Hello,
I've had a bad time getting the Internet connection sharing going in
Mandrake 9.0. Basically it worked in beta 2, but since beta 4 it
doesn't work at all. Never. I thought it was due to the fact that i
had also tried to install terminal server but this time I have not
touched that, but it still doesn't work.
System details on "server": two RTL8139; eth0 (LAN) 192.168.0.1, eth1
(cable) static IP
When the "server is running 8.2, client PC connects to the Internet just
fine.
dhcpd and shorewall are running.
relevant /var/log/messages output and service shorewall status output is
attached.
Thanks,
Damon
Shorewall- Status at damon.ext.dev-zone.org - Tue Sep 10 19:32:35 NZST 2002
Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
23 1750 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
372 350K eth1_in all -- eth1 * 0.0.0.0/0 0.0.0.0/0
38 4545 eth0_in all -- eth0 * 0.0.0.0/0 0.0.0.0/0
0 0 common all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:INPUT:REJECT:'
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 eth1_fwd all -- eth1 * 0.0.0.0/0 0.0.0.0/0
0 0 eth0_fwd all -- eth0 * 0.0.0.0/0 0.0.0.0/0
0 0 common all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:FORWARD:REJECT:'
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
23 1750 ACCEPT all -- * lo 0.0.0.0/0 0.0.0.0/0
18 1698 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW,RELATED,ESTABLISHED
307 19269 fw2net all -- * eth1 0.0.0.0/0 0.0.0.0/0
4 414 all2all all -- * eth0 0.0.0.0/0 0.0.0.0/0
0 0 common all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:OUTPUT:REJECT:'
0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
Chain all2all (2 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp flags:!0x16/0x02
42 4959 common all -- * * 0.0.0.0/0 0.0.0.0/0
19 1267 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:all2all:REJECT:'
19 1267 reject all -- * * 0.0.0.0/0 0.0.0.0/0
Chain common (5 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 8
0 0 icmpdef icmp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0
state INVALID
4 312 REJECT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpts:137:139 reject-with icmp-port-unreachable
0 0 REJECT udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:445 reject-with icmp-port-unreachable
0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:135
0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0
udp dpt:1900
2 1152 DROP all -- * * 0.0.0.0/0 255.255.255.255
4 112 DROP all -- * * 0.0.0.0/0 224.0.0.0/4
0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0
tcp dpt:113
3 336 DROP all -- * * 0.0.0.0/0 202.0.35.255
20 2462 DROP all -- * * 0.0.0.0/0 192.168.0.255
Chain dynamic (4 references)
pkts bytes target prot opt in out source destination
Chain eth0_fwd (1 references)
pkts bytes target prot opt in out source destination
0 0 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 masq2net all -- * eth1 0.0.0.0/0 0.0.0.0/0
Chain eth0_in (1 references)
pkts bytes target prot opt in out source destination
38 4545 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 8
38 4545 masq2fw all -- * * 0.0.0.0/0 0.0.0.0/0
Chain eth1_fwd (1 references)
pkts bytes target prot opt in out source destination
0 0 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 net2all all -- * eth0 0.0.0.0/0 0.0.0.0/0
Chain eth1_in (1 references)
pkts bytes target prot opt in out source destination
372 350K dynamic all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
icmp type 8
372 350K net2all all -- * * 0.0.0.0/0 0.0.0.0/0
Chain fw2net (1 references)
pkts bytes target prot opt in out source destination
274 16884 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp flags:!0x16/0x02
33 2385 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain icmpdef (1 references)
pkts bytes target prot opt in out source destination
Chain masq2fw (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp flags:!0x16/0x02
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp dpt:53
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp dpt:67
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp dpt:53
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp dpt:67
38 4545 all2all all -- * * 0.0.0.0/0 0.0.0.0/0
Chain masq2net (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp flags:!0x16/0x02
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
Chain net2all (2 references)
pkts bytes target prot opt in out source destination
362 349K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
state RELATED,ESTABLISHED
0 0 newnotsyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
state NEW tcp flags:!0x16/0x02
10 682 common all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0
LOG flags 0 level 6 prefix `Shorewall:net2all:DROP:'
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain newnotsyn (5 references)
pkts bytes target prot opt in out source destination
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain reject (6 references)
pkts bytes target prot opt in out source destination
0 0 REJECT tcp -- * * 0.0.0.0/0 0.0.0.0/0
reject-with tcp-reset
19 1267 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0
reject-with icmp-port-unreachable
Chain shorewall (0 references)
pkts bytes target prot opt in out source destination
Sep 10 19:26:02 damon rwhod[2757]: sendto(192.168.0.255): Operation not permitted
Sep 10 19:26:49 damon dhcpd: DHCPREQUEST for 192.168.0.209 from 00:80:ad:77:a2:9b via
eth0
Sep 10 19:26:49 damon dhcpd: DHCPACK on 192.168.0.209 to 00:80:ad:77:a2:9b (jennifer)
via eth0
Sep 10 19:26:57 damon dhcpd: DHCPREQUEST for 192.168.0.209 from 00:80:ad:77:a2:9b
(jennifer) via eth0
Sep 10 19:26:57 damon dhcpd: DHCPACK on 192.168.0.209 to 00:80:ad:77:a2:9b (jennifer)
via eth0
Sep 10 19:27:25 damon kernel: Shorewall:all2all:REJECT:IN=eth0 OUT=
MAC=00:00:21:04:60:8c:00:80:ad:77:a2:9b:08:00 SRC=192.168.0.209 DST=192.168.0.1 LEN=67
TOS=0x00 PREC=0x00 TTL=64 ID=10039 DF PROTO=UDP SPT=32770 DPT=53 LEN=47
Sep 10 19:27:25 damon kernel: Shorewall:all2all:REJECT:IN=eth0 OUT=
MAC=00:00:21:04:60:8c:00:80:ad:77:a2:9b:08:00 SRC=192.168.0.209 DST=192.168.0.1 LEN=67
TOS=0x00 PREC=0x00 TTL=64 ID=10039 DF PROTO=UDP SPT=32770 DPT=53 LEN=47
Sep 10 19:27:27 damon kernel: Shorewall:all2all:REJECT:IN=eth0 OUT=
MAC=00:00:21:04:60:8c:00:80:ad:77:a2:9b:08:00 SRC=192.168.0.209 DST=192.168.0.1 LEN=67
TOS=0x00 PREC=0x00 TTL=64 ID=10210 DF PROTO=UDP SPT=32770 DPT=53 LEN=47
Sep 10 19:27:27 damon kernel: Shorewall:all2all:REJECT:IN=eth0 OUT=
MAC=00:00:21:04:60:8c:00:80:ad:77:a2:9b:08:00 SRC=192.168.0.209 DST=192.168.0.1 LEN=67
TOS=0x00 PREC=0x00 TTL=64 ID=10210 DF PROTO=UDP SPT=32770 DPT=53 LEN=47
Sep 10 19:29:03 damon rwhod[2757]: sendto(192.168.0.255): Operation not permitted
Sep 10 19:29:52 damon kernel: Shorewall:all2all:REJECT:IN=eth0 OUT=
MAC=00:00:21:04:60:8c:00:80:ad:77:a2:9b:08:00 SRC=192.168.0.209 DST=192.168.0.1 LEN=61
TOS=0x00 PREC=0x00 TTL=64 ID=24766 DF PROTO=UDP SPT=32770 DPT=53 LEN=41
Sep 10 19:29:52 damon kernel: Shorewall:all2all:REJECT:IN=eth0 OUT=
MAC=00:00:21:04:60:8c:00:80:ad:77:a2:9b:08:00 SRC=192.168.0.209 DST=192.168.0.1 LEN=61
TOS=0x00 PREC=0x00 TTL=64 ID=24766 DF PROTO=UDP SPT=32770 DPT=53 LEN=41
Sep 10 19:29:52 damon kernel: Shorewall:all2all:REJECT:IN=eth0 OUT=
MAC=00:00:21:04:60:8c:00:80:ad:77:a2:9b:08:00 SRC=192.168.0.209 DST=192.168.0.1 LEN=73
TOS=0x00 PREC=0x00 TTL=64 ID=24766 DF PROTO=UDP SPT=32770 DPT=53 LEN=53
Sep 10 19:29:52 damon kernel: Shorewall:all2all:REJECT:IN=eth0 OUT=
MAC=00:00:21:04:60:8c:00:80:ad:77:a2:9b:08:00 SRC=192.168.0.209 DST=192.168.0.1 LEN=73
TOS=0x00 PREC=0x00 TTL=64 ID=24766 DF PROTO=UDP SPT=32770 DPT=53 LEN=53
Sep 10 19:29:52 damon kernel: Shorewall:all2all:REJECT:IN=eth0 OUT=
MAC=00:00:21:04:60:8c:00:80:ad:77:a2:9b:08:00 SRC=192.168.0.209 DST=192.168.0.1 LEN=61
TOS=0x00 PREC=0x00 TTL=64 ID=24766 DF PROTO=UDP SPT=32770 DPT=53 LEN=41
Sep 10 19:29:52 damon kernel: Shorewall:all2all:REJECT:IN=eth0 OUT=
MAC=00:00:21:04:60:8c:00:80:ad:77:a2:9b:08:00 SRC=192.168.0.209 DST=192.168.0.1 LEN=61
TOS=0x00 PREC=0x00 TTL=64 ID=24766 DF PROTO=UDP SPT=32770 DPT=53 LEN=41
Sep 10 19:29:52 damon kernel: Shorewall:all2all:REJECT:IN=eth0 OUT=
MAC=00:00:21:04:60:8c:00:80:ad:77:a2:9b:08:00 SRC=192.168.0.209 DST=192.168.0.1 LEN=73
TOS=0x00 PREC=0x00 TTL=64 ID=24766 DF PROTO=UDP SPT=32770 DPT=53 LEN=53
Sep 10 19:29:57 damon kernel: Shorewall:all2all:REJECT:IN=eth0 OUT=
MAC=00:00:21:04:60:8c:00:80:ad:77:a2:9b:08:00 SRC=192.168.0.209 DST=192.168.0.1 LEN=73
TOS=0x00 PREC=0x00 TTL=64 ID=24767 DF PROTO=UDP SPT=32770 DPT=53 LEN=53
/var/log/messages lines 2473-2506/2506 (END)