RE: ping to internet hosta through NameServer of provider

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Apologize, these are my rulesets. As for pinging internet hosts, it is
working corectly now (after accepting packets from ISP NameServer). But the
only one problem is, that there are still logs in shell prompt and i am not
typing anything...

iptables -L -nv

Chain INPUT (policy DROP 59 packets, 6498 bytes)
 pkts bytes target     prot opt in     out     source
destination         
   18   868 tcp_segmenty  tcp  --  eth0   *       0.0.0.0/0
0.0.0.0/0          
   43  5995 udp_pakety  udp  --  eth0   *       0.0.0.0/0
0.0.0.0/0          
   33  2772 ACCEPT     icmp --  eth0   *       0.0.0.0/0
0.0.0.0/0          icmp type 0 
    0     0 ACCEPT     icmp --  eth0   *       0.0.0.0/0
0.0.0.0/0          icmp type 3 
    1    92 ACCEPT     icmp --  eth0   *       0.0.0.0/0
0.0.0.0/0          icmp type 8 
    0     0 ACCEPT     icmp --  eth0   *       0.0.0.0/0
0.0.0.0/0          icmp type 11 
    9   756 ACCEPT     all  --  eth1   *       0.0.0.0/0
0.0.0.0/0          
 3168  435K ACCEPT     all  --  eth2   *       0.0.0.0/0
0.0.0.0/0          
  131 11622 ACCEPT     all  --  lo     *       0.0.0.0/0
0.0.0.0/0          
    0     0 REJECT     tcp  --  eth0   *       0.0.0.0/0
0.0.0.0/0          tcp dpt:113 reject-with icmp-port-unreachable 
   56  6568 spoofing   all  --  eth0   *       0.0.0.0/0
0.0.0.0/0          
   56  6568 spoofing   all  --  eth0   *       0.0.0.0/0
0.0.0.0/0          
   20  2396 LOG        all  --  *      *       0.0.0.0/0
0.0.0.0/0          limit: avg 3/hour burst 5 LOG flags 0 level 4 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0
0.0.0.0/0          icmp type 8 limit: avg 1/sec burst 5 
    0     0 ACCEPT     all  --  eth1   *       0.0.0.0/0
0.0.0.0/0          
    0     0 ACCEPT     all  --  eth2   *       0.0.0.0/0
0.0.0.0/0          
   36  5139 ACCEPT     all  --  eth0   *       80.95.96.7
0.0.0.0/0          
    4   192 LOG        all  --  *      *       0.0.0.0/0
0.0.0.0/0          LOG flags 0 level 4 

Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source
destination         
    0     0 ACCEPT     all  --  eth1   *       0.0.0.0/0
0.0.0.0/0          
    0     0 ACCEPT     all  --  eth2   *       0.0.0.0/0
0.0.0.0/0          
    0     0 ACCEPT     all  --  eth0   eth1    0.0.0.0/0
0.0.0.0/0          state RELATED,ESTABLISHED 
    0     0 ACCEPT     all  --  eth2   *       0.0.0.0/0
0.0.0.0/0          
    0     0 ACCEPT     all  --  eth1   eth2    0.0.0.0/0
0.0.0.0/0          
    0     0 ACCEPT     all  --  eth2   eth1    0.0.0.0/0
0.0.0.0/0          
    0     0 ACCEPT     all  --  eth1   *       0.0.0.0/0
0.0.0.0/0          
    0     0 ACCEPT     all  --  eth0   eth1    0.0.0.0/0
0.0.0.0/0          state RELATED,ESTABLISHED 
    0     0 spoofing   all  --  eth0   *       0.0.0.0/0
0.0.0.0/0          

Chain OUTPUT (policy DROP 30 packets, 2520 bytes)
 pkts bytes target     prot opt in     out     source
destination         
   34  2728 ACCEPT     all  --  *      *       127.0.0.1
0.0.0.0/0          
    0     0 ACCEPT     all  --  *      *       192.168.0.201
0.0.0.0/0          
  145 13870 ACCEPT     all  --  *      *       192.168.0.1
0.0.0.0/0          
   97  7286 ACCEPT     all  --  *      *       82.142.67.253
0.0.0.0/0          
    0     0 ACCEPT     all  --  *      *       127.0.0.1
0.0.0.0/0          
    0     0 ACCEPT     all  --  *      *       192.168.0.1
0.0.0.0/0          
   53  4452 ACCEPT     all  --  *      *       192.168.200.1
0.0.0.0/0          
    0     0 ACCEPT     all  --  *      *       80.95.96.7
0.0.0.0/0          

Chain spoofing (3 references)
 pkts bytes target     prot opt in     out     source
destination         
    0     0 DROP       all  --  *      *       192.168.0.0/16
0.0.0.0/0          
    0     0 DROP       all  --  *      *       172.16.0.0/12
0.0.0.0/0          
    0     0 DROP       all  --  *      *       10.0.0.0/8
0.0.0.0/0          

Chain syn_flood (0 references)
 pkts bytes target     prot opt in     out     source
destination         
    0     0 RETURN     all  --  *      *       0.0.0.0/0
0.0.0.0/0          limit: avg 1/sec burst 5 
    0     0 DROP       all  --  *      *       0.0.0.0/0
0.0.0.0/0          

Chain tcp_segmenty (1 references)
 pkts bytes target     prot opt in     out     source
destination         
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0
0.0.0.0/0          tcp dpt:25 

Chain udp_pakety (1 references)
 pkts bytes target     prot opt in     out     source
destination         
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0
0.0.0.0/0          udp dpt:53  

iptables -L -t nat -nv

Chain PREROUTING (policy ACCEPT 3084 packets, 395K bytes)
 pkts bytes target     prot opt in     out     source
destination         
    0     0 REDIRECT   tcp  --  eth2   *       0.0.0.0/0
0.0.0.0/0          tcp dpt:80 redir ports 3128 
    0     0 DROP       all  --  eth0   *       192.168.0.0/16
0.0.0.0/0          
    0     0 DROP       all  --  eth0   *       172.16.0.0/12
0.0.0.0/0          
    0     0 DROP       all  --  eth0   *       10.0.0.0/8
0.0.0.0/0          

Chain POSTROUTING (policy ACCEPT 80 packets, 6594 bytes)
 pkts bytes target     prot opt in     out     source
destination         
   39  3035 MASQUERADE  all  --  *      eth0    0.0.0.0/0
0.0.0.0/0          

Chain OUTPUT (policy ACCEPT 149 packets, 12149 bytes)
 pkts bytes target     prot opt in     out     source
destination


Thanks in advance,
Stanley.

-----Original Message-----
From: netfilter-admin@xxxxxxxxxxxxxxxxxxx
[mailto:netfilter-admin@xxxxxxxxxxxxxxxxxxx] On Behalf Of Antony Stone
Sent: Tuesday, March 09, 2004 2:23 PM
To: netfilter@xxxxxxxxxxxxxxxxxxx
Subject: Re: ping to internet hosta through NameServer of provider

On Tuesday 09 March 2004 1:00 pm, Stanislav Puffler DiS. wrote:

> It seems like anything you´ve described. Here is the ruleset :
>
> iptables -L -nv

<snip>

If this is your ruleset, where is the LOG rule which produced the output you

posted earlier?

> > IN=eth0 OUT= MAC=.............. SRC="my_providers_nameserver_ip"
> > DST="ip_on_my_eth0" LEN=127 TOS=0x00 PREC=0x00 TTL=61 ID=3268 DF
> > PROTO=UDP SPT=53 DPT=32792 LEN=107

Antony.

-- 
People who use Microsoft software should be certified.

                                                     Please reply to the
list;
                                                           please don't CC
me.






[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux