1. Does the new uClibc LEAF router have the same eth1 address as the old Dachstein-Hadley LEAF router? If not, have you updated the routing table of your WinXP workstation to reflect the change?

2. When you say ...

        I am
        able to ping lo, ppp0 and eth1.  I am  able to monitor
        the status via Firefox browser and LRP weblet.

... does "I" consistently refer to the WinXP host? Can it ping the other end of the ppp connection (204.60.4.42 in the interface list you sent us)? Can the LEAF router itself ping this address?

3. Might this be a DNS issue? (You don't say how your WinXP host does DNS, or how either LEAF router supported DNS queries.) Can the WinXP host ping known-good Internet sites by their IP addresses (try mine if you need one: 63.198.182.124)? If it is a DNS issue, and you need help with it, you are going to have to give us details ... for example, a quick skim of the Shorewall report laves me thinking that Shorewall is NOT set right to allow the uClibc-LEAF router to serve as a DNS forwarder (but I'm not certain of this it was only a quick skim, as I said), but that matters only if the WinXP host uses the router as its DNS forwarder.

4. What *exactly* does "access" mean in "I have not been able to access the the Internet"? The only example you mention is trying to get a Web page, and the browser message you quote sounds like it could be reporting a DNS failure.

I looked through the part of the Shorewall report that covers MASQing LAN traffic to ppp0, and the rules listed look OK. But given my earlier questions, I didn't review the rules as exhaustively as I might if I knew we coule rule out simpler problems.

At 02:43 PM 9/18/2004 -0700, MATTHEW CARTTER wrote:
Problem: Bering-uClibc_2.2 connection problem

I have been using the Dachstein contributed pppoe
version by  Kenneth Hadley on a home network for the
past two years  without any problems. The LRP is
connected to three PCs  running Windows XP
professional via a switch. The LRP runs on  a 486 with
two ISA cards: eth0 uses 8390.o and ne.o; eth1 uses
3c509.o.


For several months now, I have been trying to upgrade to Bering-uClibc using ppp and pppoe, first with 2.1.3 back in July and now and now with 2.2. My ISP is SBC Yahoo DSL. I have the Speedstream 5100b set as a bridge (I am not using pppoe on the modem).

I have not been able to access the the Internet.  I am
able to ping lo, ppp0 and eth1.  I am  able to monitor
the status via Firefox browser and LRP weblet.  I have
no "Masqueraded Connections".  After 10 to 20 minutes,
I get a Windows XP error (Limited or no connectivity)
and can no longer access the weblet interface.  The
connection setting for the Firefox browser 0.9.3 is
"Direct connection to the Internet".  When I try to
connect to a web page , I get "web page could not be
found.  Please check the name and try again".  I get
similar results with IE5.

When I restart using the Dashstein disk, the system
works  fine.

In configuring Shorewall, I was not able to set
routefilter and routestopped in the interfaces file as
described in Chapter 6 - PPPoE configuration (I got
errors at boot up when I did this).  After checking
several posts on the archive and on the Sorewall
sites, I set routefilter to "Yes" in the config file
and routestopped for interface eth1 in the
routestopped file.  I am not sure if this was the
correct way to deal with these configuration problems.


I keep thinking that I have made a simple mistake along the way, but I have not been able to find it. A not so simple mistake is also possible. Any help from the members of the Leaf users group would be greatly appreciated.

Below are the text outputs recommended by the "Before
You Post" page. Also below are the output messages
from the weblet interface.

Thanks.

Matt



Linux firewall 2.4.26 #1 Mon Jun 28 20:08:59 CEST 2004
i486 unknown

address.txt
1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue
    link/loopback 00:00:00:00:00:00 brd
00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
2: dummy0: <BROADCAST,NOARP> mtu 1500 qdisc noop
    link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff
3: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc
pfifo_fast qlen 1000
    link/ether 00:00:1b:4b:a6:f0 brd ff:ff:ff:ff:ff:ff
4: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc
pfifo_fast qlen 1000
    link/ether 00:a0:24:8d:b3:de brd ff:ff:ff:ff:ff:ff
    inet 192.168.1.254/24 brd 192.168.1.255 scope
global eth1
5: ppp0: <POINTOPOINT,MULTICAST,NOARP,UP> mtu 1492
qdisc pfifo_fast qlen 3
    link/ppp
    inet 66.159.175.184 peer 204.60.4.42/32 scope
global ppp0

route.txt
204.60.4.42 dev ppp0  proto kernel  scope link  src
66.159.175.184
192.168.1.0/24 dev eth1  proto kernel  scope link  src
192.168.1.254
default via 204.60.4.42 dev ppp0

lsmod.txt
Module                  Size  Used by    Not tainted
softdog                 1508   1
ipt_state                336  15
ipt_helper               464   0 (unused)
ipt_conntrack            820   0
ipt_REDIRECT             544   0 (unused)
ipt_MASQUERADE          1056   1
ip_nat_irc              2152   0 (unused)
ip_nat_ftp              2792   0 (unused)
iptable_nat            15716   3 [ipt_REDIRECT
ipt_MASQUERADE ip_nat_irc
ip_nat_ftp]
ip_conntrack_irc        2876   1
ip_conntrack_ftp        3484   1
ip_conntrack           18312   2 [ipt_state ipt_helper
ipt_conntrack
ipt_REDIRECT ipt_MASQUERADE ip_nat_irc ip_nat_ftp
iptable_nat
ip_conntrack_irc ip_conntrack_ftp]
pppoe                   6732   1
pppox                    924   1 [pppoe]
ppp_synctty             4632   0 (unused)
ppp_generic            16204   3 [pppoe pppox
ppp_synctty]
n_hdlc                  5792   0 (unused)
slhc                    4296   0 [ppp_generic]
3c509                   8240   1
ne                      6148   1
8390                    5784   0 [ne]
crc32                   2648   0 [8390]

shorwall.txt
[H[JShorewall-2.0.7 Status at firewall - Wed Sep 18
12:24:57 UTC 1996

Counters reset Wed Sep 18 12:07:32 UTC 1996

Chain INPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source

destination
    0     0 ACCEPT     all  --  lo     *
0.0.0.0/0            0.0.0.0/0
    0     0 DROP      !icmp --  *      *
0.0.0.0/0
0.0.0.0/0           state INVALID
    8   320 ppp0_in    all  --  ppp0   *
0.0.0.0/0            0.0.0.0/0
   45 11950 eth1_in    all  --  eth1   *
0.0.0.0/0            0.0.0.0/0
    0     0 Reject     all  --  *      *
0.0.0.0/0            0.0.0.0/0
    0     0 ULOG       all  --  *      *
0.0.0.0/0
0.0.0.0/0           ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:INPUT:REJECT:' queue_threshold 1
    0     0 reject     all  --  *      *
0.0.0.0/0            0.0.0.0/0

Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source

destination
    0     0 DROP      !icmp --  *      *
0.0.0.0/0
0.0.0.0/0           state INVALID
    0     0 TCPMSS     tcp  --  *      *
0.0.0.0/0
0.0.0.0/0           tcp flags:0x06/0x02 TCPMSS clamp
to PMTU
    0     0 ppp0_fwd   all  --  ppp0   *
0.0.0.0/0            0.0.0.0/0
    0     0 eth1_fwd   all  --  eth1   *
0.0.0.0/0            0.0.0.0/0
    0     0 Reject     all  --  *      *
0.0.0.0/0            0.0.0.0/0
    0     0 ULOG       all  --  *      *
0.0.0.0/0
0.0.0.0/0           ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:FORWARD:REJECT:' queue_threshold 1
    0     0 reject     all  --  *      *
0.0.0.0/0            0.0.0.0/0

Chain OUTPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source

destination
    0     0 ACCEPT     all  --  *      lo
0.0.0.0/0            0.0.0.0/0
    0     0 DROP      !icmp --  *      *
0.0.0.0/0
0.0.0.0/0           state INVALID
    0     0 fw2net     all  --  *      ppp0
0.0.0.0/0            0.0.0.0/0
   10   730 fw2loc     all  --  *      eth1
0.0.0.0/0            0.0.0.0/0
    0     0 Reject     all  --  *      *
0.0.0.0/0            0.0.0.0/0
    0     0 ULOG       all  --  *      *
0.0.0.0/0
0.0.0.0/0           ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:OUTPUT:REJECT:' queue_threshold 1
    0     0 reject     all  --  *      *
0.0.0.0/0            0.0.0.0/0

Chain Drop (1 references)
 pkts bytes target     prot opt in     out     source

destination
    8   320 RejectAuth  all  --  *      *
0.0.0.0/0
0.0.0.0/0
    8   320 dropBcast  all  --  *      *
0.0.0.0/0            0.0.0.0/0
    8   320 dropInvalid  all  --  *      *
0.0.0.0/0
0.0.0.0/0
    8   320 DropSMB    all  --  *      *
0.0.0.0/0            0.0.0.0/0
    8   320 DropUPnP   all  --  *      *
0.0.0.0/0            0.0.0.0/0
    8   320 dropNotSyn  all  --  *      *
0.0.0.0/0
0.0.0.0/0
    0     0 DropDNSrep  all  --  *      *
0.0.0.0/0
0.0.0.0/0

Chain DropDNSrep (2 references)
 pkts bytes target     prot opt in     out     source

destination
    0     0 DROP       udp  --  *      *
0.0.0.0/0
0.0.0.0/0           udp spt:53

Chain DropSMB (1 references)
 pkts bytes target     prot opt in     out     source

destination
    0     0 DROP       udp  --  *      *
0.0.0.0/0
0.0.0.0/0           udp dpt:135
    0     0 DROP       udp  --  *      *
0.0.0.0/0
0.0.0.0/0           udp dpts:137:139
    0     0 DROP       udp  --  *      *
0.0.0.0/0
0.0.0.0/0           udp dpt:445
    0     0 DROP       tcp  --  *      *
0.0.0.0/0
0.0.0.0/0           tcp dpt:135
    0     0 DROP       tcp  --  *      *
0.0.0.0/0
0.0.0.0/0           tcp dpt:139
    0     0 DROP       tcp  --  *      *
0.0.0.0/0
0.0.0.0/0           tcp dpt:445

Chain DropUPnP (2 references)
 pkts bytes target     prot opt in     out     source

destination
    0     0 DROP       udp  --  *      *
0.0.0.0/0
0.0.0.0/0           udp dpt:1900

Chain Reject (4 references)
 pkts bytes target     prot opt in     out     source

destination
    3   724 RejectAuth  all  --  *      *
0.0.0.0/0
0.0.0.0/0
    3   724 dropBcast  all  --  *      *
0.0.0.0/0            0.0.0.0/0
    0     0 dropInvalid  all  --  *      *
0.0.0.0/0
0.0.0.0/0
    0     0 RejectSMB  all  --  *      *
0.0.0.0/0            0.0.0.0/0
    0     0 DropUPnP   all  --  *      *
0.0.0.0/0            0.0.0.0/0
    0     0 dropNotSyn  all  --  *      *
0.0.0.0/0
0.0.0.0/0
    0     0 DropDNSrep  all  --  *      *
0.0.0.0/0
0.0.0.0/0

Chain RejectAuth (2 references)
 pkts bytes target     prot opt in     out     source

destination
    0     0 reject     tcp  --  *      *
0.0.0.0/0
0.0.0.0/0           tcp dpt:113

Chain RejectSMB (1 references)
 pkts bytes target     prot opt in     out     source

destination
    0     0 reject     udp  --  *      *
0.0.0.0/0
0.0.0.0/0           udp dpt:135
    0     0 reject     udp  --  *      *
0.0.0.0/0
0.0.0.0/0           udp dpts:137:139
    0     0 reject     udp  --  *      *
0.0.0.0/0
0.0.0.0/0           udp dpt:445
    0     0 reject     tcp  --  *      *
0.0.0.0/0
0.0.0.0/0           tcp dpt:135
    0     0 reject     tcp  --  *      *
0.0.0.0/0
0.0.0.0/0           tcp dpt:139
    0     0 reject     tcp  --  *      *
0.0.0.0/0
0.0.0.0/0           tcp dpt:445

Chain all2all (3 references)
 pkts bytes target     prot opt in     out     source

destination
    0     0 ACCEPT     all  --  *      *
0.0.0.0/0
0.0.0.0/0           state RELATED,ESTABLISHED
    3   724 Reject     all  --  *      *
0.0.0.0/0            0.0.0.0/0
    0     0 ULOG       all  --  *      *
0.0.0.0/0
0.0.0.0/0           ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:all2all:REJECT:' queue_threshold 1
    0     0 reject     all  --  *      *
0.0.0.0/0            0.0.0.0/0

Chain dropBcast (2 references)
 pkts bytes target     prot opt in     out     source

destination
    3   724 DROP       all  --  *      *
0.0.0.0/0
0.0.0.0/0           PKTTYPE = broadcast
    0     0 DROP       all  --  *      *
0.0.0.0/0
0.0.0.0/0           PKTTYPE = multicast

Chain dropInvalid (2 references)
 pkts bytes target     prot opt in     out     source

destination
    0     0 DROP       all  --  *      *
0.0.0.0/0
0.0.0.0/0           state INVALID

Chain dropNotSyn (2 references)
 pkts bytes target     prot opt in     out     source

destination
    8   320 DROP       tcp  --  *      *
0.0.0.0/0
0.0.0.0/0           tcp flags:!0x16/0x02

Chain dynamic (4 references)
 pkts bytes target     prot opt in     out     source

destination

Chain eth1_fwd (1 references)
 pkts bytes target     prot opt in     out     source

destination
    0     0 dynamic    all  --  *      *
0.0.0.0/0
0.0.0.0/0           state INVALID,NEW
    0     0 loc2net    all  --  *      ppp0
0.0.0.0/0            0.0.0.0/0

Chain eth1_in (1 references)
 pkts bytes target     prot opt in     out     source

destination
   40 11545 dynamic    all  --  *      *
0.0.0.0/0
0.0.0.0/0           state INVALID,NEW
   45 11950 loc2fw     all  --  *      *
0.0.0.0/0            0.0.0.0/0

Chain fw2loc (1 references)
 pkts bytes target     prot opt in     out     source

destination
   10   730 ACCEPT     all  --  *      *
0.0.0.0/0
0.0.0.0/0           state RELATED,ESTABLISHED
    0     0 ACCEPT     icmp --  *      *
0.0.0.0/0
0.0.0.0/0           icmp type 8
    0     0 all2all    all  --  *      *
0.0.0.0/0            0.0.0.0/0

Chain fw2net (1 references)
 pkts bytes target     prot opt in     out     source

destination
    0     0 ACCEPT     all  --  *      *
0.0.0.0/0
0.0.0.0/0           state RELATED,ESTABLISHED
    0     0 ACCEPT     tcp  --  *      *
0.0.0.0/0
0.0.0.0/0           tcp dpt:53
    0     0 ACCEPT     udp  --  *      *
0.0.0.0/0
0.0.0.0/0           udp dpt:53
    0     0 ACCEPT     icmp --  *      *
0.0.0.0/0
0.0.0.0/0           icmp type 8
    0     0 all2all    all  --  *      *
0.0.0.0/0            0.0.0.0/0

Chain icmpdef (0 references)
 pkts bytes target     prot opt in     out     source

destination

Chain loc2fw (1 references)
 pkts bytes target     prot opt in     out     source

destination
    5   405 ACCEPT     all  --  *      *
0.0.0.0/0
0.0.0.0/0           state RELATED,ESTABLISHED
    0     0 ACCEPT     tcp  --  *      *
0.0.0.0/0
0.0.0.0/0           tcp dpt:22
    0     0 ACCEPT     icmp --  *      *
0.0.0.0/0
0.0.0.0/0           icmp type 8
    5   325 ACCEPT     udp  --  *      *
0.0.0.0/0
0.0.0.0/0           udp dpt:53
    0     0 ACCEPT     tcp  --  *      *
0.0.0.0/0
0.0.0.0/0           tcp dpt:80
   32 10496 ACCEPT     udp  --  *      *
0.0.0.0/0
0.0.0.0/0           multiport dports 67,68
    3   724 all2all    all  --  *      *
0.0.0.0/0            0.0.0.0/0

Chain loc2net (1 references)
 pkts bytes target     prot opt in     out     source

destination
    0     0 ACCEPT     all  --  *      *
0.0.0.0/0
0.0.0.0/0           state RELATED,ESTABLISHED
    0     0 ACCEPT     all  --  *      *
0.0.0.0/0            0.0.0.0/0

Chain net2all (2 references)
 pkts bytes target     prot opt in     out     source

destination
    0     0 ACCEPT     all  --  *      *
0.0.0.0/0
0.0.0.0/0           state RELATED,ESTABLISHED
    8   320 Drop       all  --  *      *
0.0.0.0/0            0.0.0.0/0
    0     0 ULOG       all  --  *      *
0.0.0.0/0
0.0.0.0/0           ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:net2all:DROP:' queue_threshold 1
    0     0 DROP       all  --  *      *
0.0.0.0/0            0.0.0.0/0

Chain net2fw (1 references)
 pkts bytes target     prot opt in     out     source

destination
    0     0 ACCEPT     all  --  *      *
0.0.0.0/0
0.0.0.0/0           state RELATED,ESTABLISHED
    0     0 ACCEPT     icmp --  *      *
0.0.0.0/0
0.0.0.0/0           icmp type 8
    8   320 net2all    all  --  *      *
0.0.0.0/0            0.0.0.0/0

Chain ppp0_fwd (1 references)
 pkts bytes target     prot opt in     out     source

destination
    0     0 dynamic    all  --  *      *
0.0.0.0/0
0.0.0.0/0           state INVALID,NEW
    0     0 net2all    all  --  *      eth1
0.0.0.0/0            0.0.0.0/0

Chain ppp0_in (1 references)
 pkts bytes target     prot opt in     out     source

destination
    8   320 dynamic    all  --  *      *
0.0.0.0/0
0.0.0.0/0           state INVALID,NEW
    8   320 net2fw     all  --  *      *
0.0.0.0/0            0.0.0.0/0

Chain reject (11 references)
 pkts bytes target     prot opt in     out     source

destination
    0     0 DROP       all  --  *      *
0.0.0.0/0
0.0.0.0/0           PKTTYPE = broadcast
    0     0 DROP       all  --  *      *
0.0.0.0/0
0.0.0.0/0           PKTTYPE = multicast
    0     0 DROP       all  --  *      *
192.168.1.255        0.0.0.0/0
    0     0 DROP       all  --  *      *
255.255.255.255      0.0.0.0/0
    0     0 DROP       all  --  *      *
224.0.0.0/4          0.0.0.0/0
    0     0 REJECT     tcp  --  *      *
0.0.0.0/0
0.0.0.0/0           reject-with tcp-reset
    0     0 REJECT     udp  --  *      *
0.0.0.0/0
0.0.0.0/0           reject-with icmp-port-unreachable
    0     0 REJECT     icmp --  *      *
0.0.0.0/0
0.0.0.0/0           reject-with icmp-host-unreachable
    0     0 REJECT     all  --  *      *
0.0.0.0/0
0.0.0.0/0           reject-with icmp-host-prohibited

Chain shorewall (0 references)
 pkts bytes target     prot opt in     out     source

destination

Chain smurfs (0 references)
 pkts bytes target     prot opt in     out     source

destination
    0     0 ULOG       all  --  *      *
192.168.1.255
0.0.0.0/0           ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:smurfs:DROP:' queue_threshold 1
    0     0 DROP       all  --  *      *
192.168.1.255        0.0.0.0/0
    0     0 ULOG       all  --  *      *
255.255.255.255
0.0.0.0/0           ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:smurfs:DROP:' queue_threshold 1
    0     0 DROP       all  --  *      *
255.255.255.255      0.0.0.0/0
    0     0 ULOG       all  --  *      *
224.0.0.0/4
0.0.0.0/0           ULOG copy_range 0 nlgroup 1 prefix
`Shorewall:smurfs:DROP:' queue_threshold 1
    0     0 DROP       all  --  *      *
224.0.0.0/4          0.0.0.0/0


NAT Table

Chain PREROUTING (policy ACCEPT 82 packets, 11818
bytes)
 pkts bytes target     prot opt in     out     source

destination

Chain POSTROUTING (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source

destination
    0     0 ppp0_masq  all  --  *      ppp0
0.0.0.0/0            0.0.0.0/0

Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source

destination

Chain ppp0_masq (1 references)
 pkts bytes target     prot opt in     out     source

destination
    0     0 MASQUERADE  all  --  *      *
192.168.1.0/24
0.0.0.0/0

Mangle Table

Chain PREROUTING (policy ACCEPT 112 packets, 20176
bytes)
 pkts bytes target     prot opt in     out     source

destination
  110 20030 pretos     all  --  *      *
0.0.0.0/0            0.0.0.0/0

Chain INPUT (policy ACCEPT 55 packets, 12416 bytes)
 pkts bytes target     prot opt in     out     source

destination

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source

destination

Chain OUTPUT (policy ACCEPT 12 packets, 876 bytes)
 pkts bytes target     prot opt in     out     source

destination
   10   730 outtos     all  --  *      *
0.0.0.0/0            0.0.0.0/0

Chain POSTROUTING (policy ACCEPT 12 packets, 876
bytes)
 pkts bytes target     prot opt in     out     source

destination

Chain outtos (1 references)
 pkts bytes target     prot opt in     out     source

destination
    0     0 TOS        tcp  --  *      *
0.0.0.0/0
0.0.0.0/0           tcp dpt:22 TOS set 0x10
    0     0 TOS        tcp  --  *      *
0.0.0.0/0
0.0.0.0/0           tcp spt:22 TOS set 0x10
    0     0 TOS        tcp  --  *      *
0.0.0.0/0
0.0.0.0/0           tcp dpt:21 TOS set 0x10
    0     0 TOS        tcp  --  *      *
0.0.0.0/0
0.0.0.0/0           tcp spt:21 TOS set 0x10
    0     0 TOS        tcp  --  *      *
0.0.0.0/0
0.0.0.0/0           tcp spt:20 TOS set 0x08
    0     0 TOS        tcp  --  *      *
0.0.0.0/0
0.0.0.0/0           tcp dpt:20 TOS set 0x08

Chain pretos (1 references)
 pkts bytes target     prot opt in     out     source

destination
    0     0 TOS        tcp  --  *      *
0.0.0.0/0
0.0.0.0/0           tcp dpt:22 TOS set 0x10
    0     0 TOS        tcp  --  *      *
0.0.0.0/0
0.0.0.0/0           tcp spt:22 TOS set 0x10
    0     0 TOS        tcp  --  *      *
0.0.0.0/0
0.0.0.0/0           tcp dpt:21 TOS set 0x10
    0     0 TOS        tcp  --  *      *
0.0.0.0/0
0.0.0.0/0           tcp spt:21 TOS set 0x10
    0     0 TOS        tcp  --  *      *
0.0.0.0/0
0.0.0.0/0           tcp spt:20 TOS set 0x08
    0     0 TOS        tcp  --  *      *
0.0.0.0/0
0.0.0.0/0           tcp dpt:20 TOS set 0x08

udp      17 17 src=192.168.1.2 dst=192.168.1.254
sport=1035 dport=53
src=192.168.1.254 dst=192.168.1.2 sport=53 dport=1035
[ASSURED] use=1

IP Configuration

1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue
    link/loopback 00:00:00:00:00:00 brd
00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
2: dummy0: <BROADCAST,NOARP> mtu 1500 qdisc noop
    link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff
3: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc
pfifo_fast qlen 1000
    link/ether 00:00:1b:4b:a6:f0 brd ff:ff:ff:ff:ff:ff
4: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc
pfifo_fast qlen 1000
    link/ether 00:a0:24:8d:b3:de brd ff:ff:ff:ff:ff:ff
    inet 192.168.1.254/24 brd 192.168.1.255 scope
global eth1
5: ppp0: <POINTOPOINT,MULTICAST,NOARP,UP> mtu 1492
qdisc pfifo_fast qlen 3
    link/ppp
    inet 66.159.175.184 peer 204.60.4.42/32 scope
global ppp0

Routing Rules

0:      from all lookup local
32766:  from all lookup main
32767:  from all lookup default

Table local:

broadcast 192.168.1.0 dev eth1  proto kernel  scope
link  src 192.168.1.254
broadcast 127.255.255.255 dev lo  proto kernel  scope
link  src 127.0.0.1
local 66.159.175.184 dev ppp0  proto kernel  scope
host  src 66.159.175.184
local 192.168.1.254 dev eth1  proto kernel  scope host
 src 192.168.1.254
broadcast 192.168.1.255 dev eth1  proto kernel  scope
link  src 192.168.1.254
broadcast 127.0.0.0 dev lo  proto kernel  scope link
src 127.0.0.1
local 127.0.0.1 dev lo  proto kernel  scope host  src
127.0.0.1
local 127.0.0.0/8 dev lo  proto kernel  scope host
src 127.0.0.1

Table main:

204.60.4.42 dev ppp0  proto kernel  scope link  src
66.159.175.184
192.168.1.0/24 dev eth1  proto kernel  scope link  src
192.168.1.254
default via 204.60.4.42 dev ppp0

Table default:



iptables.txt
Chain PREROUTING (policy ACCEPT 86 packets, 12291
bytes)
 pkts bytes target     prot opt in     out     source

destination

Chain POSTROUTING (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source

destination
    0     0 ppp0_masq  all  --  *      ppp0
0.0.0.0/0            0.0.0.0/0

Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source

destination

Chain ppp0_masq (1 references)
 pkts bytes target     prot opt in     out     source

destination
    0     0 MASQUERADE  all  --  *      *
192.168.1.0/24
0.0.0.0/0



The following messages are cut and pasted from the
weblet interface:

::Masqueraded Connections::


::Other Connections::

tcp     src=192.168.1.1 1062    dst=192.168.1.254       80      --431998
sec.    ESTABLISHED
tcp     src=192.168.1.1 1060    dst=192.168.1.254       80      --0 sec.
TIME_WAIT
tcp     src=192.168.1.1 1059    dst=192.168.1.254       80      --0 sec.
TIME_WAIT
udp     src=192.168.1.2 1035    dst=192.168.1.254       53      --154
sec.
tcp     src=192.168.1.1 1061    dst=192.168.1.254       80      --115
sec.    TIME_WAIT
udp     src=192.168.1.1 1027    dst=192.168.1.254       53      --131
sec.



::Interfaces::

1: lo:  mtu 16436 qdisc noqueue
    link/loopback 00:00:00:00:00:00 brd
00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
2: dummy0:  mtu 1500 qdisc noop
    link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff
3: eth0:  mtu 1500 qdisc pfifo_fast qlen 1000
    link/ether 00:00:1b:4b:a6:f0 brd ff:ff:ff:ff:ff:ff
4: eth1:  mtu 1500 qdisc pfifo_fast qlen 1000
    link/ether 00:a0:24:8d:b3:de brd ff:ff:ff:ff:ff:ff
    inet 192.168.1.254/24 brd 192.168.1.255 scope
global eth1
5: ppp0:  mtu 1492 qdisc pfifo_fast qlen 3
    link/ppp
    inet 69.0.45.229 peer 204.60.4.42/32 scope global
ppp0



::Routes::

204.60.4.42 dev ppp0  proto kernel  scope link  src
69.0.45.229
192.168.1.0/24 dev eth1  proto kernel  scope link  src
192.168.1.254
default via 204.60.4.42 dev ppp0



::Statistics::

1: lo:  mtu 16436 qdisc noqueue
    link/loopback 00:00:00:00:00:00 brd
00:00:00:00:00:00
    RX: bytes  packets  errors  dropped overrun mcast
    13272      158      0       0       0       0
    TX: bytes  packets  errors  dropped carrier
collsns
    13272      158      0       0       0       0
2: dummy0:  mtu 1500 qdisc noop
    link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast
    0          0        0       0       0       0
    TX: bytes  packets  errors  dropped carrier
collsns
    0          0        0       0       0       0
3: eth0:  mtu 1500 qdisc pfifo_fast qlen 1000
    link/ether 00:00:1b:4b:a6:f0 brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast
    14443      194      0       0       0       0
    TX: bytes  packets  errors  dropped carrier
collsns
    9668       159      0       0       0       0
4: eth1:  mtu 1500 qdisc pfifo_fast qlen 1000
    link/ether 00:a0:24:8d:b3:de brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast
    51614      362      0       0       0       0
    TX: bytes  packets  errors  dropped carrier
collsns
    40675      201      0       0       0       0
5: ppp0:  mtu 1492 qdisc pfifo_fast qlen 3
    link/ppp
    RX: bytes  packets  errors  dropped overrun mcast
    4391       42       0       0       0       0
    TX: bytes  packets  errors  dropped carrier
collsns
    410        9        0       0       0       0

::General System Info::

Uptime:  11:41:13 up 51 min, load average: 0.00, 0.02,
0.00


Kernel:Linux firewall 2.4.26 #1 Mon Jun 28 20:08:59 CEST 2004 i486 unknown


Modules: softdog 1508 1 ipt_state 336 15 ipt_helper 464 0 (unused) ipt_conntrack 820 0 ipt_REDIRECT 544 0 (unused) ipt_MASQUERADE 1056 1 ip_nat_irc 2152 0 (unused) ip_nat_ftp 2792 0 (unused) iptable_nat 15716 3 [ipt_REDIRECT ipt_MASQUERADE ip_nat_irc ip_nat_ftp] ip_conntrack_irc 2876 1 ip_conntrack_ftp 3484 1 ip_conntrack 18312 2 [ipt_state ipt_helper ipt_conntrack ipt_REDIRECT ipt_MASQUERADE ip_nat_irc ip_nat_ftp iptable_nat ip_conntrack_irc ip_conntrack_ftp] pppoe 6732 1 pppox 924 1 [pppoe] ppp_synctty 4632 0 (unused) ppp_generic 16204 3 [pppoe pppox ppp_synctty] n_hdlc 5792 0 (unused) slhc 4296 0 [ppp_generic] 3c509 8240 1 ne 6148 1 8390 5784 0 [ne] crc32 2648 0 [8390]



::Installed Packages::

Name            Version        Description
===============-==============-==============================================
initrd          V2.2.0 uClibc- LEAF Bering-uClibc
initial filesystem
root            V2.2.0 uClibc- Core LEAF Bering-uClibc
package
config          0.4            Core config and backup
system package
etc             V2.2.0 uClibc-
local           V2.2.0 uClibc- LEAF Bering local
package
modules         V2.2.0 uClibc- Define & contain your
LEAF Bering modules
iptables        1.2.11         IP packet filter
administration tools for 2.4.
ppp             2.4.2-1        Point-to-Point Protocol
(PPP) daemon, ipv6 ena
pppoe           3.5-1          rp-pppoe plugin for
pppd
shorwall
ulogd           1.02           The Netfilter Userspace
Logging Daemon
dnsmasq         2.13 Rev 1     Dnsmasq is lightweight,
easy to configure DNS
sh-httpd        1.2.5 Rev 2    Small shell-based web
server
weblet          1.0.0 Rev 3    http-server content



::CPU Info::

processor       : 0
vendor_id       : GenuineIntel
cpu family      : 4
model           : 3
model name      : 486 DX/2
stepping        : 5
fdiv_bug        : no
hlt_bug         : no
f00f_bug        : no
coma_bug        : no
fpu             : yes
fpu_exception   : yes
cpuid level     : 1
wp              : yes
flags           : fpu vme
bogomips        : 33.28



::Running Processes::

  PID  Uid     VmSize Stat Command
    1 root        256 S   init [2]
    2 root            SW  [keventd]
    3 root            SWN [ksoftirqd_CPU0]
    4 root            SW  [kswapd]
    5 root            SW  [bdflush]
    6 root            SW  [kupdated]
12573 root        284 S   /sbin/syslogd -m 240
 1009 root        244 S   /sbin/klogd
 2738 root        528 S   /usr/sbin/pppd call
dsl-provider eth0
12934 root        144 S   /usr/sbin/watchdog
18567 nobody      324 S   /usr/sbin/dnsmasq
 3442 root        284 S   /usr/sbin/inetd
  264 root        296 S   /usr/sbin/ulogd -d
26935 root        284 S   /usr/sbin/cron
 1060 root        292 S   -sh
 1540 root        288 S   /sbin/getty 38400 tty2
12745 root        288 S   /bin/sh /usr/sbin/lrcfg
11363 sh-httpd    332 S   /bin/sh /usr/sbin/sh-httpd
16503 sh-httpd    288 S   /bin/sh
/var/sh-www/cgi-bin/viewsys
 4131 sh-httpd    192 S   sleep 1
18035 sh-httpd    288 S   /bin/sh
/var/sh-www/cgi-bin/viewsys
14215 sh-httpd    240 S   /bin/cat
12881 sh-httpd    292 R   ps aux



::messages::
Sep 18 10:50:58 firewall syslogd 1.4.1: restart.
Sep 18 10:50:59 firewall kernel: klogd 1.4.1, log
source = /proc/kmsg
started.
Sep 18 10:50:59 firewall kernel: No module symbols
loaded.
Sep 18 10:50:59 firewall kernel: BIOS-provided
physical RAM map:
Sep 18 10:50:59 firewall kernel: 16MB LOWMEM
available.
Sep 18 10:50:59 firewall kernel: DMI not present.
Sep 18 10:50:59 firewall kernel: Initializing CPU#0
Sep 18 10:50:59 firewall kernel: Memory: 14280k/16672k
available (973k
kernel code, 2004k reserved, 111k data, 64k init, 0k
highmem)
Sep 18 10:50:59 firewall kernel: Dentry cache hash
table entries: 4096
(order: 3, 32768 bytes)
Sep 18 10:50:59 firewall kernel: Inode cache hash
table entries: 2048
(order: 2, 16384 bytes)
Sep 18 10:50:59 firewall kernel: Mount cache hash
table entries: 512
(order: 0, 4096 bytes)
Sep 18 10:50:59 firewall kernel: Buffer cache hash
table entries: 1024
(order: 0, 4096 bytes)
Sep 18 10:50:59 firewall kernel: Checking 'hlt'
instruction... OK.
Sep 18 10:50:59 firewall kernel: Linux NET4.0 for
Linux 2.4
Sep 18 10:50:59 firewall kernel: Based upon Swansea
University Computer
Society NET3.039
Sep 18 10:50:59 firewall kernel: Serial driver version
5.05c (2001-07-08)
with MANY_PORTS SHARE_IRQ DETECT_IRQ SERIAL_PCI
enabled
Sep 18 10:50:59 firewall kernel: ttyS00 at 0x03f8 (irq
= 4) is a 16550A
Sep 18 10:50:59 firewall kernel: ttyS01 at 0x02f8 (irq
= 3) is a 16550A
Sep 18 10:50:59 firewall kernel: Real Time Clock
Driver v1.10f
Sep 18 10:50:59 firewall kernel: Floppy drive(s): fd0
is 2.88M
Sep 18 10:50:59 firewall kernel: FDC 0 is a National
Semiconductor PC87306
Sep 18 10:50:59 firewall kernel: Initializing
Cryptographic API
Sep 18 10:50:59 firewall kernel: NET4: Linux TCP/IP
1.0 for NET4.0
Sep 18 10:50:59 firewall kernel: IP Protocols: ICMP,
UDP, TCP, IGMP
Sep 18 10:50:59 firewall kernel: IP: routing cache
hash table of 512
buckets, 4Kbytes
Sep 18 10:50:59 firewall kernel: TCP: Hash tables
configured (established
1024 bind 1024)
Sep 18 10:50:59 firewall kernel: NET4: Unix domain
sockets 1.0/SMP for
Linux NET4.0.
Sep 18 10:50:59 firewall kernel: RAMDISK: Compressed
image found at block 0
Sep 18 10:50:59 firewall kernel: Freeing initrd
memory: 284k freed
Sep 18 10:50:59 firewall kernel: Freeing unused kernel
memory: 64k freed
Sep 18 10:50:59 firewall kernel: ne.c:v1.10 9/23/94
Donald Becker
([EMAIL PROTECTED])
Sep 18 10:50:59 firewall kernel: Last modified Nov 1,
2000 by Paul Gortmaker
Sep 18 10:50:59 firewall kernel: NE*000 ethercard
probe at 0x300: 00 00 1b
4b a6 f0
Sep 18 10:51:00 firewall kernel: 3c509.c:1.19
16Oct2002 [EMAIL PROTECTED]
Sep 18 10:51:00 firewall kernel:
http://www.scyld.com/network/3c509.html
Sep 18 10:51:00 firewall kernel: CSLIP: code copyright
1989 Regents of the
University of California
Sep 18 10:51:00 firewall kernel: N_HDLC line
discipline registered.
Sep 18 10:51:00 firewall kernel: PPP generic driver
version 2.4.2
Sep 18 10:51:03 firewall kernel: Software Watchdog
Timer: 0.05, timer
margin: 60 sec
Sep 18 10:51:33 firewall root: Shorewall Started

::syslog::
Sep 18 10:50:59 firewall kernel: Cannot find map file.
Sep 18 10:50:59 firewall kernel: Linux version 2.4.26
([EMAIL PROTECTED])
(gcc version 2.95.3 20010315 (release)) #1 Mon Jun 28
20:08:59 CEST 2004
Sep 18 10:50:59 firewall kernel: BIOS-88:
0000000000000000 -
000000000009f000 (usable)
Sep 18 10:50:59 firewall kernel: BIOS-88:
0000000000100000 -
0000000001048000 (usable)
Sep 18 10:50:59 firewall kernel: On node 0 totalpages:
4168
Sep 18 10:50:59 firewall kernel: zone(0): 4096 pages.
Sep 18 10:50:59 firewall kernel: zone(1): 72 pages.
Sep 18 10:50:59 firewall kernel: zone(2): 0 pages.
Sep 18 10:50:59 firewall kernel: Kernel command line:
BOOT_IMAGE=linux
initrd=initrd.lrp init=/linuxrc rw root=/dev/ram0
LEAFCFG=/dev/fd0u1680:msdos
Sep 18 10:50:59 firewall kernel: Console: colour VGA+
80x25
Sep 18 10:50:59 firewall kernel: Calibrating delay
loop... 33.28 BogoMIPS
Sep 18 10:50:59 firewall kernel: Checking if this
processor honours the WP
bit even in supervisor mode... Ok.
Sep 18 10:50:59 firewall kernel: Page-cache hash table
entries: 8192
(order: 3, 32768 bytes)
Sep 18 10:50:59 firewall kernel: CPU: Intel 486 DX/2
stepping 05
Sep 18 10:50:59 firewall kernel: POSIX conformance
testing by UNIFIX
Sep 18 10:50:59 firewall kernel: PCI: System does not
support PCI
Sep 18 10:50:59 firewall kernel: Initializing RT
netlink socket
Sep 18 10:50:59 firewall kernel: Starting kswapd
Sep 18 10:50:59 firewall kernel: pty: 256 Unix98 ptys
configured
Sep 18 10:50:59 firewall kernel: RAMDISK driver
initialized: 16 RAM disks
of 4096K size 1024 blocksize
Sep 18 10:50:59 firewall kernel: ip_tables: (C)
2000-2002 Netfilter core team
Sep 18 10:50:59 firewall kernel: arp_tables: (C) 2002
David S. Miller
Sep 18 10:50:59 firewall kernel: VFS: Mounted root
(minix filesystem).
Sep 18 10:50:59 firewall kernel: eth0: NE2000 found at
0x300, using IRQ 5.
Sep 18 10:51:00 firewall kernel: eth1: 3c5x9 at 0x280,
10baseT port,
address 00 a0 24 8d b3 de, IRQ 3.
Sep 18 10:51:00 firewall kernel: HDLC line discipline:
version $Revision:
3.7 $, maxframe=4096
Sep 18 10:51:01 firewall kernel: ip_conntrack version
2.1 (130 buckets,
1040 max) - 316 bytes per conntrack
Sep 18 10:51:03 firewall kernel: eth1: Setting
3c5x9/3c5x9B half-duplex
mode if_port: 0, sw_info: 8411
Sep 18 10:51:03 firewall kernel: eth1: Setting Rx mode
to 1 addresses.

::daemon.log::
Sep 18 10:51:03 firewall pppd[18678]: Plugin
/usr/lib/pppd/rp-pppoe.so
loaded.
Sep 18 10:51:03 firewall pppd[18678]: RP-PPPoE plugin
version 3.3 compiled
against pppd 2.4.2
Sep 18 10:51:03 firewall pppd[2738]: pppd 2.4.2
started by root, uid 0
Sep 18 10:51:04 firewall init: Entering runlevel: 2
Sep 18 10:51:05 firewall dnsmasq[18567]: started,
version 2.13 cachesize 150
Sep 18 10:51:05 firewall dnsmasq[18567]: read
/etc/hosts - 2 addresses
Sep 18 10:51:05 firewall dnsmasq[18567]: failed to
access
/var/lib/misc/dnsmasq.leases: No such file or
directory
Sep 18 10:51:05 firewall dnsmasq[18567]: reading
/etc/resolv.conf
Sep 18 10:51:05 firewall dnsmasq[18567]: ignoring
nameserver 192.168.1.254
- local interface
Sep 18 10:51:05 firewall dnsmasq[18567]: ignoring
nameserver 127.0.0.1 -
local interface
Sep 18 10:51:05 firewall inetd[3442]: Online and ready
(2 sockets)
Sep 18 10:51:28 firewall pppd[2738]: PPP session is
3645
Sep 18 10:51:28 firewall pppd[2738]: Using interface
ppp0
Sep 18 10:51:28 firewall pppd[2738]: Connect: ppp0
<--> eth0
Sep 18 10:51:28 firewall pppd[2738]: Couldn't increase
MTU to 1500
Sep 18 10:51:28 firewall pppd[2738]: Couldn't increase
MRU to 1500
Sep 18 10:51:31 firewall pppd[2738]: Couldn't increase
MRU to 1500
Sep 18 10:51:31 firewall pppd[2738]: PAP
authentication succeeded
Sep 18 10:51:31 firewall pppd[2738]: peer from calling
number
00:90:1A:40:C9:FE authorized
Sep 18 10:51:31 firewall pppd[2738]: Cannot determine
ethernet address for
proxy ARP
Sep 18 10:51:31 firewall pppd[2738]: local IP address
69.0.45.229
Sep 18 10:51:31 firewall pppd[2738]: remote IP address
204.60.4.42
Sep 18 10:51:31 firewall pppd[2738]: primary DNS
address 204.60.203.179
Sep 18 10:51:31 firewall pppd[2738]: secondary DNS
address 66.73.20.40
Sep 18 11:33:04 firewall sh-httpd[3158]: connect from
192.168.1.1
Sep 18 11:33:05 firewall sh-httpd[29211]: connect from
192.168.1.1
Sep 18 11:33:05 firewall inetd[3442]: pid 3158: exit
status 1
Sep 18 11:33:05 firewall sh-httpd[25529]: connect from
192.168.1.1
Sep 18 11:33:08 firewall sh-httpd[22898]: connect from
192.168.1.1
Sep 18 11:33:13 firewall sh-httpd[11444]: connect from
192.168.1.1
Sep 18 11:33:15 firewall sh-httpd[15522]: connect from
192.168.1.1
Sep 18 11:33:15 firewall inetd[3442]: pid 15522: exit
status 1
Sep 18 11:33:18 firewall sh-httpd[17679]: connect from
192.168.1.1
Sep 18 11:33:20 firewall sh-httpd[27040]: connect from
192.168.1.1
Sep 18 11:33:20 firewall inetd[3442]: pid 27040: exit
status 1
Sep 18 11:35:47 firewall sh-httpd[24942]: connect from
192.168.1.1
Sep 18 11:35:47 firewall inetd[3442]: pid 24942: exit
status 1
Sep 18 11:35:50 firewall sh-httpd[15035]: connect from
192.168.1.1
Sep 18 11:35:53 firewall sh-httpd[13914]: connect from
192.168.1.1
Sep 18 11:35:53 firewall inetd[3442]: pid 13914: exit
status 1
Sep 18 11:36:01 firewall sh-httpd[15742]: connect from
192.168.1.1
Sep 18 11:36:02 firewall inetd[3442]: pid 15742: exit
status 1
Sep 18 11:36:07 firewall sh-httpd[5819]: connect from
192.168.1.1
Sep 18 11:36:09 firewall sh-httpd[8076]: connect from
192.168.1.1
Sep 18 11:36:09 firewall inetd[3442]: pid 8076: exit
status 1
Sep 18 11:36:31 firewall sh-httpd[24284]: connect from
192.168.1.1
Sep 18 11:36:32 firewall inetd[3442]: pid 24284: exit
status 1
Sep 18 11:36:33 firewall sh-httpd[1305]: connect from
192.168.1.1
Sep 18 11:36:34 firewall inetd[3442]: pid 1305: exit
status 1
Sep 18 11:36:36 firewall sh-httpd[22750]: connect from
192.168.1.1
Sep 18 11:36:40 firewall sh-httpd[19810]: connect from
192.168.1.1
Sep 18 11:36:41 firewall inetd[3442]: pid 19810: exit
status 1
Sep 18 11:38:37 firewall sh-httpd[30080]: connect from
192.168.1.1
Sep 18 11:38:38 firewall inetd[3442]: pid 30080: exit
status 1
Sep 18 11:38:39 firewall sh-httpd[4154]: connect from
192.168.1.1
Sep 18 11:38:41 firewall sh-httpd[1174]: connect from
192.168.1.1
Sep 18 11:38:41 firewall inetd[3442]: pid 1174: exit
status 1
Sep 18 11:40:36 firewall sh-httpd[15765]: connect from
192.168.1.1
Sep 18 11:40:37 firewall inetd[3442]: pid 15765: exit
status 1
Sep 18 11:40:40 firewall sh-httpd[23331]: connect from
192.168.1.1
Sep 18 11:40:43 firewall sh-httpd[7539]: connect from
192.168.1.1
Sep 18 11:40:43 firewall inetd[3442]: pid 7539: exit
status 1
Sep 18 11:41:07 firewall sh-httpd[23848]: connect from
192.168.1.1
Sep 18 11:41:07 firewall inetd[3442]: pid 23848: exit
status 1
Sep 18 11:41:12 firewall sh-httpd[11363]: connect from
192.168.1.1
Sep 18 11:41:15 firewall sh-httpd[31739]: connect from
192.168.1.1
Sep 18 11:41:15 firewall inetd[3442]: pid 31739: exit
status 1
Sep 18 11:41:58 firewall sh-httpd[758]: connect from
192.168.1.1
Sep 18 11:41:58 firewall inetd[3442]: pid 758: exit
status 1
Sep 18 11:42:01 firewall sh-httpd[23274]: connect from
192.168.1.1
Sep 18 11:42:03 firewall sh-httpd[12980]: connect from
192.168.1.1
Sep 18 11:42:03 firewall inetd[3442]: pid 12980: exit
status 1
Sep 18 11:42:51 firewall sh-httpd[23325]: connect from
192.168.1.1
Sep 18 11:42:51 firewall inetd[3442]: pid 23325: exit
status 1
Sep 18 11:42:52 firewall sh-httpd[20176]: connect from
192.168.1.1
Sep 18 11:42:54 firewall sh-httpd[3333]: connect from
192.168.1.1
Sep 18 11:42:55 firewall inetd[3442]: pid 3333: exit
status 1
Sep 18 11:43:41 firewall sh-httpd[26010]: connect from
192.168.1.1
Sep 18 11:43:41 firewall inetd[3442]: pid 26010: exit
status 1
Sep 18 11:43:43 firewall sh-httpd[26226]: connect from
192.168.1.1
Sep 18 11:43:44 firewall sh-httpd[30367]: connect from
192.168.1.1
Sep 18 11:43:45 firewall inetd[3442]: pid 30367: exit
status 1
Sep 18 11:43:55 firewall sh-httpd[20668]: connect from
192.168.1.1
Sep 18 11:43:55 firewall inetd[3442]: pid 20668: exit
status 1
Sep 18 11:43:57 firewall sh-httpd[2454]: connect from
192.168.1.1
Sep 18 11:43:59 firewall sh-httpd[2286]: connect from
192.168.1.1
Sep 18 11:43:59 firewall inetd[3442]: pid 2286: exit
status 1
Sep 18 11:44:07 firewall sh-httpd[18895]: connect from
192.168.1.1
Sep 18 11:44:07 firewall inetd[3442]: pid 18895: exit
status 1
Sep 18 11:44:09 firewall sh-httpd[12779]: connect from
192.168.1.1

::messages concerning the firewall::

Sep 18 10:56:01 firewall Shorewall:net2all:DROP:
IN=ppp0 OUT= MAC=
SRC=81.192.255.235 DST=69.0.45.229 LEN=60 TOS=00
PREC=0x00 TTL=47 ID=40949
CE DF PROTO=TCP SPT=44551 DPT=23 SEQ=20905596 ACK=0
WINDOW=5840 SYN URGP=0
Sep 18 10:56:04 firewall Shorewall:net2all:DROP:
IN=ppp0 OUT= MAC=
SRC=81.192.255.235 DST=69.0.45.229 LEN=60 TOS=00
PREC=0x00 TTL=47 ID=40950
CE DF PROTO=TCP SPT=44551 DPT=23 SEQ=20905596 ACK=0
WINDOW=5840 SYN URGP=0
Sep 18 11:15:24 firewall Shorewall:net2all:DROP:
IN=ppp0 OUT= MAC=
SRC=66.65.179.99 DST=69.0.45.229 LEN=404 TOS=00
PREC=0x00 TTL=118 ID=32445
PROTO=UDP SPT=1164 DPT=1434 LEN=384
Sep 18 11:16:33 firewall Shorewall:net2all:DROP:
IN=ppp0 OUT= MAC=
SRC=211.96.205.180 DST=69.0.45.229 LEN=48 TOS=00
PREC=0x00 TTL=104
ID=41960 CE DF PROTO=TCP SPT=4353 DPT=554
SEQ=1222527353 ACK=0
WINDOW=64240 SYN URGP=0
Sep 18 11:16:36 firewall Shorewall:net2all:DROP:
IN=ppp0 OUT= MAC=
SRC=211.96.205.180 DST=69.0.45.229 LEN=48 TOS=00
PREC=0x00 TTL=104
ID=42677 CE DF PROTO=TCP SPT=4353 DPT=554
SEQ=1222527353 ACK=0
WINDOW=64240 SYN URGP=0
Sep 18 11:16:39 firewall Shorewall:net2all:DROP:
IN=ppp0 OUT= MAC=
SRC=4.234.54.84 DST=69.0.45.229 LEN=48 TOS=00
PREC=0x00 TTL=113 ID=64551
CE DF PROTO=TCP SPT=3566 DPT=17300 SEQ=586480223 ACK=0
WINDOW=8760 SYN
URGP=0
Sep 18 11:16:42 firewall Shorewall:net2all:DROP:
IN=ppp0 OUT= MAC=
SRC=211.96.205.180 DST=69.0.45.229 LEN=48 TOS=00
PREC=0x00 TTL=104
ID=43929 CE DF PROTO=TCP SPT=4353 DPT=554
SEQ=1222527353 ACK=0
WINDOW=64240 SYN URGP=0
Sep 18 11:27:20 firewall Shorewall:net2all:DROP:
IN=ppp0 OUT= MAC=
SRC=67.70.108.44 DST=69.0.45.229 LEN=48 TOS=00
PREC=0x00 TTL=113 ID=24554
DF PROTO=TCP SPT=4928 DPT=2745 SEQ=643366081 ACK=0
WINDOW=64800 SYN URGP=0
Sep 18 11:27:23 firewall Shorewall:net2all:DROP:
IN=ppp0 OUT= MAC=
SRC=67.70.108.44 DST=69.0.45.229 LEN=48 TOS=00
PREC=0x00 TTL=113 ID=25507
DF PROTO=TCP SPT=4928 DPT=2745 SEQ=643366081 ACK=0
WINDOW=64800 SYN URGP=0
Sep 18 11:27:23 firewall Shorewall:net2all:DROP:
IN=ppp0 OUT= MAC=
SRC=67.70.108.44 DST=69.0.45.229 LEN=48 TOS=00
PREC=0x00 TTL=113 ID=25508
DF PROTO=TCP SPT=4929 DPT=2082 SEQ=643406446 ACK=0
WINDOW=64800 SYN URGP=0
Sep 18 11:30:38 firewall Shorewall:net2all:DROP:
IN=ppp0 OUT= MAC=
SRC=217.255.62.229 DST=69.0.45.229 LEN=40 TOS=00
PREC=0x00 TTL=240 ID=8606
PROTO=TCP SPT=1029 DPT=554 SEQ=757147 ACK=0
WINDOW=4096 SYN URGP=0
Sep 18 11:31:47 firewall Shorewall:net2all:DROP:
IN=ppp0 OUT= MAC=
SRC=220.201.194.148 DST=69.0.45.229 LEN=48 TOS=00
PREC=0x00 TTL=105
ID=43411 CE DF PROTO=TCP SPT=4717 DPT=1978
SEQ=4180826404 ACK=0
WINDOW=65535 SYN URGP=0
Sep 18 11:31:50 firewall Shorewall:net2all:DROP:
IN=ppp0 OUT= MAC=
SRC=220.201.194.148 DST=69.0.45.229 LEN=48 TOS=00
PREC=0x00 TTL=105
ID=43756 CE DF PROTO=TCP SPT=4717 DPT=1978
SEQ=4180826404 ACK=0
WINDOW=65535 SYN URGP=0
Sep 18 11:31:56 firewall Shorewall:net2all:DROP:
IN=ppp0 OUT= MAC=
SRC=220.201.194.148 DST=69.0.45.229 LEN=48 TOS=00
PREC=0x00 TTL=105
ID=44468 CE DF PROTO=TCP SPT=4717 DPT=1978
SEQ=4180826404 ACK=0
WINDOW=65535 SYN URGP=0
Sep 18 11:36:26 firewall Shorewall:net2all:DROP:
IN=ppp0 OUT= MAC=
SRC=213.33.16.41 DST=69.0.45.229 LEN=48 TOS=00
PREC=0x00 TTL=100 ID=19894
DF PROTO=TCP SPT=22508 DPT=1433 SEQ=3104964744 ACK=0
WINDOW=16384 SYN
URGP=0
Sep 18 11:36:29 firewall Shorewall:net2all:DROP:
IN=ppp0 OUT= MAC=
SRC=213.33.16.41 DST=69.0.45.229 LEN=48 TOS=00
PREC=0x00 TTL=100 ID=20000
DF PROTO=TCP SPT=22508 DPT=1433 SEQ=3104964744 ACK=0
WINDOW=16384 SYN
URGP=0
Sep 18 11:36:35 firewall Shorewall:net2all:DROP:
IN=ppp0 OUT= MAC=
SRC=213.33.16.41 DST=69.0.45.229 LEN=48 TOS=00
PREC=0x00 TTL=100 ID=20431
DF PROTO=TCP SPT=22508 DPT=1433 SEQ=3104964744 ACK=0
WINDOW=16384 SYN
URGP=0
Sep 18 11:38:31 firewall Shorewall:net2all:DROP:
IN=ppp0 OUT= MAC=
SRC=68.0.45.229 DST=69.0.45.229 LEN=574 TOS=00
PREC=0x00 TTL=113 ID=53654
CE PROTO=UDP SPT=666 DPT=1026 LEN=554
Sep 18 11:40:16 firewall Shorewall:net2all:DROP:
IN=ppp0 OUT= MAC=
SRC=61.149.249.193 DST=69.0.45.229 LEN=40 TOS=00
PREC=0x00 TTL=167 ID=256
PROTO=TCP SPT=1127 DPT=4899 SEQ=1671816 ACK=0
WINDOW=512 SYN URGP=0



-------------------------------------------------------
This SF.Net email is sponsored by: YOU BE THE JUDGE. Be one of 170
Project Admins to receive an Apple iPod Mini FREE for your judgement on
who ports your project to Linux PPC the best. Sponsored by IBM.
Deadline: Sept. 24. Go here: http://sf.net/ppc_contest.php
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html




-------------------------------------------------------
This SF.Net email is sponsored by: YOU BE THE JUDGE. Be one of 170
Project Admins to receive an Apple iPod Mini FREE for your judgement on
who ports your project to Linux PPC the best. Sponsored by IBM.
Deadline: Sept. 24. Go here: http://sf.net/ppc_contest.php
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html

Reply via email to