(Sorry, my previous post was sent in HTML format)
I am having a hell of a time with shorewall...
I have a Dlink DCM202 Cable modem with the Ethernet connected directly to
eth0 on the linux box. Then I have a second nic on the linux box connected
to a hub for
the internal network.
I am trying to allow traffic from the internet connect to my FTP and WEB
servers on my Winbloze box on the lan. The address of the FTP and WEB
servers is
192.168.1.2
When I try using the Webmin interface or by adding the line:
DNAT net loc:192.168.1.2 tcp 21
to /usr/share/shorewall/action.AllowFTP
I get the following error when restarting shorewall:
Error: Invalid TARGET in rule "DNAT net loc:192.168.1.2 tcp 21"
I thought this might mean that I need a line in /etc/shorewall/hosts, so I
added
loc eth1:192.168.1.0/24
and get this error message when shorewall restarts:
Error: Invalid zone definition for zone loc
from /etc/shorewall/zones:
#ZONE DISPLAY COMMENTS
net Net Internet zone
loc Local Local
#LAST LINE - ADD YOUR ENTRIES ABOVE THIS ONE - DO NOT REMOVE
Does anyone have any advice? This is a clean install, I have made no other
modifications to any of the shorewall files, except what is noted above.
Thanks In Advance.
It''s installed on the new version of Mandriva Linux. Here are the
outputs of
#uname -a; #shorewall version; #shorewall status; #ip addr show; #ip route
show
uname:
Linux pcp08479598pcs.spedwy01.in.comcast.net 2.6.12-12mdk #1 Fri Sep 9
18:15:22 CEST 2005 i686 AMD Duron(tm) unknown GNU/Linux
shorewall version output:
2.4.1
shorewall status:
Shorewall-2.4.1 Status at pcp08479598pcs.spedwy01.in.comcast.net - Thu Dec
8 06:04:45 EST 2005
Counters reset Wed Dec 7 08:10:49 EST 2005
Chain AllowICMPs (2 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT icmp -- * * 0.0.0.0/0
0.0.0.0/0 icmp type 3 code 4
0 0 ACCEPT icmp -- * * 0.0.0.0/0
0.0.0.0/0 icmp type 11
Chain Drop (1 references)
pkts bytes target prot opt in out source
destination
20731 6964K RejectAuth all -- * * 0.0.0.0/0
0.0.0.0/0
20710 6963K dropBcast all -- * * 0.0.0.0/0
0.0.0.0/0
318 26103 AllowICMPs icmp -- * * 0.0.0.0/0
0.0.0.0/0
2320 694K dropInvalid all -- * * 0.0.0.0/0
0.0.0.0/0
2107 676K DropSMB all -- * * 0.0.0.0/0
0.0.0.0/0
1842 616K DropUPnP all -- * * 0.0.0.0/0
0.0.0.0/0
109 32193 dropNotSyn tcp -- * * 0.0.0.0/0
0.0.0.0/0
1797 588K DropDNSrep all -- * * 0.0.0.0/0
0.0.0.0/0
Chain DropDNSrep (2 references)
pkts bytes target prot opt in out source
destination
1 200 DROP udp -- * * 0.0.0.0/0
0.0.0.0/0 udp spt:53
Chain DropSMB (1 references)
pkts bytes target prot opt in out source
destination
0 0 DROP udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpt:135
265 59248 DROP udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpts:137:139
0 0 DROP udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpt:445
0 0 DROP tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:135
0 0 DROP tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:139
0 0 DROP tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:445
Chain DropUPnP (2 references)
pkts bytes target prot opt in out source
destination
0 0 DROP udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpt:1900
Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
26470 7783K LOG all -- eth0 * 0.0.0.0/0
0.0.0.0/0 LOG flags 0 level 7 prefix `BANDWIDTH_IN:''
2738 156K ACCEPT all -- lo * 0.0.0.0/0
0.0.0.0/0
26470 7783K eth0_in all -- eth0 * 0.0.0.0/0
0.0.0.0/0
0 0 ath0_in all -- ath0 * 0.0.0.0/0
0.0.0.0/0
48209 3248K eth1_in all -- eth1 * 0.0.0.0/0
0.0.0.0/0
0 0 Reject all -- * * 0.0.0.0/0
0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0
0.0.0.0/0 LOG flags 0 level 6 prefix
`Shorewall:INPUT:REJECT:''
0 0 reject all -- * * 0.0.0.0/0
0.0.0.0/0
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
1061K 240M LOG all -- * eth0 0.0.0.0/0
0.0.0.0/0 LOG flags 0 level 7 prefix `BANDWIDTH_OUT:''
1384K 1325M LOG all -- eth0 * 0.0.0.0/0
0.0.0.0/0 LOG flags 0 level 7 prefix `BANDWIDTH_IN:''
1384K 1325M eth0_fwd all -- eth0 * 0.0.0.0/0
0.0.0.0/0
0 0 ath0_fwd all -- ath0 * 0.0.0.0/0
0.0.0.0/0
1061K 240M eth1_fwd all -- eth1 * 0.0.0.0/0
0.0.0.0/0
10 2639 Reject all -- * * 0.0.0.0/0
0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0
0.0.0.0/0 LOG flags 0 level 6 prefix
`Shorewall:FORWARD:REJECT:''
0 0 reject all -- * * 0.0.0.0/0
0.0.0.0/0
Chain OUTPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
6049 486K LOG all -- * eth0 0.0.0.0/0
0.0.0.0/0 LOG flags 0 level 7 prefix `BANDWIDTH_OUT:''
2738 156K ACCEPT all -- * lo 0.0.0.0/0
0.0.0.0/0
6049 486K fw2net all -- * eth0 0.0.0.0/0
0.0.0.0/0
0 0 fw2loc all -- * ath0 0.0.0.0/0
0.0.0.0/0
139K 195M fw2loc all -- * eth1 0.0.0.0/0
0.0.0.0/0
0 0 Reject all -- * * 0.0.0.0/0
0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0
0.0.0.0/0 LOG flags 0 level 6 prefix
`Shorewall:OUTPUT:REJECT:''
0 0 reject all -- * * 0.0.0.0/0
0.0.0.0/0
Chain Reject (4 references)
pkts bytes target prot opt in out source
destination
10 2639 RejectAuth all -- * * 0.0.0.0/0
0.0.0.0/0
10 2639 dropBcast all -- * * 0.0.0.0/0
0.0.0.0/0
0 0 AllowICMPs icmp -- * * 0.0.0.0/0
0.0.0.0/0
10 2639 dropInvalid all -- * * 0.0.0.0/0
0.0.0.0/0
10 2639 RejectSMB all -- * * 0.0.0.0/0
0.0.0.0/0
10 2639 DropUPnP all -- * * 0.0.0.0/0
0.0.0.0/0
10 2639 dropNotSyn tcp -- * * 0.0.0.0/0
0.0.0.0/0
0 0 DropDNSrep all -- * * 0.0.0.0/0
0.0.0.0/0
Chain RejectAuth (2 references)
pkts bytes target prot opt in out source
destination
21 1260 reject tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:113
Chain RejectSMB (1 references)
pkts bytes target prot opt in out source
destination
0 0 reject udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpt:135
0 0 reject udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpts:137:139
0 0 reject udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpt:445
0 0 reject tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:135
0 0 reject tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:139
0 0 reject tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:445
Chain all2all (0 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
0 0 Reject all -- * * 0.0.0.0/0
0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0
0.0.0.0/0 LOG flags 0 level 6 prefix
`Shorewall:all2all:REJECT:''
0 0 reject all -- * * 0.0.0.0/0
0.0.0.0/0
Chain ath0_fwd (1 references)
pkts bytes target prot opt in out source
destination
0 0 dynamic all -- * * 0.0.0.0/0
0.0.0.0/0 state INVALID,NEW
0 0 loc2net all -- * eth0 0.0.0.0/0
0.0.0.0/0
0 0 ACCEPT all -- * eth1 0.0.0.0/0
0.0.0.0/0
Chain ath0_in (1 references)
pkts bytes target prot opt in out source
destination
0 0 dynamic all -- * * 0.0.0.0/0
0.0.0.0/0 state INVALID,NEW
0 0 loc2fw all -- * * 0.0.0.0/0
0.0.0.0/0
Chain dropBcast (2 references)
pkts bytes target prot opt in out source
destination
18390 6269K DROP all -- * * 0.0.0.0/0
0.0.0.0/0 PKTTYPE = broadcast
0 0 DROP all -- * * 0.0.0.0/0
0.0.0.0/0 PKTTYPE = multicast
Chain dropInvalid (2 references)
pkts bytes target prot opt in out source
destination
213 18395 DROP all -- * * 0.0.0.0/0
0.0.0.0/0 state INVALID
Chain dropNotSyn (2 references)
pkts bytes target prot opt in out source
destination
55 31388 DROP tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp flags:!0x17/0x02
Chain dynamic (6 references)
pkts bytes target prot opt in out source
destination
Chain eth0_fwd (1 references)
pkts bytes target prot opt in out source
destination
0 0 dynamic all -- * * 0.0.0.0/0
0.0.0.0/0 state INVALID,NEW
0 0 net2all all -- * ath0 0.0.0.0/0
0.0.0.0/0
1384K 1325M net2all all -- * eth1 0.0.0.0/0
0.0.0.0/0
Chain eth0_in (1 references)
pkts bytes target prot opt in out source
destination
20731 6964K dynamic all -- * * 0.0.0.0/0
0.0.0.0/0 state INVALID,NEW
26470 7783K net2all all -- * * 0.0.0.0/0
0.0.0.0/0
Chain eth1_fwd (1 references)
pkts bytes target prot opt in out source
destination
7471 553K dynamic all -- * * 0.0.0.0/0
0.0.0.0/0 state INVALID,NEW
1061K 240M loc2net all -- * eth0 0.0.0.0/0
0.0.0.0/0
0 0 ACCEPT all -- * ath0 0.0.0.0/0
0.0.0.0/0
Chain eth1_in (1 references)
pkts bytes target prot opt in out source
destination
663 87699 dynamic all -- * * 0.0.0.0/0
0.0.0.0/0 state INVALID,NEW
48209 3248K loc2fw all -- * * 0.0.0.0/0
0.0.0.0/0
Chain fw2loc (2 references)
pkts bytes target prot opt in out source
destination
138K 195M ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
369 70518 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0
Chain fw2net (1 references)
pkts bytes target prot opt in out source
destination
3461 255K ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
2588 231K ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0
Chain loc2fw (2 references)
pkts bytes target prot opt in out source
destination
47546 3160K ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
663 87699 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0
Chain loc2net (2 references)
pkts bytes target prot opt in out source
destination
1053K 240M ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
7471 553K ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0
Chain net2all (3 references)
pkts bytes target prot opt in out source
destination
1389K 1325M ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
20731 6964K Drop all -- * * 0.0.0.0/0
0.0.0.0/0
1796 587K LOG all -- * * 0.0.0.0/0
0.0.0.0/0 LOG flags 0 level 6 prefix
`Shorewall:net2all:DROP:''
1796 587K DROP all -- * * 0.0.0.0/0
0.0.0.0/0
Chain reject (11 references)
pkts bytes target prot opt in out source
destination
0 0 DROP all -- * * 0.0.0.0/0
0.0.0.0/0 PKTTYPE = broadcast
0 0 DROP all -- * * 0.0.0.0/0
0.0.0.0/0 PKTTYPE = multicast
0 0 DROP all -- * * 255.255.255.255
0.0.0.0/0
0 0 DROP all -- * * 192.168.1.255
0.0.0.0/0
0 0 DROP all -- * * 255.255.255.255
0.0.0.0/0
0 0 DROP all -- * * 224.0.0.0/4
0.0.0.0/0
21 1260 REJECT tcp -- * * 0.0.0.0/0
0.0.0.0/0 reject-with tcp-reset
0 0 REJECT udp -- * * 0.0.0.0/0
0.0.0.0/0 reject-with icmp-port-unreachable
0 0 REJECT icmp -- * * 0.0.0.0/0
0.0.0.0/0 reject-with icmp-host-unreachable
0 0 REJECT all -- * * 0.0.0.0/0
0.0.0.0/0 reject-with icmp-host-prohibited
Chain shorewall (0 references)
pkts bytes target prot opt in out source
destination
Chain smurfs (0 references)
pkts bytes target prot opt in out source
destination
0 0 LOG all -- * * 255.255.255.255
0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:''
0 0 DROP all -- * * 255.255.255.255
0.0.0.0/0
0 0 LOG all -- * * 192.168.1.255
0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:''
0 0 DROP all -- * * 192.168.1.255
0.0.0.0/0
0 0 LOG all -- * * 255.255.255.255
0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:''
0 0 DROP all -- * * 255.255.255.255
0.0.0.0/0
0 0 LOG all -- * * 224.0.0.0/4
0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:''
0 0 DROP all -- * * 224.0.0.0/4
0.0.0.0/0
Dec 8 05:54:15 net2all:DROP:IN=eth0 OUT= SRC=220.163.76.35 DST=68.57.216.61
LEN=90 TOS=0x00 PREC=0x00 TTL=40 ID=2813 PROTO=UDP SPT=14607 DPT=62777
LEN=70
Dec 8 05:54:34 net2all:DROP:IN=eth0 OUT= SRC=221.10.229.30 DST=68.57.216.61
LEN=376 TOS=0x00 PREC=0x00 TTL=48 ID=0 DF PROTO=UDP SPT=49962 DPT=1028
LEN=356
Dec 8 05:54:34 net2all:DROP:IN=eth0 OUT= SRC=221.10.229.30 DST=68.57.216.61
LEN=376 TOS=0x00 PREC=0x00 TTL=48 ID=0 DF PROTO=UDP SPT=49962 DPT=1029
LEN=356
Dec 8 05:54:34 net2all:DROP:IN=eth0 OUT= SRC=221.10.229.30 DST=68.57.216.61
LEN=376 TOS=0x00 PREC=0x00 TTL=48 ID=0 DF PROTO=UDP SPT=49962 DPT=1030
LEN=356
Dec 8 05:54:34 net2all:DROP:IN=eth0 OUT= SRC=221.10.229.30 DST=68.57.216.61
LEN=376 TOS=0x00 PREC=0x00 TTL=48 ID=0 DF PROTO=UDP SPT=49962 DPT=1031
LEN=356
Dec 8 05:54:34 net2all:DROP:IN=eth0 OUT= SRC=221.10.229.30 DST=68.57.216.61
LEN=376 TOS=0x00 PREC=0x00 TTL=48 ID=0 DF PROTO=UDP SPT=49962 DPT=1032
LEN=356
Dec 8 05:54:34 net2all:DROP:IN=eth0 OUT= SRC=221.10.229.30 DST=68.57.216.61
LEN=376 TOS=0x00 PREC=0x00 TTL=48 ID=0 DF PROTO=UDP SPT=49962 DPT=1033
LEN=356
Dec 8 05:54:34 net2all:DROP:IN=eth0 OUT= SRC=221.10.229.30 DST=68.57.216.61
LEN=376 TOS=0x00 PREC=0x00 TTL=48 ID=0 DF PROTO=UDP SPT=49962 DPT=4081
LEN=356
Dec 8 05:54:34 net2all:DROP:IN=eth0 OUT= SRC=221.10.229.30 DST=68.57.216.61
LEN=376 TOS=0x00 PREC=0x00 TTL=48 ID=0 DF PROTO=UDP SPT=49962 DPT=2 LEN=356
Dec 8 05:56:10 net2all:DROP:IN=eth0 OUT= SRC=66.122.5.12 DST=68.57.216.61
LEN=677 TOS=0x00 PREC=0x00 TTL=114 ID=6943 PROTO=UDP SPT=10304 DPT=1026
LEN=657
Dec 8 06:01:03 net2all:DROP:IN=eth0 OUT= SRC=221.10.254.97 DST=68.57.216.61
LEN=501 TOS=0x00 PREC=0x00 TTL=47 ID=0 DF PROTO=UDP SPT=32775 DPT=1027
LEN=481
Dec 8 06:01:46 net2all:DROP:IN=eth0 OUT= SRC=213.84.99.76 DST=68.57.216.61
LEN=90 TOS=0x00 PREC=0x00 TTL=43 ID=61437 PROTO=UDP SPT=9800 DPT=63072
LEN=70
Dec 8 06:02:22 net2all:DROP:IN=eth0 OUT= SRC=222.136.130.87
DST=68.57.216.61 LEN=293 TOS=0x00 PREC=0x00 TTL=110 ID=64872 PROTO=UDP
SPT=21842 DPT=64026 LEN=273
Dec 8 06:02:29 net2all:DROP:IN=eth0 OUT= SRC=221.211.255.11
DST=68.57.216.61 LEN=485 TOS=0x00 PREC=0x00 TTL=46 ID=0 DF PROTO=UDP
SPT=56474 DPT=1027 LEN=465
Dec 8 06:03:25 net2all:DROP:IN=eth0 OUT= SRC=202.103.86.66 DST=68.57.216.61
LEN=384 TOS=0x00 PREC=0x00 TTL=39 ID=0 DF PROTO=UDP SPT=37936 DPT=1026
LEN=364
Dec 8 06:03:25 net2all:DROP:IN=eth0 OUT= SRC=202.103.86.66 DST=68.57.216.61
LEN=384 TOS=0x00 PREC=0x00 TTL=39 ID=0 DF PROTO=UDP SPT=37936 DPT=1030
LEN=364
Dec 8 06:03:25 net2all:DROP:IN=eth0 OUT= SRC=202.103.86.66 DST=68.57.216.61
LEN=384 TOS=0x00 PREC=0x00 TTL=39 ID=0 DF PROTO=UDP SPT=37936 DPT=1031
LEN=364
Dec 8 06:03:25 net2all:DROP:IN=eth0 OUT= SRC=202.103.86.66 DST=68.57.216.61
LEN=384 TOS=0x00 PREC=0x00 TTL=39 ID=0 DF PROTO=UDP SPT=37936 DPT=1032
LEN=364
Dec 8 06:03:25 net2all:DROP:IN=eth0 OUT= SRC=202.103.86.66 DST=68.57.216.61
LEN=384 TOS=0x00 PREC=0x00 TTL=39 ID=0 DF PROTO=UDP SPT=37936 DPT=4081
LEN=364
Dec 8 06:03:37 net2all:DROP:IN=eth0 OUT= SRC=61.230.73.185 DST=68.57.216.61
LEN=293 TOS=0x00 PREC=0x00 TTL=110 ID=50414 PROTO=UDP SPT=19355 DPT=64029
LEN=273
NAT Table
Chain PREROUTING (policy ACCEPT 27459 packets, 7410K bytes)
pkts bytes target prot opt in out source
destination
Chain POSTROUTING (policy ACCEPT 2728 packets, 232K bytes)
pkts bytes target prot opt in out source
destination
8728 662K eth0_masq all -- * eth0 0.0.0.0/0
0.0.0.0/0
Chain OUTPUT (policy ACCEPT 2707 packets, 231K bytes)
pkts bytes target prot opt in out source
destination
Chain eth0_masq (1 references)
pkts bytes target prot opt in out source
destination
6919 507K MASQUERADE all -- * * 192.168.1.0/24
0.0.0.0/0
Mangle Table
Chain PREROUTING (policy ACCEPT 2522K packets, 1576M bytes)
pkts bytes target prot opt in out source
destination
2522K 1576M tcpre all -- * * 0.0.0.0/0
0.0.0.0/0
Chain INPUT (policy ACCEPT 77417 packets, 11M bytes)
pkts bytes target prot opt in out source
destination
Chain FORWARD (policy ACCEPT 2444K packets, 1565M bytes)
pkts bytes target prot opt in out source
destination
2444K 1565M tcfor all -- * * 0.0.0.0/0
0.0.0.0/0
Chain OUTPUT (policy ACCEPT 147K packets, 195M bytes)
pkts bytes target prot opt in out source
destination
147K 195M tcout all -- * * 0.0.0.0/0
0.0.0.0/0
Chain POSTROUTING (policy ACCEPT 2592K packets, 1760M bytes)
pkts bytes target prot opt in out source
destination
2592K 1760M tcpost all -- * * 0.0.0.0/0
0.0.0.0/0
Chain tcfor (1 references)
pkts bytes target prot opt in out source
destination
Chain tcout (1 references)
pkts bytes target prot opt in out source
destination
Chain tcpost (1 references)
pkts bytes target prot opt in out source
destination
Chain tcpre (1 references)
pkts bytes target prot opt in out source
destination
tcp 6 431999 ESTABLISHED src=192.168.1.2 dst=217.155.75.100 sport=61215
dport=6881 packets=67934 bytes=31455663 src=217.155.75.100 dst=68.57.216.61
sport=6881 dport=61215 packets=43839 bytes=6859620 [ASSURED] mark=0 use=2
rate=30
tcp 6 74 TIME_WAIT src=192.168.1.2 dst=65.54.161.253 sport=64046
dport=80 packets=9 bytes=2546 src=65.54.161.253 dst=68.57.216.61 sport=80
dport=64046 packets=6 bytes=670 [ASSURED] mark=0 use=1 rate=950
tcp 6 431982 ESTABLISHED src=192.168.1.2 dst=205.188.248.112
sport=60784 dport=5190 packets=415 bytes=19505 src=205.188.248.112
dst=68.57.216.61 sport=5190 dport=60784 packets=415 bytes=17211 [ASSURED]
mark=0 use=1 rate=10
tcp 6 431936 ESTABLISHED src=192.168.1.2 dst=207.46.6.193 sport=63828
dport=1863 packets=156 bytes=15068 src=207.46.6.193 dst=68.57.216.61
sport=1863 dport=63828 packets=154 bytes=15042 [ASSURED] mark=0 use=1
rate=70
tcp 6 431999 ESTABLISHED src=192.168.1.2 dst=66.17.144.1 sport=61206
dport=6883 packets=88801 bytes=3766553 src=66.17.144.1 dst=68.57.216.61
sport=6883 dport=61206 packets=160923 bytes=126804585 [ASSURED] mark=0 use=3
rate=11760
tcp 6 431999 ESTABLISHED src=192.168.1.2 dst=80.14.198.128 sport=63477
dport=6881 packets=13338 bytes=5632523 src=80.14.198.128 dst=68.57.216.61
sport=6881 dport=63477 packets=10076 bytes=807274 [ASSURED] mark=0 use=1
rate=70
tcp 6 429881 ESTABLISHED src=192.168.1.2 dst=81.56.91.16 sport=63556
dport=6881 packets=1 bytes=576 [UNREPLIED] src=81.56.91.16 dst=68.57.216.61
sport=6881 dport=63556 packets=0 bytes=0 mark=0 use=1 rate=0
tcp 6 431999 ESTABLISHED src=192.168.1.2 dst=195.75.219.114 sport=61209
dport=6881 packets=13452 bytes=566856 src=195.75.219.114 dst=68.57.216.61
sport=6881 dport=61209 packets=17416 bytes=11135904 [ASSURED] mark=0 use=1
rate=890
tcp 6 431999 ESTABLISHED src=192.168.1.2 dst=213.251.136.104
sport=61207 dport=10002 packets=27002 bytes=1135740 src=213.251.136.104
dst=68.57.216.61 sport=10002 dport=61207 packets=29708 bytes=35848507
[ASSURED] mark=0 use=2 rate=3590
tcp 6 431982 ESTABLISHED src=192.168.1.2 dst=205.188.8.200 sport=60782
dport=5190 packets=454 bytes=22500 src=205.188.8.200 dst=68.57.216.61
sport=5190 dport=60782 packets=460 bytes=26027 [ASSURED] mark=0 use=1
rate=10
tcp 6 431999 ESTABLISHED src=192.168.1.2 dst=201.34.38.98 sport=61202
dport=6203 packets=7676 bytes=2148066 src=201.34.38.98 dst=68.57.216.61
sport=6203 dport=61202 packets=6907 bytes=2132583 [ASSURED] mark=0 use=1
rate=30
tcp 6 92 TIME_WAIT src=192.168.1.2 dst=212.85.150.182 sport=64049
dport=8080 packets=6 bytes=613 src=212.85.150.182 dst=68.57.216.61
sport=8080 dport=64049 packets=5 bytes=427 [ASSURED] mark=0 use=1 rate=260
tcp 6 100 SYN_SENT src=192.168.1.2 dst=81.56.91.16 sport=64050
dport=6881 packets=3 bytes=156 [UNREPLIED] src=81.56.91.16 dst=68.57.216.61
sport=6881 dport=64050 packets=0 bytes=0 mark=0 use=1 rate=0
tcp 6 75 TIME_WAIT src=192.168.1.2 dst=65.19.179.10 sport=64048
dport=110 packets=8 bytes=385 src=65.19.179.10 dst=68.57.216.61 sport=110
dport=64048 packets=8 bytes=405 [ASSURED] mark=0 use=1 rate=160
tcp 6 75 TIME_WAIT src=192.168.1.2 dst=65.54.161.253 sport=64047
dport=80 packets=9 bytes=2555 src=65.54.161.253 dst=68.57.216.61 sport=80
dport=64047 packets=6 bytes=670 [ASSURED] mark=0 use=1 rate=950
tcp 6 431999 ESTABLISHED src=192.168.1.2 dst=65.5.211.24 sport=61210
dport=6881 packets=17095 bytes=739595 src=65.5.211.24 dst=68.57.216.61
sport=6881 dport=61210 packets=26505 bytes=34627846 [ASSURED] mark=0 use=1
rate=7630
tcp 6 431999 ESTABLISHED src=192.168.1.2 dst=168.75.98.100 sport=61212
dport=6887 packets=31481 bytes=1354074 src=168.75.98.100 dst=68.57.216.61
sport=6887 dport=61212 packets=54232 bytes=37862904 [ASSURED] mark=0 use=1
rate=3460
tcp 6 429071 ESTABLISHED src=192.168.1.2 dst=87.249.40.80 sport=61259
dport=6884 packets=10196 bytes=423251 src=87.249.40.80 dst=68.57.216.61
sport=6884 dport=61259 packets=10351 bytes=500271 [ASSURED] mark=0 use=1
rate=0
tcp 6 431999 ESTABLISHED src=192.168.1.2 dst=65.67.155.153 sport=63760
dport=6881 packets=1930 bytes=524785 src=65.67.155.153 dst=68.57.216.61
sport=6881 dport=63760 packets=1557 bytes=254382 [ASSURED] mark=0 use=1
rate=90
tcp 6 431999 ESTABLISHED src=192.168.1.2 dst=212.85.147.179 sport=61204
dport=6882 packets=68154 bytes=2936471 src=212.85.147.179 dst=68.57.216.61
sport=6882 dport=61204 packets=131258 bytes=181384830 [ASSURED] mark=0 use=2
rate=31110
tcp 6 429521 ESTABLISHED src=192.168.1.2 dst=81.56.91.16 sport=63481
dport=6881 packets=1 bytes=576 [UNREPLIED] src=81.56.91.16 dst=68.57.216.61
sport=6881 dport=63481 packets=0 bytes=0 mark=0 use=1 rate=0
tcp 6 421840 ESTABLISHED src=192.168.1.2 dst=81.56.91.16 sport=62099
dport=6881 packets=1 bytes=576 [UNREPLIED] src=81.56.91.16 dst=68.57.216.61
sport=6881 dport=62099 packets=0 bytes=0 mark=0 use=1 rate=0
tcp 6 431981 ESTABLISHED src=192.168.1.2 dst=216.155.193.174
sport=60780 dport=5050 packets=435 bytes=26435 src=216.155.193.174
dst=68.57.216.61 sport=5050 dport=60780 packets=427 bytes=18239 [ASSURED]
mark=0 use=1 rate=10
tcp 6 431999 ESTABLISHED src=192.168.1.2 dst=87.249.40.80 sport=63555
dport=6884 packets=35435 bytes=17148246 src=87.249.40.80 dst=68.57.216.61
sport=6884 dport=63555 packets=24923 bytes=1460573 [ASSURED] mark=0 use=4
rate=8330
tcp 6 429044 ESTABLISHED src=192.168.1.2 dst=81.56.91.16 sport=63402
dport=6881 packets=2 bytes=1152 [UNREPLIED] src=81.56.91.16 dst=68.57.216.61
sport=6881 dport=63402 packets=0 bytes=0 mark=0 use=1 rate=0
tcp 6 431999 ESTABLISHED src=192.168.1.2 dst=61.211.241.52 sport=62810
dport=12000 packets=1411 bytes=70412 src=61.211.241.52 dst=68.57.216.61
sport=12000 dport=62810 packets=1409 bytes=58942 [ASSURED] mark=0 use=1
rate=30
tcp 6 431999 ESTABLISHED src=192.168.1.2 dst=71.131.33.109 sport=61205
dport=6881 packets=62086 bytes=26783943 src=71.131.33.109 dst=68.57.216.61
sport=6881 dport=61205 packets=51123 bytes=24227253 [ASSURED] mark=0 use=1
rate=5950
tcp 6 421720 ESTABLISHED src=192.168.1.2 dst=81.56.91.16 sport=62097
dport=6881 packets=1 bytes=576 [UNREPLIED] src=81.56.91.16 dst=68.57.216.61
sport=6881 dport=62097 packets=0 bytes=0 mark=0 use=1 rate=0
tcp 6 426040 ESTABLISHED src=192.168.1.2 dst=81.56.91.16 sport=63221
dport=6881 packets=1 bytes=576 [UNREPLIED] src=81.56.91.16 dst=68.57.216.61
sport=6881 dport=63221 packets=0 bytes=0 mark=0 use=1 rate=0
tcp 6 431999 ESTABLISHED src=192.168.1.2 dst=82.116.73.110 sport=61211
dport=6881 packets=248666 bytes=119727374 src=82.116.73.110 dst=68.57.216.61
sport=6881 dport=61211 packets=176141 bytes=35296560 [ASSURED] mark=0 use=1
rate=17750
tcp 6 431940 ESTABLISHED src=192.168.1.2 dst=71.113.230.31 sport=61203
dport=65535 packets=16123 bytes=701697 src=71.113.230.31 dst=68.57.216.61
sport=65535 dport=61203 packets=27804 bytes=37013336 [ASSURED] mark=0 use=1
rate=0
tcp 6 431980 ESTABLISHED src=192.168.1.2 dst=207.46.6.22 sport=60781
dport=1863 packets=900 bytes=39288 src=207.46.6.22 dst=68.57.216.61
sport=1863 dport=60781 packets=526 bytes=44038 [ASSURED] mark=0 use=1
rate=20
IP Configuration
1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,NOTRAILERS,UP> mtu 1500 qdisc pfifo_fast
qlen
1000
link/ether 00:0b:6a:3f:e6:72 brd ff:ff:ff:ff:ff:ff
inet 68.57.216.61/25 brd 255.255.255.255 scope global eth0
inet6 fe80::20b:6aff:fe3f:e672/64 scope link
valid_lft forever preferred_lft forever
3: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000
link/ether 00:0f:3d:f4:5e:9d brd ff:ff:ff:ff:ff:ff
inet 192.168.1.1/24 brd 192.168.1.255 scope global eth1
inet6 fe80::20f:3dff:fef4:5e9d/64 scope link
valid_lft forever preferred_lft forever
4: ath0: <BROADCAST,MULTICAST> mtu 1500 qdisc noop qlen 200
link/ether 00:0f:3d:ad:c7:7a brd ff:ff:ff:ff:ff:ff
5: sit0: <NOARP> mtu 1480 qdisc noop
link/sit 0.0.0.0 brd 0.0.0.0
IP Stats
1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
RX: bytes packets errors dropped overrun mcast
156264 2738 0 0 0 0
TX: bytes packets errors dropped carrier collsns
156264 2738 0 0 0 0
2: eth0: <BROADCAST,MULTICAST,NOTRAILERS,UP> mtu 1500 qdisc pfifo_fast
qlen
1000
link/ether 00:0b:6a:3f:e6:72 brd ff:ff:ff:ff:ff:ff
RX: bytes packets errors dropped overrun mcast
1588142415 5313955 0 0 0 0
TX: bytes packets errors dropped carrier collsns
255620899 1068259 0 0 0 0
3: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000
link/ether 00:0f:3d:f4:5e:9d brd ff:ff:ff:ff:ff:ff
RX: bytes packets errors dropped overrun mcast
264986522 1110232 0 0 0 0
TX: bytes packets errors dropped carrier collsns
1547925215 1521816 0 0 0 0
4: ath0: <BROADCAST,MULTICAST> mtu 1500 qdisc noop qlen 200
link/ether 00:0f:3d:ad:c7:7a brd ff:ff:ff:ff:ff:ff
RX: bytes packets errors dropped overrun mcast
0 0 0 0 0 0
TX: bytes packets errors dropped carrier collsns
0 0 0 0 0 0
5: sit0: <NOARP> mtu 1480 qdisc noop
link/sit 0.0.0.0 brd 0.0.0.0
RX: bytes packets errors dropped overrun mcast
0 0 0 0 0 0
TX: bytes packets errors dropped carrier collsns
0 0 0 0 0 0
/proc
/proc/sys/net/ipv4/ip_forward = 1
/proc/sys/net/ipv4/icmp_echo_ignore_all = 0
/proc/sys/net/ipv4/conf/all/proxy_arp = 0
/proc/sys/net/ipv4/conf/all/arp_filter = 0
/proc/sys/net/ipv4/conf/all/rp_filter = 0
/proc/sys/net/ipv4/conf/all/log_martians = 0
/proc/sys/net/ipv4/conf/default/proxy_arp = 0
/proc/sys/net/ipv4/conf/default/arp_filter = 0
/proc/sys/net/ipv4/conf/default/rp_filter = 1
/proc/sys/net/ipv4/conf/default/log_martians = 0
/proc/sys/net/ipv4/conf/eth0/proxy_arp = 0
/proc/sys/net/ipv4/conf/eth0/arp_filter = 0
/proc/sys/net/ipv4/conf/eth0/rp_filter = 1
/proc/sys/net/ipv4/conf/eth0/log_martians = 0
/proc/sys/net/ipv4/conf/eth1/proxy_arp = 0
/proc/sys/net/ipv4/conf/eth1/arp_filter = 0
/proc/sys/net/ipv4/conf/eth1/rp_filter = 1
/proc/sys/net/ipv4/conf/eth1/log_martians = 0
/proc/sys/net/ipv4/conf/lo/proxy_arp = 0
/proc/sys/net/ipv4/conf/lo/arp_filter = 0
/proc/sys/net/ipv4/conf/lo/rp_filter = 0
/proc/sys/net/ipv4/conf/lo/log_martians = 0
Routing Rules
0: from all lookup local
32766: from all lookup main
32767: from all lookup default
Table default:
Table local:
local 192.168.1.1 dev eth1 proto kernel scope host src 192.168.1.1
broadcast 192.168.1.0 dev eth1 proto kernel scope link src 192.168.1.1
broadcast 127.255.255.255 dev lo proto kernel scope link src 127.0.0.1
broadcast 68.57.216.0 dev eth0 proto kernel scope link src 68.57.216.61
broadcast 192.168.1.255 dev eth1 proto kernel scope link src 192.168.1.1
broadcast 68.57.216.127 dev eth0 proto kernel scope link src 68.57.216.61
local 68.57.216.61 dev eth0 proto kernel scope host src 68.57.216.61
broadcast 127.0.0.0 dev lo proto kernel scope link src 127.0.0.1
local 127.0.0.1 dev lo proto kernel scope host src 127.0.0.1
local 127.0.0.0/8 dev lo proto kernel scope host src 127.0.0.1
Table main:
68.57.216.0/25 dev eth0 proto kernel scope link src 68.57.216.61 metric
10
192.168.1.0/24 dev eth1 proto kernel scope link src 192.168.1.1 metric
10
default via 68.57.216.1 dev eth0 metric 10
ARP
? (68.57.216.1) at 00:01:5C:22:92:42 [ether] on eth0
? (192.168.1.2) at 00:11:95:07:7A:F9 [ether] on eth1
Modules
ipt_MASQUERADE 2816 1
ipt_REJECT 4256 4
ipt_LOG 6272 13
ipt_state 1312 13
ipt_pkttype 1184 4
ipt_CONNMARK 1696 0
ipt_MARK 1984 0
ipt_ROUTE 4260 0
ipt_connmark 1216 0
ipt_owner 2432 0
ipt_recent 9292 0
ipt_iprange 1312 0
ipt_physdev 1744 0
ipt_multiport 2112 0
ipt_conntrack 1792 0
ip_set_portmap 3840 0
ip_set_macipmap 3780 0
ip_set_ipmap 3872 0
ip_set_iphash 5924 0
ip_set 18876 8
ip_set_portmap,ip_set_macipmap,ip_set_ipmap,ip_set_iphash
ip_nat_irc 1824 0
ip_nat_tftp 1216 0
ip_nat_ftp 2560 0
ip_conntrack_irc 70352 1 ip_nat_irc
ip_conntrack_tftp 3088 1 ip_nat_tftp
ip_conntrack_ftp 71408 1 ip_nat_ftp
ip_conntrack 40824 10
ipt_MASQUERADE,ipt_state,ipt_conntrack,ip_nat_irc,ip_nat_tftp,ip_nat_ftp,iptable_nat,ip_conntrack_irc,ip_conntrack_tftp,ip_conntrack_ftp
ip_tables 20416 18
ipt_MASQUERADE,ipt_REJECT,ipt_LOG,ipt_state,ipt_pkttype,ipt_CONNMARK,ipt_MARK,ipt_ROUTE,ipt_connmark,ipt_owner,ipt_recent,ipt_iprange,ipt_physdev,ipt_multiport,ipt_conntrack,iptable_mangle,iptable_nat,iptable_filter
ip addr show:
1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,NOTRAILERS,UP> mtu 1500 qdisc pfifo_fast
qlen
1000
link/ether 00:0b:6a:3f:e6:72 brd ff:ff:ff:ff:ff:ff
inet 68.57.216.61/25 brd 255.255.255.255 scope global eth0
inet6 fe80::20b:6aff:fe3f:e672/64 scope link
valid_lft forever preferred_lft forever
3: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000
link/ether 00:0f:3d:f4:5e:9d brd ff:ff:ff:ff:ff:ff
inet 192.168.1.1/24 brd 192.168.1.255 scope global eth1
inet6 fe80::20f:3dff:fef4:5e9d/64 scope link
valid_lft forever preferred_lft forever
4: ath0: <BROADCAST,MULTICAST> mtu 1500 qdisc noop qlen 200
link/ether 00:0f:3d:ad:c7:7a brd ff:ff:ff:ff:ff:ff
5: sit0: <NOARP> mtu 1480 qdisc noop
link/sit 0.0.0.0 brd 0.0.0.0
ip route show:
68.57.216.0/25 dev eth0 proto kernel scope link src 68.57.216.61 metric
10
192.168.1.0/24 dev eth1 proto kernel scope link src 192.168.1.1 metric
10
default via 68.57.216.1 dev eth0 metric 10
-------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc. Do you grep through log files
for problems? Stop! Download the new AJAX search engine that makes
searching your log files as easy as surfing the web. DOWNLOAD SPLUNK!
http://ads.osdn.com/?ad_id=7637&alloc_id=16865&op=click