#17685: Active firewall after disabling it in Startup and reboot
------------------------------+----------------------------------
Reporter: philip_petev | Owner: developers
Type: defect | Status: new
Priority: response-needed | Milestone: Chaos Calmer (trunk)
Component: packages | Version: Trunk
Resolution: | Keywords:
------------------------------+----------------------------------
Comment (by philip_petev):
Alright, here they are:
{{{
Table: Filter
Chain INPUT (Policy: ACCEPT, Packets: 5, Traffic: 300.00 B)
Rule # Pkts. Traffic Target Prot. Flags In Out
Source Destination Options
1 42 2.57 KB delegate_input all -- * *
0.0.0.0/0 0.0.0.0/0 -
Chain FORWARD (Policy: DROP, Packets: 0, Traffic: 0.00 B)
Rule # Pkts. Traffic Target Prot. Flags In Out
Source Destination Options
1 0 0.00 B delegate_forward all -- * *
0.0.0.0/0 0.0.0.0/0 -
Chain OUTPUT (Policy: ACCEPT, Packets: 28, Traffic: 2.02 KB)
Rule # Pkts. Traffic Target Prot. Flags In Out
Source Destination Options
1 133 35.13 KB delegate_output all -- *
* 0.0.0.0/0 0.0.0.0/0 -
Chain delegate_forward (References: 1)
Rule # Pkts. Traffic Target Prot. Flags In Out
Source Destination Options
1 0 0.00 B forwarding_rule all -- * *
0.0.0.0/0 0.0.0.0/0 /* user chain for forwarding */
2 0 0.00 B ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 ctstate RELATED,ESTABLISHED
3 0 0.00 B zone_lan_forward all -- br-lan *
0.0.0.0/0 0.0.0.0/0 -
4 0 0.00 B zone_wan_forward all -- eth1.1 *
0.0.0.0/0 0.0.0.0/0 -
5 0 0.00 B reject all -- * * 0.0.0.0/0
0.0.0.0/0 -
Chain delegate_input (References: 1)
Rule # Pkts. Traffic Target Prot. Flags In Out
Source Destination Options
1 32 2.13 KB ACCEPT all -- lo *
0.0.0.0/0 0.0.0.0/0 -
2 10 460.00 B input_rule all -- * *
0.0.0.0/0 0.0.0.0/0 /* user chain for input */
3 0 0.00 B ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 ctstate RELATED,ESTABLISHED
4 5 300.00 B syn_flood tcp -- * *
0.0.0.0/0 0.0.0.0/0 tcp flags:0x17/0x02
5 5 160.00 B zone_lan_input all -- br-lan *
0.0.0.0/0 0.0.0.0/0 -
6 0 0.00 B zone_wan_input all -- eth1.1 *
0.0.0.0/0 0.0.0.0/0 -
Chain delegate_output (References: 1)
Rule # Pkts. Traffic Target Prot. Flags In Out
Source Destination Options
1 32 2.13 KB ACCEPT all -- * lo
0.0.0.0/0 0.0.0.0/0 -
2 101 33.00 KB output_rule all -- * *
0.0.0.0/0 0.0.0.0/0 /* user chain for output */
3 3 312.00 B ACCEPT all -- * *
0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
4 70 30.68 KB zone_lan_output all -- *
br-lan 0.0.0.0/0 0.0.0.0/0 -
5 0 0.00 B zone_wan_output all -- *
eth1.1 0.0.0.0/0 0.0.0.0/0 -
Chain reject (References: 3)
Rule # Pkts. Traffic Target Prot. Flags In Out
Source Destination Options
1 0 0.00 B REJECT tcp -- * * 0.0.0.0/0
0.0.0.0/0 reject-with tcp-reset
2 0 0.00 B REJECT all -- * * 0.0.0.0/0
0.0.0.0/0 reject-with icmp-port-unreachable
Chain syn_flood (References: 1)
Rule # Pkts. Traffic Target Prot. Flags In Out
Source Destination Options
1 5 300.00 B RETURN tcp -- * *
0.0.0.0/0 0.0.0.0/0 tcp flags:0x17/0x02 limit: avg 25/sec
burst 50
2 0 0.00 B DROP all -- * * 0.0.0.0/0
0.0.0.0/0 -
Chain zone_lan_dest_ACCEPT (References: 2)
Rule # Pkts. Traffic Target Prot. Flags In Out
Source Destination Options
1 70 30.68 KB ACCEPT all -- * br-lan
0.0.0.0/0 0.0.0.0/0 -
Chain zone_lan_forward (References: 1)
Rule # Pkts. Traffic Target Prot. Flags In Out
Source Destination Options
1 0 0.00 B MINIUPNPD all -- * *
0.0.0.0/0 0.0.0.0/0 -
2 0 0.00 B forwarding_lan_rule all -- * *
0.0.0.0/0 0.0.0.0/0 /* user chain for forwarding */
3 0 0.00 B zone_wan_dest_ACCEPT all -- * *
0.0.0.0/0 0.0.0.0/0 /* forwarding lan -> wan */
4 0 0.00 B ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 ctstate DNAT /* Accept port forwards */
5 0 0.00 B zone_lan_dest_ACCEPT all -- * *
0.0.0.0/0 0.0.0.0/0 -
Chain zone_lan_input (References: 1)
Rule # Pkts. Traffic Target Prot. Flags In Out
Source Destination Options
1 5 160.00 B input_lan_rule all -- * *
0.0.0.0/0 0.0.0.0/0 /* user chain for input */
2 0 0.00 B ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 ctstate DNAT /* Accept port redirections */
3 5 160.00 B zone_lan_src_ACCEPT all -- *
* 0.0.0.0/0 0.0.0.0/0 -
Chain zone_lan_output (References: 1)
Rule # Pkts. Traffic Target Prot. Flags In Out
Source Destination Options
1 70 30.68 KB output_lan_rule all -- *
* 0.0.0.0/0 0.0.0.0/0 /* user chain for output */
2 70 30.68 KB zone_lan_dest_ACCEPT all -- *
* 0.0.0.0/0 0.0.0.0/0 -
Chain zone_lan_src_ACCEPT (References: 1)
Rule # Pkts. Traffic Target Prot. Flags In Out
Source Destination Options
1 5 160.00 B ACCEPT all -- br-lan *
0.0.0.0/0 0.0.0.0/0 -
Chain zone_wan_dest_ACCEPT (References: 2)
Rule # Pkts. Traffic Target Prot. Flags In Out
Source Destination Options
1 0 0.00 B ACCEPT all -- * eth1.1 0.0.0.0/0
0.0.0.0/0 -
Chain zone_wan_dest_REJECT (References: 1)
Rule # Pkts. Traffic Target Prot. Flags In Out
Source Destination Options
1 0 0.00 B reject all -- * eth1.1 0.0.0.0/0
0.0.0.0/0 -
Chain zone_wan_forward (References: 1)
Rule # Pkts. Traffic Target Prot. Flags In Out
Source Destination Options
1 0 0.00 B forwarding_wan_rule all -- * *
0.0.0.0/0 0.0.0.0/0 /* user chain for forwarding */
2 0 0.00 B ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 ctstate DNAT /* Accept port forwards */
3 0 0.00 B zone_wan_dest_REJECT all -- * *
0.0.0.0/0 0.0.0.0/0 -
Chain zone_wan_input (References: 1)
Rule # Pkts. Traffic Target Prot. Flags In Out
Source Destination Options
1 0 0.00 B input_wan_rule all -- * *
0.0.0.0/0 0.0.0.0/0 /* user chain for input */
2 0 0.00 B ACCEPT udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpt:68 /* Allow-DHCP-Renew */
3 0 0.00 B ACCEPT icmp -- * * 0.0.0.0/0
0.0.0.0/0 icmptype 8 /* Allow-Ping */
4 0 0.00 B ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 ctstate DNAT /* Accept port redirections */
5 0 0.00 B zone_wan_src_REJECT all -- * *
0.0.0.0/0 0.0.0.0/0 -
Chain zone_wan_output (References: 1)
Rule # Pkts. Traffic Target Prot. Flags In Out
Source Destination Options
1 0 0.00 B output_wan_rule all -- * *
0.0.0.0/0 0.0.0.0/0 /* user chain for output */
2 0 0.00 B zone_wan_dest_ACCEPT all -- * *
0.0.0.0/0 0.0.0.0/0 -
Chain zone_wan_src_REJECT (References: 1)
Rule # Pkts. Traffic Target Prot. Flags In Out
Source Destination Options
1 0 0.00 B reject all -- eth1.1 * 0.0.0.0/0
0.0.0.0/0 -
Table: NAT
Chain PREROUTING (Policy: ACCEPT, Packets: 6, Traffic: 332.00 B)
Rule # Pkts. Traffic Target Prot. Flags In Out
Source Destination Options
1 6 332.00 B delegate_prerouting all -- *
* 0.0.0.0/0 0.0.0.0/0 -
Chain POSTROUTING (Policy: ACCEPT, Packets: 62, Traffic: 4.59 KB)
Rule # Pkts. Traffic Target Prot. Flags In Out
Source Destination Options
1 62 4.59 KB delegate_postrouting all -- *
* 0.0.0.0/0 0.0.0.0/0 -
Chain delegate_postrouting (References: 1)
Rule # Pkts. Traffic Target Prot. Flags In Out
Source Destination Options
1 62 4.59 KB postrouting_rule all -- *
* 0.0.0.0/0 0.0.0.0/0 /* user chain for postrouting */
2 2 462.00 B zone_lan_postrouting all -- *
br-lan 0.0.0.0/0 0.0.0.0/0 -
3 0 0.00 B zone_wan_postrouting all -- *
eth1.1 0.0.0.0/0 0.0.0.0/0 -
Chain delegate_prerouting (References: 1)
Rule # Pkts. Traffic Target Prot. Flags In Out
Source Destination Options
1 6 332.00 B prerouting_rule all -- *
* 0.0.0.0/0 0.0.0.0/0 /* user chain for prerouting */
2 1 32.00 B zone_lan_prerouting all --
br-lan * 0.0.0.0/0 0.0.0.0/0 -
3 0 0.00 B zone_wan_prerouting all -- eth1.1 *
0.0.0.0/0 0.0.0.0/0 -
Chain zone_lan_postrouting (References: 1)
Rule # Pkts. Traffic Target Prot. Flags In Out
Source Destination Options
1 2 462.00 B postrouting_lan_rule all -- *
* 0.0.0.0/0 0.0.0.0/0 /* user chain for postrouting */
Chain zone_lan_prerouting (References: 1)
Rule # Pkts. Traffic Target Prot. Flags In Out
Source Destination Options
1 1 32.00 B MINIUPNPD all -- * *
0.0.0.0/0 0.0.0.0/0 -
2 1 32.00 B prerouting_lan_rule all -- *
* 0.0.0.0/0 0.0.0.0/0 /* user chain for prerouting */
Chain zone_wan_postrouting (References: 1)
Rule # Pkts. Traffic Target Prot. Flags In Out
Source Destination Options
1 0 0.00 B postrouting_wan_rule all -- * *
0.0.0.0/0 0.0.0.0/0 /* user chain for postrouting */
2 0 0.00 B MASQUERADE all -- * *
0.0.0.0/0 0.0.0.0/0 -
Chain zone_wan_prerouting (References: 1)
Rule # Pkts. Traffic Target Prot. Flags In Out
Source Destination Options
1 0 0.00 B prerouting_wan_rule all -- * *
0.0.0.0/0 0.0.0.0/0 /* user chain for prerouting */
Table: Mangle
Chain PREROUTING (Policy: ACCEPT, Packets: 283, Traffic: 25.47 KB)
Rule # Pkts. Traffic Target Prot. Flags In Out
Source Destination Options
1 283 25.47 KB fwmark all -- * *
0.0.0.0/0 0.0.0.0/0 -
Chain FORWARD (Policy: ACCEPT, Packets: 0, Traffic: 0.00 B)
Rule # Pkts. Traffic Target Prot. Flags In Out
Source Destination Options
1 0 0.00 B mssfix all -- * * 0.0.0.0/0
0.0.0.0/0 -
Chain mssfix (References: 1)
Rule # Pkts. Traffic Target Prot. Flags In Out
Source Destination Options
1 0 0.00 B TCPMSS tcp -- * eth1.1 0.0.0.0/0
0.0.0.0/0 tcp flags:0x06/0x02 /* wan (mtu_fix) */ TCPMSS clamp to
PMTU
Table: Raw
Chain PREROUTING (Policy: ACCEPT, Packets: 283, Traffic: 25.47 KB)
Rule # Pkts. Traffic Target Prot. Flags In Out
Source Destination Options
1 283 25.47 KB delegate_notrack all -- *
* 0.0.0.0/0 0.0.0.0/0 -
}}}
UPnP is disabled as well and there is no room on WR841N's flash for QoS,
so it's not installed.
Isn't that the point of the presence of Enable/Disable button for any
service, to turn it on and off (completely off)?
--
Ticket URL: <https://dev.openwrt.org/ticket/17685#comment:11>
OpenWrt <http://openwrt.org>
Opensource Wireless Router Technology
_______________________________________________
openwrt-tickets mailing list
[email protected]
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-tickets