My shorewall dropped packets arent logged anymore.
When I read my log, it began after a syslog reload, so I may have changed syslog configuration, but dont remember nor see anything weird in syslog.conf.

/var/log/messages
Oct 5 19:13:03 kim kernel: Shorewall:net2fw:DROP:IN=eth0 OUT= MAC=00:1c:c0:65:22:3d:00:0f:90:98:e1:02:08:00 SRC=77.75.35.146 DST=91.121.169.122 LEN=40 TOS=0 x00 PREC=0x00 TTL=244 ID=13716 PROTO=TCP SPT=3025 DPT=1039 WINDOW=4096 RES=0x00 SYN URGP=0
Oct  5 19:21:18 kim exiting on signal 15
Oct  5 19:21:19 kim syslogd 1.4.1#18: restart.
Oct  5 19:41:19 kim -- MARK --

If I understand the output of shorewall show, packets dropped ARE logged but they dont show in /var/log/messages. I added a specific kern.info log file which remains desperatetly empty.

I attach the related sections of conofig files and a shorewall dump output

syslog.conf
[...]
*.=info;*.=notice;*.=warn;\
        auth,authpriv.none;\
        cron,daemon.none;\
        mail,news.none          -/var/log/messages
kern.info       /var/log/kern.info
[...]

Logging to kern.info works
[EMAIL PROTECTED]:/var/log# logger -p kern.info "test syslog"
[EMAIL PROTECTED]:/var/log# tail -n 1 /var/log/messages
Nov  8 11:39:15 kim root: test syslog

shorewall.conf
[...]
LOGFORMAT="Shorewall:%s:%s:"
LOGTAGONLY=No
LOGRATE=
LOGBURST=
LOGALLNEW=info
BLACKLIST_LOGLEVEL=
MACLIST_LOG_LEVEL=info
TCP_FLAGS_LOG_LEVEL=info
RFC1918_LOG_LEVEL=info
SMURF_LOG_LEVEL=info
LOG_MARTIANS=No
[...]
[...]
DROP_DEFAULT="Drop"
REJECT_DEFAULT="Reject"
ACCEPT_DEFAULT="none"
QUEUE_DEFAULT="none"
NFQUEUE_DEFAULT="none"
[...]

/etc/shorewall/policy
$FW             net             ACCEPT
net             $FW             DROP            info
net             all             DROP            info
all             all             REJECT          info

[EMAIL PROTECTED]:/var/log# /sbin/shorewall version
4.0.14

[EMAIL PROTECTED]:/var/log# ip addr show
1: lo: <LOOPBACK,UP,10000> mtu 16436 qdisc noqueue
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
2: eth0: <BROADCAST,MULTICAST,UP,10000> mtu 1500 qdisc pfifo_fast qlen 1000
    link/ether 00:1c:c0:65:22:3d brd ff:ff:ff:ff:ff:ff
    inet 91.121.169.122/24 brd 91.121.169.255 scope global eth0
    inet 91.121.42.145/32 brd 91.255.255.255 scope global eth0:0
    inet 91.121.46.150/32 brd 91.255.255.255 scope global eth0:1
    inet 91.121.43.206/32 brd 91.255.255.255 scope global eth0:2
3: dummy0: <BROADCAST,NOARP> mtu 1500 qdisc noop
    link/ether 06:e6:3f:82:5c:3a brd ff:ff:ff:ff:ff:ff
4: tunl0: <NOARP> mtu 1480 qdisc noop
    link/ipip 0.0.0.0 brd 0.0.0.0
5: gre0: <NOARP> mtu 1476 qdisc noop
    link/gre 0.0.0.0 brd 0.0.0.0

[EMAIL PROTECTED]:/var/log# ip route show
91.121.169.0/24 dev eth0  proto kernel  scope link  src 91.121.169.122
default via 91.121.169.254 dev eth0

Shorewall 4.0.14 Dump at kim.posteurs.com - Sat Nov  8 11:58:46 CET 2008

   Shorewall-perl 4.0.14

Counters reset Sat Nov  8 11:23:08 CET 2008

Chain INPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
 4304  247K LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state NEW LOG flags 0 level 6 prefix `Shorewall:filter:INPUT:' 
 6218  433K eth0_in    0    --  eth0   *       0.0.0.0/0            0.0.0.0/0   
        
 2675  365K ACCEPT     0    --  lo     *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 Reject     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:INPUT:REJECT:' 
    0     0 reject     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state NEW LOG flags 0 level 6 prefix `Shorewall:filter:FORWARD:' 
    0     0 eth0_fwd   0    --  eth0   *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 Reject     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:FORWARD:REJECT:' 
    0     0 reject     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain OUTPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
  582 45503 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state NEW LOG flags 0 level 6 prefix `Shorewall:filter:OUTPUT:' 
 1989  328K eth0_out   0    --  *      eth0    0.0.0.0/0            0.0.0.0/0   
        
 2675  365K ACCEPT     0    --  *      lo      0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 Reject     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:OUTPUT:REJECT:' 
    0     0 reject     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain Drop (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    4   176 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:113 
 4042  230K dropBcast  0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 3 code 4 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 11 
 3397  150K dropInvalid  0    --  *      *       0.0.0.0/0            0.0.0.0/0 
          
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 135,445 
    2   156 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpts:137:139 
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp spt:137 dpts:1024:65535 
   21  1092 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 135,139,445 
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpt:1900 
 3372  148K dropNotSyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0  
         
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp spt:53 

Chain Reject (6 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:113 
    0     0 dropBcast  0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 3 code 4 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        icmp type 11 
    0     0 dropInvalid  0    --  *      *       0.0.0.0/0            0.0.0.0/0 
          
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 135,445 
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpts:137:139 
    0     0 reject     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp spt:137 dpts:1024:65535 
    0     0 reject     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        multiport dports 135,139,445 
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpt:1900 
    0     0 dropNotSyn  tcp  --  *      *       0.0.0.0/0            0.0.0.0/0  
         
    0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp spt:53 

Chain all2fw (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 Reject     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:all2fw:REJECT:' 
    0     0 reject     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain all2net (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 Reject     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:all2net:REJECT:' 
    0     0 reject     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain dropBcast (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
  645 79718 DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        ADDRTYPE match dst-type BROADCAST 
    0     0 DROP       0    --  *      *       0.0.0.0/0            224.0.0.0/4 
        

Chain dropInvalid (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    2    96 DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state INVALID 

Chain dropNotSyn (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp flags:!0x17/0x02 

Chain dynamic (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain eth0_fwd (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 dynamic    0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state INVALID,NEW 
    0     0 smurfs     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state INVALID,NEW 
    0     0 tcpflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain eth0_in (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
 4128  235K dynamic    0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state INVALID,NEW 
 4128  235K smurfs     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state INVALID,NEW 
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpts:67:68 
 5192  291K tcpflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        
 6218  433K net2fw     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain eth0_out (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        udp dpts:67:68 
 1989  328K fw2net     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain fw2all (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 Reject     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    0     0 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:fw2all:REJECT:' 
    0     0 reject     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain fw2net (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
 1585  294K ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
    0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        
  404 33838 ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain logdrop (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain logflags (5 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 4 level 6 prefix `Shorewall:logflags:DROP:' 
    0     0 DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain logreject (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 reject     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain net2fw (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
 2090  198K ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state RELATED,ESTABLISHED 
   36  2968 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    2    84 ACCEPT     tcp  --  *      *       0.0.0.0/0            
91.121.169.122      tcp dpt:80 
    1    44 ACCEPT     tcp  --  *      *       0.0.0.0/0            
91.121.169.122      tcp dpt:443 
    5   284 ACCEPT     tcp  --  *      *       0.0.0.0/0            
91.121.169.122      tcp dpt:22 
    1    44 ACCEPT     tcp  --  *      *       0.0.0.0/0            
91.121.169.122      tcp dpt:21 
   11   564 ACCEPT     tcp  --  *      *       0.0.0.0/0            
91.121.169.122      tcp dpt:25 
    1    44 ACCEPT     tcp  --  *      *       0.0.0.0/0            
91.121.169.122      tcp dpt:143 
    1    44 ACCEPT     tcp  --  *      *       0.0.0.0/0            
91.121.169.122      tcp dpt:993 
    3   174 ACCEPT     udp  --  *      *       0.0.0.0/0            
91.121.42.145       udp dpt:53 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            
91.121.42.145       tcp dpt:53 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            
91.121.42.145       tcp dpt:10022 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            
91.121.46.150       tcp dpt:80 
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            
91.121.46.150       tcp dpt:443 
    1    44 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:79 
   20  1000 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp dpt:1433 
 4046  230K Drop       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        
 3372  148K LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:net2fw:DROP:' 
 3372  148K DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain reject (13 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        ADDRTYPE match src-type BROADCAST 
    0     0 DROP       0    --  *      *       224.0.0.0/4          0.0.0.0/0   
        
    0     0 DROP       2    --  *      *       0.0.0.0/0            0.0.0.0/0   
        
    4   176 REJECT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        reject-with tcp-reset 
    0     0 REJECT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        reject-with icmp-port-unreachable 
    0     0 REJECT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0   
        reject-with icmp-host-unreachable 
    0     0 REJECT     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        reject-with icmp-host-prohibited 

Chain shorewall (0 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain smurfs (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 RETURN     0    --  *      *       0.0.0.0              0.0.0.0/0   
        
    0     0 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        ADDRTYPE match src-type BROADCAST LOG flags 0 level 6 prefix 
`Shorewall:smurfs:DROP:' 
    0     0 DROP       0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        ADDRTYPE match src-type BROADCAST 
    0     0 LOG        0    --  *      *       224.0.0.0/4          0.0.0.0/0   
        LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:' 
    0     0 DROP       0    --  *      *       224.0.0.0/4          0.0.0.0/0   
        

Chain tcpflags (2 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp flags:0x3F/0x29 
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp flags:0x3F/0x00 
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp flags:0x06/0x06 
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp flags:0x03/0x03 
    0     0 logflags   tcp  --  *      *       0.0.0.0/0            0.0.0.0/0   
        tcp spt:0 flags:0x17/0x02 

Log (/var/log/messages)


NAT Table

Chain PREROUTING (policy ACCEPT 4133 packets, 237K bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
 4133  237K LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state NEW LOG flags 0 level 6 prefix `Shorewall:nat:PREROUTING:' 

Chain POSTROUTING (policy ACCEPT 585 packets, 45429 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
  581 45269 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state NEW LOG flags 0 level 6 prefix `Shorewall:nat:POSTROUTING:' 

Chain OUTPUT (policy ACCEPT 581 packets, 45269 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
  581 45269 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state NEW LOG flags 0 level 6 prefix `Shorewall:nat:OUTPUT:' 

Mangle Table

Chain PREROUTING (policy ACCEPT 8901 packets, 801K bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
 4311  249K LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state NEW LOG flags 0 level 6 prefix `Shorewall:mangle:PREROUTING:' 
 8901  801K tcpre      0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain INPUT (policy ACCEPT 8894 packets, 798K bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
 4304  247K LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state NEW LOG flags 0 level 6 prefix `Shorewall:mangle:INPUT:' 

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state NEW LOG flags 0 level 6 prefix `Shorewall:mangle:FORWARD:' 
    0     0 tcfor      0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain OUTPUT (policy ACCEPT 4664 packets, 693K bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
 4664  693K tcout      0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain POSTROUTING (policy ACCEPT 4664 packets, 693K bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
  582 45503 LOG        0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        state NEW LOG flags 0 level 6 prefix `Shorewall:mangle:POSTROUTING:' 
 4664  693K tcpost     0    --  *      *       0.0.0.0/0            0.0.0.0/0   
        

Chain tcfor (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain tcout (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain tcpost (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Chain tcpre (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        

Conntrack Table

tcp      6 351789 ESTABLISHED src=194.167.139.252 dst=91.121.169.122 
sport=53484 dport=80 packets=519 bytes=27401 src=91.121.169.122 
dst=194.167.139.252 sport=80 dport=53484 packets=1233 bytes=1649652 [ASSURED] 
mark=0 use=1
tcp      6 431895 ESTABLISHED src=88.161.152.179 dst=91.121.169.122 sport=1115 
dport=143 packets=312 bytes=20824 src=91.121.169.122 dst=88.161.152.179 
sport=143 dport=1115 packets=310 bytes=160725 [ASSURED] mark=0 use=1
udp      17 34 src=127.0.0.1 dst=127.0.0.1 sport=20787 dport=53 packets=32 
bytes=2435 src=127.0.0.1 dst=127.0.0.1 sport=53 dport=20787 packets=32 
bytes=7175 [ASSURED] mark=0 use=1
tcp      6 431941 ESTABLISHED src=88.161.152.179 dst=91.121.169.122 sport=1125 
dport=993 packets=239 bytes=16726 src=91.121.169.122 dst=88.161.152.179 
sport=993 dport=1125 packets=205 bytes=23277 [ASSURED] mark=0 use=1
tcp      6 431666 ESTABLISHED src=82.238.240.107 dst=91.121.169.122 sport=45736 
dport=143 packets=766 bytes=47591 src=91.121.169.122 dst=82.238.240.107 
sport=143 dport=45736 packets=428 bytes=62390 [ASSURED] mark=0 use=1
tcp      6 19 TIME_WAIT src=91.121.169.122 dst=193.251.214.115 sport=45003 
dport=110 packets=9 bytes=518 src=193.251.214.115 dst=91.121.169.122 sport=110 
dport=45003 packets=12 bytes=742 [ASSURED] mark=0 use=1
tcp      6 431895 ESTABLISHED src=88.161.152.179 dst=91.121.169.122 sport=1113 
dport=993 packets=282 bytes=20029 src=91.121.169.122 dst=88.161.152.179 
sport=993 dport=1113 packets=252 bytes=78673 [ASSURED] mark=0 use=1
tcp      6 431999 ESTABLISHED src=88.161.152.179 dst=91.121.169.122 sport=1120 
dport=22 packets=1328 bytes=94636 src=91.121.169.122 dst=88.161.152.179 
sport=22 dport=1120 packets=1245 bytes=380692 [ASSURED] mark=0 use=2
tcp      6 431894 ESTABLISHED src=88.161.152.179 dst=91.121.169.122 sport=1121 
dport=993 packets=256 bytes=18373 src=91.121.169.122 dst=88.161.152.179 
sport=993 dport=1121 packets=226 bytes=47633 [ASSURED] mark=0 use=1
tcp      6 431895 ESTABLISHED src=88.161.152.179 dst=91.121.169.122 sport=1114 
dport=993 packets=220 bytes=16032 src=91.121.169.122 dst=88.161.152.179 
sport=993 dport=1114 packets=190 bytes=22597 [ASSURED] mark=0 use=1
tcp      6 431966 ESTABLISHED src=79.93.20.15 dst=91.121.169.122 sport=3724 
dport=143 packets=533 bytes=32464 src=91.121.169.122 dst=79.93.20.15 sport=143 
dport=3724 packets=445 bytes=81564 [ASSURED] mark=0 use=1

IP Configuration

1: lo: <LOOPBACK,UP,10000> mtu 16436 qdisc noqueue 
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
2: eth0: <BROADCAST,MULTICAST,UP,10000> mtu 1500 qdisc pfifo_fast qlen 1000
    link/ether 00:1c:c0:65:22:3d brd ff:ff:ff:ff:ff:ff
    inet 91.121.169.122/24 brd 91.121.169.255 scope global eth0
    inet 91.121.42.145/32 brd 91.255.255.255 scope global eth0:0
    inet 91.121.46.150/32 brd 91.255.255.255 scope global eth0:1
    inet 91.121.43.206/32 brd 91.255.255.255 scope global eth0:2
3: dummy0: <BROADCAST,NOARP> mtu 1500 qdisc noop 
    link/ether 06:e6:3f:82:5c:3a brd ff:ff:ff:ff:ff:ff
4: tunl0: <NOARP> mtu 1480 qdisc noop 
    link/ipip 0.0.0.0 brd 0.0.0.0
5: gre0: <NOARP> mtu 1476 qdisc noop 
    link/gre 0.0.0.0 brd 0.0.0.0

IP Stats

1: lo: <LOOPBACK,UP,10000> mtu 16436 qdisc noqueue 
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    RX: bytes  packets  errors  dropped overrun mcast   
    3920178196 14793499 0       0       0       0      
    TX: bytes  packets  errors  dropped carrier collsns 
    3920178196 14793499 0       0       0       0      
2: eth0: <BROADCAST,MULTICAST,UP,10000> mtu 1500 qdisc pfifo_fast qlen 1000
    link/ether 00:1c:c0:65:22:3d brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast   
    1957878769 62426983 0       0       0       3143   
    TX: bytes  packets  errors  dropped carrier collsns 
    344871117  61369037 0       0       0       0      
3: dummy0: <BROADCAST,NOARP> mtu 1500 qdisc noop 
    link/ether 06:e6:3f:82:5c:3a brd ff:ff:ff:ff:ff:ff
    RX: bytes  packets  errors  dropped overrun mcast   
    0          0        0       0       0       0      
    TX: bytes  packets  errors  dropped carrier collsns 
    0          0        0       0       0       0      
4: tunl0: <NOARP> mtu 1480 qdisc noop 
    link/ipip 0.0.0.0 brd 0.0.0.0
    RX: bytes  packets  errors  dropped overrun mcast   
    0          0        0       0       0       0      
    TX: bytes  packets  errors  dropped carrier collsns 
    0          0        0       0       0       0      
5: gre0: <NOARP> mtu 1476 qdisc noop 
    link/gre 0.0.0.0 brd 0.0.0.0
    RX: bytes  packets  errors  dropped overrun mcast   
    0          0        0       0       0       0      
    TX: bytes  packets  errors  dropped carrier collsns 
    0          0        0       0       0       0      

/proc

   /proc/version = Linux version 2.6.24.5-grsec-xxxx-grs-ipv4-32 ([EMAIL 
PROTECTED]) (gcc version 4.1.2 20061115 (prerelease) (Debian 4.1.1-21)) #3 SMP 
Wed May 28 09:09:25 CEST 2008
   /proc/sys/net/ipv4/ip_forward = 0
   /proc/sys/net/ipv4/icmp_echo_ignore_all = 0
   /proc/sys/net/ipv4/conf/all/proxy_arp = 0
   /proc/sys/net/ipv4/conf/all/arp_filter = 0
   /proc/sys/net/ipv4/conf/all/arp_ignore = 0
   /proc/sys/net/ipv4/conf/all/rp_filter = 1
   /proc/sys/net/ipv4/conf/all/log_martians = 0
   /proc/sys/net/ipv4/conf/default/proxy_arp = 0
   /proc/sys/net/ipv4/conf/default/arp_filter = 0
   /proc/sys/net/ipv4/conf/default/arp_ignore = 0
   /proc/sys/net/ipv4/conf/default/rp_filter = 1
   /proc/sys/net/ipv4/conf/default/log_martians = 0
   /proc/sys/net/ipv4/conf/dummy0/proxy_arp = 0
   /proc/sys/net/ipv4/conf/dummy0/arp_filter = 0
   /proc/sys/net/ipv4/conf/dummy0/arp_ignore = 0
   /proc/sys/net/ipv4/conf/dummy0/rp_filter = 1
   /proc/sys/net/ipv4/conf/dummy0/log_martians = 0
   /proc/sys/net/ipv4/conf/eth0/proxy_arp = 0
   /proc/sys/net/ipv4/conf/eth0/arp_filter = 0
   /proc/sys/net/ipv4/conf/eth0/arp_ignore = 0
   /proc/sys/net/ipv4/conf/eth0/rp_filter = 1
   /proc/sys/net/ipv4/conf/eth0/log_martians = 1
   /proc/sys/net/ipv4/conf/gre0/proxy_arp = 0
   /proc/sys/net/ipv4/conf/gre0/arp_filter = 0
   /proc/sys/net/ipv4/conf/gre0/arp_ignore = 0
   /proc/sys/net/ipv4/conf/gre0/rp_filter = 1
   /proc/sys/net/ipv4/conf/gre0/log_martians = 0
   /proc/sys/net/ipv4/conf/lo/proxy_arp = 0
   /proc/sys/net/ipv4/conf/lo/arp_filter = 0
   /proc/sys/net/ipv4/conf/lo/arp_ignore = 0
   /proc/sys/net/ipv4/conf/lo/rp_filter = 1
   /proc/sys/net/ipv4/conf/lo/log_martians = 0
   /proc/sys/net/ipv4/conf/tunl0/proxy_arp = 0
   /proc/sys/net/ipv4/conf/tunl0/arp_filter = 0
   /proc/sys/net/ipv4/conf/tunl0/arp_ignore = 0
   /proc/sys/net/ipv4/conf/tunl0/rp_filter = 1
   /proc/sys/net/ipv4/conf/tunl0/log_martians = 0

Routing Rules

0:      from all lookup 255 
32766:  from all lookup main 
32767:  from all lookup default 

Table 255:

local 91.121.46.150 dev eth0  proto kernel  scope host  src 91.121.46.150 
broadcast 127.255.255.255 dev lo  proto kernel  scope link  src 127.0.0.1 
broadcast 91.121.169.255 dev eth0  proto kernel  scope link  src 91.121.169.122 
local 91.121.43.206 dev eth0  proto kernel  scope host  src 91.121.43.206 
broadcast 91.255.255.255 dev eth0  proto kernel  scope link  src 91.121.42.145 
broadcast 91.255.255.255 dev eth0  proto kernel  scope link  src 91.121.46.150 
broadcast 91.255.255.255 dev eth0  proto kernel  scope link  src 91.121.43.206 
local 91.121.169.122 dev eth0  proto kernel  scope host  src 91.121.169.122 
local 91.121.42.145 dev eth0  proto kernel  scope host  src 91.121.42.145 
broadcast 91.121.169.0 dev eth0  proto kernel  scope link  src 91.121.169.122 
broadcast 127.0.0.0 dev lo  proto kernel  scope link  src 127.0.0.1 
local 127.0.0.1 dev lo  proto kernel  scope host  src 127.0.0.1 
local 127.0.0.0/8 dev lo  proto kernel  scope host  src 127.0.0.1 

Table default:


Table main:

91.121.169.0/24 dev eth0  proto kernel  scope link  src 91.121.169.122 
default via 91.121.169.254 dev eth0 

ARP

? (91.121.169.254) at 00:00:0C:07:AC:01 [ether] on eth0
? (91.121.169.250) at 00:1F:C6:82:75:CA [ether] on eth0

Modules


Shorewall has detected the following iptables/netfilter capabilities:
   NAT: Available
   Packet Mangling: Available
   Multi-port Match: Available
   Extended Multi-port Match: Available
   Connection Tracking Match: Available
   Packet Type Match: Available
   Policy Match: Available
   Physdev Match: Not available
   Physdev-is-bridged Support: Not available
   Packet length Match: Available
   IP range Match: Available
   Recent Match: Available
   Owner Match: Available
   Ipset Match: Not available
   CONNMARK Target: Available
   Extended CONNMARK Target: Available
   Connmark Match: Available
   Extended Connmark Match: Available
   Raw Table: Available
   IPP2P Match: Not available
   CLASSIFY Target: Available
   Extended REJECT: Available
   Repeat match: Available
   MARK Target: Available
   Extended MARK Target: Available
   Mangle FORWARD Chain: Available
   Comments: Available
   Address Type Match: Available
   TCPMSS Match: Available
   Hashlimit Match: Available
   NFQUEUE Target: Available

Traffic Control

Device eth0:
qdisc pfifo_fast 0: root bands 3 priomap  1 2 2 2 1 2 0 0 1 1 1 1 1 1 1 1
 Sent 47589512291 bytes 61369044 pkt (dropped 0, overlimits 0 requeues 8) 
 rate 0bit 0pps backlog 0b 0p requeues 8 


TC Filters

Device eth0:

-------------------------------------------------------------------------
This SF.Net email is sponsored by the Moblin Your Move Developer's challenge
Build the coolest Linux based applications with Moblin SDK & win great prizes
Grand prize is a trip for two to an Open Source event anywhere in the world
http://moblin-contest.org/redirect.php?banner_id=100&url=/
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to