Hi, I'm using iptables to firewall my system but it doesn't seem to work. For example I have a cvs-server running (port 2401) that shoud not be accessible from the outside. Still when I'm trying to connect with "telnet mymachine 2401" I get a connection, if not on the first try then on the second. I get the following syslog: Apr 27 11:12:36 mymachine kernel: [IPTABLES DROP] : IN=eth0 OUT= MAC=00:0c:76:1d:b0:ec:00:02:85:1a:d7:20:08:00 SRC=193.250.17.211 DST=*myip* LEN=60 TOS=0x10 PREC=0x00 TTL=52 ID=57653 DF PROTO=TCP SPT=40871 DPT=2401 WINDOW=5840 RES=0x00 SYN URGP=0 OPT (020405B40402080A000E2C400000000001030300) Apr 27 11:12:39 mymachine kernel: [IPTABLES DROP] : IN=eth0 OUT= MAC=00:0c:76:1d:b0:ec:00:02:85:1a:d7:20:08:00 SRC=193.250.17.211 DST=*myip* LEN=60 TOS=0x10 PREC=0x00 TTL=52 ID=57654 DF PROTO=TCP SPT=40871 DPT=2401 WINDOW=5840 RES=0x00 SYN URGP=0 OPT (020405B40402080A000E2D6C0000000001030300) Apr 27 11:12:45 mymachine cvs-pserver[1746]: connect from 193.250.17.211 You find my iptables configuration at the end of the message. Does anyone know why I can connect to my cvs server? Thankx a lot, Philipp Chain INPUT (policy ACCEPT) target prot opt source destination bad_tcp_packets tcp -- 0.0.0.0/0 0.0.0.0/0 tcp ACCEPT all -- 127.0.0.1 0.0.0.0/0 ACCEPT all -- *myip* 0.0.0.0/0 ACCEPT all -- 0.0.0.0/0 *myip* state RELATED,ESTABLISHED tcp_packets tcp -- 0.0.0.0/0 0.0.0.0/0 tcp udp_packets udp -- 0.0.0.0/0 0.0.0.0/0 udp icmp_packets icmp -- 0.0.0.0/0 0.0.0.0/0 log_drop all -- 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 3 Chain FORWARD (policy ACCEPT) target prot opt source destination Chain OUTPUT (policy ACCEPT) target prot opt source destination Chain allowed (10 references) target prot opt source destination ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp flags:0x16/0x02 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp state RELATED,ESTABLISHED DROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp Chain bad_tcp_packets (1 references) target prot opt source destination log_drop tcp -- 0.0.0.0/0 0.0.0.0/0 tcp flags:!0x16/0x02 state NEW Chain icmp_packets (1 references) target prot opt source destination ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmp type 8 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmp type 11 Chain log_accept (0 references) target prot opt source destination LOG all -- 0.0.0.0/0 0.0.0.0/0 LOG flags 6 level 4 prefix `[IPTABLES ACCEPT] : ' ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 Chain log_drop (5 references) target prot opt source destination LOG all -- 0.0.0.0/0 0.0.0.0/0 LOG flags 6 level 4 prefix `[IPTABLES DROP] : ' DROP all -- 0.0.0.0/0 0.0.0.0/0 Chain log_reject (1 references) target prot opt source destination LOG all -- 0.0.0.0/0 0.0.0.0/0 LOG flags 6 level 4 prefix `[IPTABLES REJECT] : ' REJECT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp reject-with tcp-reset REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable Chain tcp_packets (1 references) target prot opt source destination allowed tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 log_reject tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:113 allowed tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 allowed tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:443 allowed tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:10000 allowed tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:25 log_drop tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:465 allowed tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:110 log_drop tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:995 allowed tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:143 log_drop tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:993 allowed tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:389 allowed tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:1002 allowed tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:8080 Chain udp_packets (1 references) target prot opt source destination DROP udp -- 0.0.0.0/0 213.239.192.18 udp dpts:135:139 DROP udp -- 0.0.0.0/0 255.255.255.255 udp dpts:135:139