This rule would allow someone outside your firewall to route to your internal boxes. I wouldn't accept all connection from the external interface to the internal interface. $IPTABLES -A FORWARD -i $EXTIF -o $INTIF -j ACCEPT Also I wouldn't have a default policy of ACCEPT for the INPUT chain either. $IPTABLES -P INPUT ACCEPT Anyway.... the log entry below is interesting because it shows that the packet came in on eth0 and went out eth0, but given the source and destination addresses I would think it would have came in on one interface and gone out a different. The first two look like DNS queries based on the DPT, but the source port is that of a NetBIOS service. The last entry looks like potentially a legitimate web request. Which interface is your outside? Can you show us the output of a netstat -nr? Thanks, Preston -----Original Message----- From: Erik Ahlner [mailto:whyz@home.se] Sent: Tuesday, January 28, 2003 4:30 PM To: netfilter@lists.netfilter.org Subject: Should i be worried? Hello! I just happened to do a dmesg, and got this output: IN=eth0 OUT=eth0 SRC=192.168.0.186 DST=130.236.230.9 LEN=74 TOS=0x00 PREC=0x00 TTL=127 ID=14459 PROTO=UDP SPT=137 DPT=53 LEN=54 IN=eth0 OUT=eth0 SRC=192.168.0.186 DST=130.236.230.9 LEN=74 TOS=0x00 PREC=0x00 TTL=127 ID=14715 PROTO=UDP SPT=137 DPT=53 LEN=54 IN=eth0 OUT=eth0 SRC=192.168.0.88 DST=217.209.28.135 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=37469 DF PROTO=TCP SPT=2418 DPT=80 WINDOW=16384 RES=0x00 SYN URGP=0 As you can see, i get some message about traffic from 192.168.0.186 and .88 .. these two computers are NOT in my home network, so i guess that someone has named his computers like that on the university network, even though the university network has 130.236.x.x. Is this a problem for me? And what does this output actually mean? Has someone used my computer as a router? If they have, how is that possible? This is what my iptable looks like: $IPTABLES -P INPUT ACCEPT $IPTABLES -F INPUT $IPTABLES -P OUTPUT ACCEPT $IPTABLES -F OUTPUT $IPTABLES -P FORWARD DROP $IPTABLES -F FORWARD $IPTABLES -t nat -F $IPTABLES -A FORWARD -i $EXTIF -o $INTIF -j ACCEPT $IPTABLES -A FORWARD -i $INTIF -o $EXTIF -j ACCEPT $IPTABLES -A FORWARD -j LOG $IPTABLES -t nat -A POSTROUTING -o $EXTIF -j MASQUERADE $IPTABLES -A INPUT -s 192.168.0.0/24 -i eth0 -j DROP I thought that the last line was to stop this from happening.. Or am i just stupid? Did dmesg just show me that some packets have been dropped? Many thanks Erik Ahlner