I am stymied by my inability to establish the simplest connection with my test Bering-uClibc system:
/var/log/shorewall.log:
Mar 22 00:38:35 PlatinumWALL Shorewall:net2all:DROP: IN=eth0 OUT=
MAC=00:50:04:20:ec:d1:00:01:02:6c:6b:4b:08:00 SRC=192.168.123.150
DST=192.168.123.30 LEN=60 TOS=00 PREC=0x00 TTL=64 ID=31774 DF
PROTO=TCP SPT=57576 DPT=22 SEQ=721372925 ACK=0 WINDOW=5840 SYN
URGP=0
For those who miss the significance of this log entry,
/usr/share/shorewall/rfc1918 has 192.168.0.0/16 commented OUT.
Default /usr/share/shorewall/action.AllowSSH:
ACCEPT - - tcp 22
Nearest I can tell, with my limited Shorewall experience, is this from
`shorewall show':
Chain net2all (2 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state
RELATED,ESTABLISHED
812 125K Drop all -- * * 0.0.0.0/0 0.0.0.0/0
I do not understand how these packets get to this point, much less what
is `net2all' in the first place? Am I missing some critical
documentation?
What do you think?
What am I missing?
--
Best Regards,
mds
mds resource
877.596.8237
-
Dare to fix things before they break . . .
-
Our capacity for understanding is inversely proportional to how much
we think we know. The more I know, the more I know I don't know . . .
--
signature.asc
Description: Digital signature
