The dropped packets are 44 bytes long, which is suspicious. I would guess that fragmentation is involved. > -----Original Message----- > From: netfilter-owner@xxxxxxxxxxxxxxx [mailto:netfilter- > owner@xxxxxxxxxxxxxxx] On Behalf Of TheOldFellow > Sent: Wednesday, November 12, 2008 11:53 PM > To: netfilter@xxxxxxxxxxxxxxx > Subject: www.adobe.com > > My firewall works well, except that I can't get any kind of access to > www.adobe.com. > > This is typical: > > # ping www.adobe.com > PING www.wip3.adobe.com (192.150.18.101): 56 data bytes > 64 bytes from 192.150.18.101: icmp_seq=0 ttl=243 time=194.939 ms > 64 bytes from 192.150.18.101: icmp_seq=1 ttl=243 time=193.576 ms > 64 bytes from 192.150.18.101: icmp_seq=2 ttl=243 time=194.612 ms > 64 bytes from 192.150.18.101: icmp_seq=3 ttl=243 time=194.844 ms > --- www.wip3.adobe.com ping statistics --- > 4 packets transmitted, 4 packets received, 0% packet loss > round-trip min/avg/max/stddev = 193.576/194.493/194.939/0.542 ms > > so far so good... > > # wget http://www.adobe.com/index.html > --07:45:04-- http://www.adobe.com/index.html > => `index.html' > Resolving www.adobe.com... 192.150.18.101 > Connecting to www.adobe.com|192.150.18.101|:80... > > it just times out - browsers are the same. > > Looking at the log shows the following warnings: > > IPTABLES:INPUT IN=net OUT= > MAC=00:a0:c9:43:8f:77:00:90:96:f7:74:42:08:00 SRC=192.150.18.101 > DST=192.168.1.2 LEN=44 TOS=0x00 PREC=0x00 TTL=53 ID=9637 PROTO=TCP > SPT=80 DPT=3723 WINDOW=20498 RES=0x00 URGP=0 > IPTABLES:INPUT IN=net OUT= > MAC=00:a0:c9:43:8f:77:00:90:96:f7:74:42:08:00 SRC=192.150.18.101 > DST=192.168.1.2 LEN=44 TOS=0x00 PREC=0x00 TTL=53 ID=45688 PROTO=TCP > SPT=80 DPT=3723 WINDOW=20498 RES=0x00 URGP=0 > IPTABLES:INPUT IN=net OUT= > MAC=00:a0:c9:43:8f:77:00:90:96:f7:74:42:08:00 SRC=192.150.18.101 > DST=192.168.1.2 LEN=44 TOS=0x00 PREC=0x00 TTL=53 ID=37819 PROTO=TCP > SPT=80 DPT=3723 WINDOW=20498 RES=0x00 URGP=0 > > and my iptables: > iptables -L > Chain INPUT (policy DROP) > target prot opt source destination > ACCEPT all -- anywhere anywhere > ACCEPT all -- anywhere anywhere state > RELATED,ESTABLISHED > ACCEPT udp -- anywhere anywhere udp > dpt:domain > ACCEPT tcp -- anywhere anywhere tcp > dpt:domain > ACCEPT tcp -- anywhere anywhere tcp > dpt:http > ACCEPT udp -- anywhere anywhere udp > dpt:http > ACCEPT tcp -- anywhere anywhere tcp > dpt:irdmi > ACCEPT udp -- anywhere anywhere udp > dpt:irdmi > ACCEPT tcp -- anywhere anywhere tcp > dpt:ftp > ACCEPT udp -- anywhere anywhere udp > dpt:ftp > ACCEPT tcp -- anywhere anywhere tcp > dpt:ssh > ACCEPT udp -- anywhere anywhere udp > dpt:ssh > ACCEPT all -- 172.16.1.0/24 anywhere > ACCEPT tcp -- anywhere anywhere tcp > dpt:smtp > ACCEPT udp -- anywhere anywhere udp > dpt:smtp > LOG all -- anywhere anywhere LOG level > warning prefix `IPTABLES:INPUT ' > > Chain FORWARD (policy DROP) > target prot opt source destination > ACCEPT all -- anywhere anywhere state NEW > ACCEPT all -- 172.16.1.0/24 anywhere > ACCEPT all -- anywhere anywhere state > RELATED,ESTABLISHED > > Chain OUTPUT (policy DROP) > target prot opt source destination > ACCEPT all -- anywhere anywhere > > I'm completely stumped on this. Can anyone suggest a way forward? > > Thanks. > > R. > > -- > To unsubscribe from this list: send the line "unsubscribe netfilter" in > the body of a message to majordomo@xxxxxxxxxxxxxxx > More majordomo info at http://vger.kernel.org/majordomo-info.html -- To unsubscribe from this list: send the line "unsubscribe netfilter" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html