Hello Bastian.

Re: Bug#540074: netfilter leaking traffic when long chains defined

Sorry for the delay. For some reason I did not get a copy of your email, and I 
just found your messages on an internet archive.

tcp 0 0 10.0.0.8:9999 118.168.141.172:3388 ESTABLISHED

This is an established connection. No evidence where the packets come
from.

Right. Port 9999 is a listening port (in this case listening for http requests 
(provided by didiwiki), so presumably the host at 118.168.141.172 made a 
connection, even though it is not in the address whitelist, as far as I can 
tell.

For details of configuration scripts and test data, refer to bug #534963

This is not nearly complete. Please show the _complete_ config.

That is the complete configuration, as far as I can tell. What element of the 
configuration do you believe is missing?

> please use a sniffer and record the packets going through.

The service port 9999 is being used frequently by computers on the internal 
LAN. I have tcpdump that I could use here, but I only want to log only packets 
coming in externally (ie not coming from 10.0.0.*) for the purpose of this 
report. Do you know of a way of achieving that or is there another sniffer that 
you suggest that I use?

Thanks in advance.

Mark.







--
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]

Reply via email to