On 5/7/13 5:27 PM, [email protected] wrote: > On Tuesday, May 07, 2013 05:15:09 PM Tom Eastep wrote: >>> Chain INPUT (policy DROP 0 packets, 0 bytes) >>> pkts bytes target prot opt in out source >>> destination >>> 104 10002 ACCEPT all -- * * 0.0.0.0/0 >>> 0.0.0.0/0 ctstate RELATED,ESTABLISHED >>> >>> Chain FORWARD (policy DROP 0 packets, 0 bytes) >>> pkts bytes target prot opt in out source >>> destination >>> 0 0 ACCEPT all -- * * 0.0.0.0/0 >>> 0.0.0.0/0 ctstate RELATED,ESTABLISHED >>> >>> Chain OUTPUT (policy DROP 0 packets, 0 bytes) >>> pkts bytes target prot opt in out source >>> destination >>> 98 6364 ACCEPT all -- * * 0.0.0.0/0 >>> 0.0.0.0/0 ctstate RELATED,ESTABLISHED >>> >> >> Impossible to tell -- if eth0 is your net interface, then *you* are >> allowing traffic from that interface in /etc/shorewall/routestopped or >> /etc/shorewall/stoppedrules. If it is an internal interface, then your >> firewall is safe from new connections. > > These specifically, look to me like everything is open. > > wlan0 is internet-connected.
Then your firewall was *NOT* open from the net. -Tom -- Tom Eastep \ When I die, I want to go like my Grandfather who Shoreline, \ died peacefully in his sleep. Not screaming like Washington, USA \ all of the passengers in his car http://shorewall.net \________________________________________________
signature.asc
Description: OpenPGP digital signature
------------------------------------------------------------------------------ Learn Graph Databases - Download FREE O'Reilly Book "Graph Databases" is the definitive new guide to graph databases and their applications. This 200-page book is written by three acclaimed leaders in the field. The early access version is available now. Download your free book today! http://p.sf.net/sfu/neotech_d2d_may
_______________________________________________ Shorewall-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/shorewall-users
