DF PROTO=UDP SPT=67 DPT=68 LEN=308
Jan 8 03:04:04 all2all:REJECT:IN=eth2 OUT= SRC=192.168.3.5 DST=192.168.3.1
LEN=328 TOS=0x00 PREC=0x00 TTL=64 ID=2 DF PROTO=UDP SPT=68 DPT=67 LEN=308
Jan 8 03:04:04 all2all:REJECT:IN= OUT=eth2 SRC=192.168.3.1 DST=192.168.3.5
LEN=328 TOS=0x00 PREC=0x00 TTL=64 ID=91 DF PROTO=UDP SPT=67 DPT=68 LEN=308
Jan 8 03:04:18 OUTPUT:REJECT:IN= OUT=eth0 SRC=10.0.0.1 DST=10.255.255.255
LEN=170 TOS=0x00 PREC=0x00 TTL=64 ID=21601 DF PROTO=UDP SPT=631 DPT=631
LEN=150
Jan 8 03:04:20 all2all:REJECT:IN=eth2 OUT= SRC=192.168.3.5 DST=192.168.3.1
LEN=328 TOS=0x00 PREC=0x00 TTL=64 ID=3 DF PROTO=UDP SPT=68 DPT=67 LEN=308
Jan 8 03:04:20 all2all:REJECT:IN= OUT=eth2 SRC=192.168.3.1 DST=192.168.3.5
LEN=328 TOS=0x00 PREC=0x00 TTL=64 ID=92 DF PROTO=UDP SPT=67 DPT=68 LEN=308
Jan 8 03:04:49 OUTPUT:REJECT:IN= OUT=eth0 SRC=10.0.0.1 DST=10.255.255.255
LEN=170 TOS=0x00 PREC=0x00 TTL=64 ID=21604 DF PROTO=UDP SPT=631 DPT=631
LEN=150
Jan 8 03:05:00 all2all:REJECT:IN=eth2 OUT= SRC=192.168.3.5 DST=192.168.1.1
LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=41635 DF PROTO=TCP SPT=32938 DPT=143
WINDOW=5840 RES=0x00 SYN URGP=0
Jan 8 03:05:11 all2all:REJECT:IN=eth2 OUT= SRC=192.168.3.5 DST=192.168.3.1
LEN=328 TOS=0x00 PREC=0x00 TTL=64 ID=4 DF PROTO=UDP SPT=68 DPT=67 LEN=308
Jan 8 03:05:11 all2all:REJECT:IN= OUT=eth2 SRC=192.168.3.1 DST=192.168.3.5
LEN=328 TOS=0x00 PREC=0x00 TTL=64 ID=93 DF PROTO=UDP SPT=67 DPT=68 LEN=308
Jan 8 03:05:12 all2all:REJECT:IN= OUT=ppp0 SRC=83.70.163.56 DST=134.226.81.11
LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=51512 DF PROTO=TCP SPT=4758 DPT=540
WINDOW=5808 RES=0x00 SYN URGP=0
Jan 8 03:05:12 all2all:REJECT:IN= OUT=ppp0 SRC=83.70.163.56 DST=134.226.81.11
LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=8427 DF PROTO=TCP SPT=4759 DPT=540
WINDOW=5808 RES=0x00 SYN URGP=0
Jan 8 03:05:20 OUTPUT:REJECT:IN= OUT=eth0 SRC=10.0.0.1 DST=10.255.255.255
LEN=170 TOS=0x00 PREC=0x00 TTL=64 ID=21607 DF PROTO=UDP SPT=631 DPT=631
LEN=150
Jan 8 03:05:51 OUTPUT:REJECT:IN= OUT=eth0 SRC=10.0.0.1 DST=10.255.255.255
LEN=170 TOS=0x00 PREC=0x00 TTL=64 ID=21610 DF PROTO=UDP SPT=631 DPT=631
LEN=150
NAT Table
Chain PREROUTING (policy ACCEPT 5 packets, 750 bytes)
pkts bytes target prot opt in out source
destination
Chain POSTROUTING (policy ACCEPT 6 packets, 294 bytes)
pkts bytes target prot opt in out source
destination
3 188 ppp0_masq all -- * ppp0 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT 12 packets, 1664 bytes)
pkts bytes target prot opt in out source
destination
Chain ppp0_masq (1 references)
pkts bytes target prot opt in out source
destination
0 0 MASQUERADE all -- * * 192.168.1.0/24 0.0.0.0/0
2 126 MASQUERADE all -- * * 192.168.3.0/24 0.0.0.0/0
0 0 MASQUERADE all -- * * 169.254.0.0/16 0.0.0.0/0
Mangle Table
Chain PREROUTING (policy ACCEPT 248 packets, 19234 bytes)
pkts bytes target prot opt in out source
destination
248 19234 pretos all -- * * 0.0.0.0/0 0.0.0.0/0
Chain INPUT (policy ACCEPT 194 packets, 15784 bytes)
pkts bytes target prot opt in out source
destination
Chain FORWARD (policy ACCEPT 54 packets, 3450 bytes)
pkts bytes target prot opt in out source
destination
Chain OUTPUT (policy ACCEPT 137 packets, 13979 bytes)
pkts bytes target prot opt in out source
destination
137 13979 outtos all -- * * 0.0.0.0/0 0.0.0.0/0
Chain POSTROUTING (policy ACCEPT 182 packets, 15939 bytes)
pkts bytes target prot opt in out source
destination
Chain outtos (1 references)
pkts bytes target prot opt in out source
destination
0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:22 TOS set 0x10
70 7128 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp spt:22 TOS set 0x10
0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:21 TOS set 0x10
0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp spt:21 TOS set 0x10
0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp spt:20 TOS set 0x08
0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:20 TOS set 0x08
Chain pretos (1 references)
pkts bytes target prot opt in out source
destination
135 10140 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:22 TOS set 0x10
0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp spt:22 TOS set 0x10
0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:21 TOS set 0x10
0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp spt:21 TOS set 0x10
0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp spt:20 TOS set 0x08
0 0 TOS tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:20 TOS set 0x08
udp 17 173 src=83.70.163.56 dst=159.134.237.6 sport=3197 dport=53
src=159.134.237.6 dst=83.70.163.56 sport=53 dport=3197 [ASSURED] use=1
tcp 6 212001 ESTABLISHED src=192.168.3.5 dst=217.173.101.246 sport=33131
dport=80 src=217.173.101.246 dst=83.70.163.56 sport=80 dport=33131 [ASSURED]
use=1
tcp 6 311449 ESTABLISHED src=83.70.163.56 dst=213.200.95.126 sport=2888
dport=80 src=213.200.95.126 dst=83.70.163.56 sport=80 dport=2888 [ASSURED]
use=1
tcp 6 176287 ESTABLISHED src=192.168.1.7 dst=64.4.23.188 sport=1140
dport=443 src=64.4.23.188 dst=83.70.163.56 sport=443 dport=1140 [ASSURED]
use=1
tcp 6 245863 ESTABLISHED src=192.168.1.7 dst=207.46.253.92 sport=1321
dport=443 src=207.46.253.92 dst=83.70.163.56 sport=443 dport=1321 [ASSURED]
use=1
tcp 6 430456 ESTABLISHED src=192.168.3.5 dst=69.59.167.109 sport=32896
dport=80 src=69.59.167.109 dst=83.70.163.56 sport=80 dport=32896 [ASSURED]
use=1
tcp 6 311449 ESTABLISHED src=83.70.163.56 dst=213.200.95.126 sport=2889
dport=80 src=213.200.95.126 dst=83.70.163.56 sport=80 dport=2889 [ASSURED]
use=1
tcp 6 391076 ESTABLISHED src=192.168.1.7 dst=207.46.157.93 sport=1324
dport=443 src=207.46.157.93 dst=83.70.163.56 sport=443 dport=1324 [ASSURED]
use=1
udp 17 129 src=192.168.3.5 dst=159.134.237.6 sport=32813 dport=53
src=159.134.237.6 dst=83.70.163.56 sport=53 dport=32813 [ASSURED] use=1
tcp 6 306325 ESTABLISHED src=83.70.241.204 dst=83.70.163.56 sport=3072
dport=445 [UNREPLIED] src=83.70.163.56 dst=83.70.241.204 sport=445 dport=3072
use=1
tcp 6 390710 ESTABLISHED src=192.168.1.7 dst=159.134.196.104 sport=1322
dport=80 src=159.134.196.104 dst=83.70.163.56 sport=80 dport=1322 [ASSURED]
use=1
tcp 6 314078 ESTABLISHED src=192.168.1.7 dst=207.46.157.60 sport=1152
dport=443 src=207.46.157.60 dst=83.70.163.56 sport=443 dport=1152 [ASSURED]
use=1
tcp 6 219687 ESTABLISHED src=83.70.124.36 dst=83.70.163.56 sport=4136
dport=445 src=83.70.163.56 dst=83.70.124.36 sport=445 dport=4136 [ASSURED]
use=1
tcp 6 84718 ESTABLISHED src=192.168.3.5 dst=66.129.67.103 sport=33748
dport=80 src=66.129.67.103 dst=83.70.163.56 sport=80 dport=33748 [ASSURED]
use=1
udp 17 133 src=83.70.163.56 dst=159.134.248.17 sport=3197 dport=53
src=159.134.248.17 dst=83.70.163.56 sport=53 dport=3197 [ASSURED] use=1
tcp 6 236924 ESTABLISHED src=83.70.224.152 dst=83.70.163.56 sport=3081
dport=445 [UNREPLIED] src=83.70.163.56 dst=83.70.224.152 sport=445 dport=3081
use=1
tcp 6 243993 ESTABLISHED src=192.168.1.7 dst=207.46.110.100 sport=1270
dport=80 src=207.46.110.100 dst=83.70.163.56 sport=80 dport=1270 [ASSURED]
use=1
tcp 6 327577 ESTABLISHED src=83.70.120.186 dst=83.70.163.56 sport=1459
dport=445 src=83.70.163.56 dst=83.70.120.186 sport=445 dport=1459 [ASSURED]
use=1
tcp 6 87960 ESTABLISHED src=192.168.3.5 dst=213.115.162.82 sport=33847
dport=80 src=213.115.162.82 dst=83.70.163.56 sport=80 dport=33847 [ASSURED]
use=1
tcp 6 87935 ESTABLISHED src=192.168.3.5 dst=213.115.162.82 sport=33844
dport=80 src=213.115.162.82 dst=83.70.163.56 sport=80 dport=33844 [ASSURED]
use=1
tcp 6 73 TIME_WAIT src=127.0.0.1 dst=127.0.0.1 sport=4757 dport=25
src=127.0.0.1 dst=127.0.0.1 sport=25 dport=4757 [ASSURED] use=1
tcp 6 403256 ESTABLISHED src=83.70.163.56 dst=203.31.48.5 sport=4414
dport=80 src=203.31.48.5 dst=83.70.163.56 sport=80 dport=4414 [ASSURED] use=1
tcp 6 386874 ESTABLISHED src=83.70.126.16 dst=83.70.163.56 sport=4402
dport=445 src=83.70.163.56 dst=83.70.126.16 sport=445 dport=4402 [ASSURED]
use=1
tcp 6 233725 ESTABLISHED src=83.70.65.217 dst=83.70.163.56 sport=2907
dport=445 src=83.70.163.56 dst=83.70.65.217 sport=445 dport=2907 [ASSURED]
use=1
tcp 6 431988 ESTABLISHED src=192.168.1.7 dst=207.46.107.1 sport=1355
dport=1863 src=207.46.107.1 dst=83.70.163.56 sport=1863 dport=1355 [ASSURED]
use=1
tcp 6 241378 ESTABLISHED src=216.230.132.182 dst=83.70.163.56 sport=37754
dport=21 src=83.70.163.56 dst=216.230.132.182 sport=21 dport=37754 [ASSURED]
use=1
tcp 6 337293 ESTABLISHED src=83.70.125.27 dst=83.70.163.56 sport=3985
dport=445 src=83.70.163.56 dst=83.70.125.27 sport=445 dport=3985 [ASSURED]
use=1
tcp 6 426610 ESTABLISHED src=192.168.3.5 dst=192.168.1.1 sport=32776
dport=22 src=192.168.1.1 dst=192.168.3.5 sport=22 dport=32776 [ASSURED] use=1
tcp 6 131931 ESTABLISHED src=192.168.3.5 dst=199.239.136.245 sport=32827
dport=80 src=199.239.136.245 dst=83.70.163.56 sport=80 dport=32827 [ASSURED]
use=1
tcp 6 390720 ESTABLISHED src=192.168.1.7 dst=64.4.23.188 sport=1323
dport=80 src=64.4.23.188 dst=83.70.163.56 sport=80 dport=1323 [ASSURED] use=1
tcp 6 219690 ESTABLISHED src=83.70.124.36 dst=83.70.163.56 sport=4175
dport=445 src=83.70.163.56 dst=83.70.124.36 sport=445 dport=4175 [ASSURED]
use=1
tcp 6 393378 ESTABLISHED src=83.70.163.56 dst=213.200.95.126 sport=3770
dport=80 src=213.200.95.126 dst=83.70.163.56 sport=80 dport=3770 [ASSURED]
use=1
udp 17 130 src=192.168.3.5 dst=159.134.248.17 sport=32813 dport=53
src=159.134.248.17 dst=83.70.163.56 sport=53 dport=32813 [ASSURED] use=1
tcp 6 313408 ESTABLISHED src=83.70.46.76 dst=83.70.163.56 sport=2351
dport=445 [UNREPLIED] src=83.70.163.56 dst=83.70.46.76 sport=445 dport=2351
use=1
tcp 6 312906 ESTABLISHED src=83.70.16.53 dst=83.70.163.56 sport=1488
dport=445 src=83.70.163.56 dst=83.70.16.53 sport=445 dport=1488 [ASSURED]
use=1
tcp 6 393378 ESTABLISHED src=83.70.163.56 dst=213.200.95.126 sport=3771
dport=80 src=213.200.95.126 dst=83.70.163.56 sport=80 dport=3771 [ASSURED]
use=1
tcp 6 67014 ESTABLISHED src=192.168.1.7 dst=213.199.154.46 sport=1060
dport=80 src=213.199.154.46 dst=83.70.163.56 sport=80 dport=1060 [ASSURED]
use=1
unknown 2 503 src=159.134.155.26 dst=224.0.0.1 [UNREPLIED] src=224.0.0.1
dst=159.134.155.26 use=1
tcp 6 88717 ESTABLISHED src=192.168.3.5 dst=66.179.234.15 sport=33874
dport=80 src=66.179.234.15 dst=83.70.163.56 sport=80 dport=33874 [ASSURED]
use=1
tcp 6 344506 ESTABLISHED src=83.70.126.26 dst=83.70.163.56 sport=3928
dport=445 src=83.70.163.56 dst=83.70.126.26 sport=445 dport=3928 [ASSURED]
use=1
tcp 6 398900 ESTABLISHED src=83.70.127.43 dst=83.70.163.56 sport=4973
dport=445 [UNREPLIED] src=83.70.163.56 dst=83.70.127.43 sport=445 dport=4973
use=1
tcp 6 211923 ESTABLISHED src=192.168.3.5 dst=217.173.101.246 sport=33127
dport=80 src=217.173.101.246 dst=83.70.163.56 sport=80 dport=33127 [ASSURED]
use=1
tcp 6 431999 ESTABLISHED src=192.168.3.5 dst=192.168.1.1 sport=32775
dport=22 src=192.168.1.1 dst=192.168.3.5 sport=22 dport=32775 [ASSURED] use=1
-----------------------------------------------
Apologies for the rather diffuse question;
if anyone can cast light on my problme I shall be very grateful.
--
Timothy Murphy
e-mail (<80k only): tim /at/ birdsnest.maths.tcd.ie
tel: +353-86-2336090, +353-1-2842366
s-mail: School of Mathematics, Trinity College, Dublin 2, Ireland