On Tuesday, May 07, 2013 05:15:09 PM Tom Eastep wrote:
> > Chain INPUT (policy DROP 0 packets, 0 bytes)
> > pkts bytes target prot opt in out source
> > destination
> > 104 10002 ACCEPT all -- * * 0.0.0.0/0
> > 0.0.0.0/0 ctstate RELATED,ESTABLISHED
> >
> > Chain FORWARD (policy DROP 0 packets, 0 bytes)
> > pkts bytes target prot opt in out source
> > destination
> > 0 0 ACCEPT all -- * * 0.0.0.0/0
> > 0.0.0.0/0 ctstate RELATED,ESTABLISHED
> >
> > Chain OUTPUT (policy DROP 0 packets, 0 bytes)
> > pkts bytes target prot opt in out source
> > destination
> > 98 6364 ACCEPT all -- * * 0.0.0.0/0
> > 0.0.0.0/0 ctstate RELATED,ESTABLISHED
> >
>
> Impossible to tell -- if eth0 is your net interface, then *you* are
> allowing traffic from that interface in /etc/shorewall/routestopped or
> /etc/shorewall/stoppedrules. If it is an internal interface, then your
> firewall is safe from new connections.
These specifically, look to me like everything is open.
wlan0 is internet-connected.
------------------------------------------------------------------------------
Learn Graph Databases - Download FREE O'Reilly Book
"Graph Databases" is the definitive new guide to graph databases and
their applications. This 200-page book is written by three acclaimed
leaders in the field. The early access version is available now.
Download your free book today! http://p.sf.net/sfu/neotech_d2d_may
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users