Hello,

I've had a bad time getting the Internet connection sharing going in
Mandrake 9.0.  Basically it worked in beta 2, but since beta 4 it
doesn't work at all.  Never.  I thought it was due to the fact that i
had also tried to install terminal server but this time I have not
touched that, but it still doesn't work.

System details on "server": two RTL8139; eth0 (LAN) 192.168.0.1, eth1
(cable) static IP

When the "server is running 8.2, client PC connects to the Internet just
fine.

dhcpd and shorewall are running.  

relevant /var/log/messages output and service shorewall status output is
attached.

Thanks,
Damon

Shorewall- Status at damon.ext.dev-zone.org - Tue Sep 10 19:32:35 NZST 2002

Chain INPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination        
 
   23  1750 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0          
  372  350K eth1_in    all  --  eth1   *       0.0.0.0/0            0.0.0.0/0          
   38  4545 eth0_in    all  --  eth0   *       0.0.0.0/0            0.0.0.0/0          
    0     0 common     all  --  *      *       0.0.0.0/0            0.0.0.0/0          
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0          
LOG flags 0 level 6 prefix `Shorewall:INPUT:REJECT:' 
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0          

Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination        
 
    0     0 eth1_fwd   all  --  eth1   *       0.0.0.0/0            0.0.0.0/0          
    0     0 eth0_fwd   all  --  eth0   *       0.0.0.0/0            0.0.0.0/0          
    0     0 common     all  --  *      *       0.0.0.0/0            0.0.0.0/0          
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0          
LOG flags 0 level 6 prefix `Shorewall:FORWARD:REJECT:' 
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0          

Chain OUTPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination        
 
   23  1750 ACCEPT     all  --  *      lo      0.0.0.0/0            0.0.0.0/0          
   18  1698 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0          
state NEW,RELATED,ESTABLISHED 
  307 19269 fw2net     all  --  *      eth1    0.0.0.0/0            0.0.0.0/0          
    4   414 all2all    all  --  *      eth0    0.0.0.0/0            0.0.0.0/0          
    0     0 common     all  --  *      *       0.0.0.0/0            0.0.0.0/0          
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0          
LOG flags 0 level 6 prefix `Shorewall:OUTPUT:REJECT:' 
    0     0 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0          

Chain all2all (2 references)
 pkts bytes target     prot opt in     out     source               destination        
 
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0          
state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0          
state NEW tcp flags:!0x16/0x02 
   42  4959 common     all  --  *      *       0.0.0.0/0            0.0.0.0/0          
   19  1267 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0          
LOG flags 0 level 6 prefix `Shorewall:all2all:REJECT:' 
   19  1267 reject     all  --  *      *       0.0.0.0/0            0.0.0.0/0          

Chain common (5 references)
 pkts bytes target     prot opt in     out     source               destination        
 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0          
icmp type 8 
    0     0 icmpdef    icmp --  *      *       0.0.0.0/0            0.0.0.0/0          
    0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0          
state INVALID 
    4   312 REJECT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0          
udp dpts:137:139 reject-with icmp-port-unreachable 
    0     0 REJECT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0          
udp dpt:445 reject-with icmp-port-unreachable 
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0          
tcp dpt:135 
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0          
udp dpt:1900 
    2  1152 DROP       all  --  *      *       0.0.0.0/0            255.255.255.255    
    4   112 DROP       all  --  *      *       0.0.0.0/0            224.0.0.0/4        
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0          
tcp dpt:113 
    3   336 DROP       all  --  *      *       0.0.0.0/0            202.0.35.255       
   20  2462 DROP       all  --  *      *       0.0.0.0/0            192.168.0.255      

Chain dynamic (4 references)
 pkts bytes target     prot opt in     out     source               destination        
 

Chain eth0_fwd (1 references)
 pkts bytes target     prot opt in     out     source               destination        
 
    0     0 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0          
    0     0 masq2net   all  --  *      eth1    0.0.0.0/0            0.0.0.0/0          

Chain eth0_in (1 references)
 pkts bytes target     prot opt in     out     source               destination        
 
   38  4545 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0          
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0          
icmp type 8 
   38  4545 masq2fw    all  --  *      *       0.0.0.0/0            0.0.0.0/0          

Chain eth1_fwd (1 references)
 pkts bytes target     prot opt in     out     source               destination        
 
    0     0 dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0          
    0     0 net2all    all  --  *      eth0    0.0.0.0/0            0.0.0.0/0          

Chain eth1_in (1 references)
 pkts bytes target     prot opt in     out     source               destination        
 
  372  350K dynamic    all  --  *      *       0.0.0.0/0            0.0.0.0/0          
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0          
icmp type 8 
  372  350K net2all    all  --  *      *       0.0.0.0/0            0.0.0.0/0          

Chain fw2net (1 references)
 pkts bytes target     prot opt in     out     source               destination        
 
  274 16884 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0          
state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0          
state NEW tcp flags:!0x16/0x02 
   33  2385 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0          

Chain icmpdef (1 references)
 pkts bytes target     prot opt in     out     source               destination        
 

Chain masq2fw (1 references)
 pkts bytes target     prot opt in     out     source               destination        
 
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0          
state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0          
state NEW tcp flags:!0x16/0x02 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0          
state NEW tcp dpt:53 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0          
state NEW tcp dpt:67 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0          
state NEW tcp dpt:53 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0          
state NEW tcp dpt:67 
   38  4545 all2all    all  --  *      *       0.0.0.0/0            0.0.0.0/0          

Chain masq2net (1 references)
 pkts bytes target     prot opt in     out     source               destination        
 
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0          
state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0          
state NEW tcp flags:!0x16/0x02 
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0          

Chain net2all (2 references)
 pkts bytes target     prot opt in     out     source               destination        
 
  362  349K ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0          
state RELATED,ESTABLISHED 
    0     0 newnotsyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0          
state NEW tcp flags:!0x16/0x02 
   10   682 common     all  --  *      *       0.0.0.0/0            0.0.0.0/0          
    0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0          
LOG flags 0 level 6 prefix `Shorewall:net2all:DROP:' 
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0          

Chain newnotsyn (5 references)
 pkts bytes target     prot opt in     out     source               destination        
 
    0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0          

Chain reject (6 references)
 pkts bytes target     prot opt in     out     source               destination        
 
    0     0 REJECT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0          
reject-with tcp-reset 
   19  1267 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0          
reject-with icmp-port-unreachable 

Chain shorewall (0 references)
 pkts bytes target     prot opt in     out     source               destination        
 
Sep 10 19:26:02 damon rwhod[2757]: sendto(192.168.0.255): Operation not permitted
Sep 10 19:26:49 damon dhcpd: DHCPREQUEST for 192.168.0.209 from 00:80:ad:77:a2:9b via 
eth0
Sep 10 19:26:49 damon dhcpd: DHCPACK on 192.168.0.209 to 00:80:ad:77:a2:9b (jennifer) 
via eth0
Sep 10 19:26:57 damon dhcpd: DHCPREQUEST for 192.168.0.209 from 00:80:ad:77:a2:9b 
(jennifer) via eth0
Sep 10 19:26:57 damon dhcpd: DHCPACK on 192.168.0.209 to 00:80:ad:77:a2:9b (jennifer) 
via eth0
Sep 10 19:27:25 damon kernel: Shorewall:all2all:REJECT:IN=eth0 OUT= 
MAC=00:00:21:04:60:8c:00:80:ad:77:a2:9b:08:00 SRC=192.168.0.209 DST=192.168.0.1 LEN=67 
TOS=0x00 PREC=0x00 TTL=64 ID=10039 DF PROTO=UDP SPT=32770 DPT=53 LEN=47 
Sep 10 19:27:25 damon kernel: Shorewall:all2all:REJECT:IN=eth0 OUT= 
MAC=00:00:21:04:60:8c:00:80:ad:77:a2:9b:08:00 SRC=192.168.0.209 DST=192.168.0.1 LEN=67 
TOS=0x00 PREC=0x00 TTL=64 ID=10039 DF PROTO=UDP SPT=32770 DPT=53 LEN=47 
Sep 10 19:27:27 damon kernel: Shorewall:all2all:REJECT:IN=eth0 OUT= 
MAC=00:00:21:04:60:8c:00:80:ad:77:a2:9b:08:00 SRC=192.168.0.209 DST=192.168.0.1 LEN=67 
TOS=0x00 PREC=0x00 TTL=64 ID=10210 DF PROTO=UDP SPT=32770 DPT=53 LEN=47 
Sep 10 19:27:27 damon kernel: Shorewall:all2all:REJECT:IN=eth0 OUT= 
MAC=00:00:21:04:60:8c:00:80:ad:77:a2:9b:08:00 SRC=192.168.0.209 DST=192.168.0.1 LEN=67 
TOS=0x00 PREC=0x00 TTL=64 ID=10210 DF PROTO=UDP SPT=32770 DPT=53 LEN=47 
Sep 10 19:29:03 damon rwhod[2757]: sendto(192.168.0.255): Operation not permitted
Sep 10 19:29:52 damon kernel: Shorewall:all2all:REJECT:IN=eth0 OUT= 
MAC=00:00:21:04:60:8c:00:80:ad:77:a2:9b:08:00 SRC=192.168.0.209 DST=192.168.0.1 LEN=61 
TOS=0x00 PREC=0x00 TTL=64 ID=24766 DF PROTO=UDP SPT=32770 DPT=53 LEN=41 
Sep 10 19:29:52 damon kernel: Shorewall:all2all:REJECT:IN=eth0 OUT= 
MAC=00:00:21:04:60:8c:00:80:ad:77:a2:9b:08:00 SRC=192.168.0.209 DST=192.168.0.1 LEN=61 
TOS=0x00 PREC=0x00 TTL=64 ID=24766 DF PROTO=UDP SPT=32770 DPT=53 LEN=41 
Sep 10 19:29:52 damon kernel: Shorewall:all2all:REJECT:IN=eth0 OUT= 
MAC=00:00:21:04:60:8c:00:80:ad:77:a2:9b:08:00 SRC=192.168.0.209 DST=192.168.0.1 LEN=73 
TOS=0x00 PREC=0x00 TTL=64 ID=24766 DF PROTO=UDP SPT=32770 DPT=53 LEN=53 
Sep 10 19:29:52 damon kernel: Shorewall:all2all:REJECT:IN=eth0 OUT= 
MAC=00:00:21:04:60:8c:00:80:ad:77:a2:9b:08:00 SRC=192.168.0.209 DST=192.168.0.1 LEN=73 
TOS=0x00 PREC=0x00 TTL=64 ID=24766 DF PROTO=UDP SPT=32770 DPT=53 LEN=53 
Sep 10 19:29:52 damon kernel: Shorewall:all2all:REJECT:IN=eth0 OUT= 
MAC=00:00:21:04:60:8c:00:80:ad:77:a2:9b:08:00 SRC=192.168.0.209 DST=192.168.0.1 LEN=61 
TOS=0x00 PREC=0x00 TTL=64 ID=24766 DF PROTO=UDP SPT=32770 DPT=53 LEN=41 
Sep 10 19:29:52 damon kernel: Shorewall:all2all:REJECT:IN=eth0 OUT= 
MAC=00:00:21:04:60:8c:00:80:ad:77:a2:9b:08:00 SRC=192.168.0.209 DST=192.168.0.1 LEN=61 
TOS=0x00 PREC=0x00 TTL=64 ID=24766 DF PROTO=UDP SPT=32770 DPT=53 LEN=41 
Sep 10 19:29:52 damon kernel: Shorewall:all2all:REJECT:IN=eth0 OUT= 
MAC=00:00:21:04:60:8c:00:80:ad:77:a2:9b:08:00 SRC=192.168.0.209 DST=192.168.0.1 LEN=73 
TOS=0x00 PREC=0x00 TTL=64 ID=24766 DF PROTO=UDP SPT=32770 DPT=53 LEN=53 
Sep 10 19:29:57 damon kernel: Shorewall:all2all:REJECT:IN=eth0 OUT= 
MAC=00:00:21:04:60:8c:00:80:ad:77:a2:9b:08:00 SRC=192.168.0.209 DST=192.168.0.1 LEN=73 
TOS=0x00 PREC=0x00 TTL=64 ID=24767 DF PROTO=UDP SPT=32770 DPT=53 LEN=53 
/var/log/messages lines 2473-2506/2506 (END) 

Reply via email to