Advertisement
Guest User

Untitled

a guest
Jun 26th, 2017
127
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 27.23 KB | None | 0 0
  1. localhost dem # shorewall dump
  2.  
  3. Shorewall 4.4.10 Dump at localhost - Thu Nov 11 16:59:26 EET 2010
  4.  
  5. Counters reset Thu Nov 11 16:58:32 EET 2010
  6.  
  7. Chain INPUT (policy DROP 0 packets, 0 bytes)
  8. pkts bytes target prot opt in out source destination
  9. 6 540 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate INVALID,NEW
  10. 7 6004 net2fw all -- wlan0 * 0.0.0.0/0 0.0.0.0/0
  11. 6 540 loc2fw all -- eth0 * 0.0.0.0/0 0.0.0.0/0
  12. 0 0 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
  13. 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
  14. 0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
  15. 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:INPUT:REJECT:'
  16. 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0 [goto]
  17.  
  18. Chain FORWARD (policy DROP 0 packets, 0 bytes)
  19. pkts bytes target prot opt in out source destination
  20. 0 0 dynamic all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate INVALID,NEW
  21. 0 0 net2loc all -- wlan0 eth0 0.0.0.0/0 0.0.0.0/0
  22. 0 0 loc2net all -- eth0 wlan0 0.0.0.0/0 0.0.0.0/0
  23. 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
  24. 0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
  25. 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:FORWARD:REJECT:'
  26. 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0 [goto]
  27.  
  28. Chain OUTPUT (policy DROP 0 packets, 0 bytes)
  29. pkts bytes target prot opt in out source destination
  30. 9 521 fw2net all -- * wlan0 0.0.0.0/0 0.0.0.0/0
  31. 0 0 fw2loc all -- * eth0 0.0.0.0/0 0.0.0.0/0
  32. 0 0 ACCEPT all -- * lo 0.0.0.0/0 0.0.0.0/0
  33. 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
  34. 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
  35.  
  36. Chain Drop (0 references)
  37. pkts bytes target prot opt in out source destination
  38. 0 0 all -- * * 0.0.0.0/0 0.0.0.0/0
  39. 0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:113
  40. 0 0 dropBcast all -- * * 0.0.0.0/0 0.0.0.0/0
  41. 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 3 code 4
  42. 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 11
  43. 0 0 dropInvalid all -- * * 0.0.0.0/0 0.0.0.0/0
  44. 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 multiport dports 135,445
  45. 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpts:137:139
  46. 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:137 dpts:1024:65535
  47. 0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 multiport dports 135,139,445
  48. 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:1900
  49. 0 0 dropNotSyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
  50. 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:53
  51.  
  52. Chain Reject (5 references)
  53. pkts bytes target prot opt in out source destination
  54. 6 540 all -- * * 0.0.0.0/0 0.0.0.0/0
  55. 0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:113
  56. 6 540 dropBcast all -- * * 0.0.0.0/0 0.0.0.0/0
  57. 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 3 code 4
  58. 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 11
  59. 0 0 dropInvalid all -- * * 0.0.0.0/0 0.0.0.0/0
  60. 0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0 multiport dports 135,445
  61. 0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpts:137:139
  62. 0 0 reject udp -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:137 dpts:1024:65535
  63. 0 0 reject tcp -- * * 0.0.0.0/0 0.0.0.0/0 multiport dports 135,139,445
  64. 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:1900
  65. 0 0 dropNotSyn tcp -- * * 0.0.0.0/0 0.0.0.0/0
  66. 0 0 DROP udp -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:53
  67.  
  68. Chain dropBcast (2 references)
  69. pkts bytes target prot opt in out source destination
  70. 6 540 DROP all -- * * 0.0.0.0/0 172.16.255.255
  71. 0 0 DROP all -- * * 0.0.0.0/0 192.168.1.255
  72. 0 0 DROP all -- * * 0.0.0.0/0 255.255.255.255
  73. 0 0 DROP all -- * * 0.0.0.0/0 224.0.0.0/4
  74.  
  75. Chain dropInvalid (2 references)
  76. pkts bytes target prot opt in out source destination
  77. 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
  78.  
  79. Chain dropNotSyn (2 references)
  80. pkts bytes target prot opt in out source destination
  81. 0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:!0x17/0x02
  82.  
  83. Chain dynamic (2 references)
  84. pkts bytes target prot opt in out source destination
  85.  
  86. Chain fw2loc (1 references)
  87. pkts bytes target prot opt in out source destination
  88. 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
  89. 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
  90.  
  91. Chain fw2net (1 references)
  92. pkts bytes target prot opt in out source destination
  93. 0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpts:67:68
  94. 9 521 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
  95. 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
  96.  
  97. Chain loc2fw (1 references)
  98. pkts bytes target prot opt in out source destination
  99. 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
  100. 6 540 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
  101. 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:loc2fw:REJECT:'
  102. 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0 [goto]
  103.  
  104. Chain loc2net (1 references)
  105. pkts bytes target prot opt in out source destination
  106. 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
  107. 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
  108.  
  109. Chain logdrop (0 references)
  110. pkts bytes target prot opt in out source destination
  111. 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
  112.  
  113. Chain logreject (0 references)
  114. pkts bytes target prot opt in out source destination
  115. 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0
  116.  
  117. Chain net2fw (1 references)
  118. pkts bytes target prot opt in out source destination
  119. 0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpts:67:68
  120. 7 6004 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
  121. 0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
  122. 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:net2fw:REJECT:'
  123. 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0 [goto]
  124.  
  125. Chain net2loc (1 references)
  126. pkts bytes target prot opt in out source destination
  127. 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
  128. 0 0 Reject all -- * * 0.0.0.0/0 0.0.0.0/0
  129. 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix `Shorewall:net2loc:REJECT:'
  130. 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0 [goto]
  131.  
  132. Chain reject (12 references)
  133. pkts bytes target prot opt in out source destination
  134. 0 0 DROP all -- * * 0.0.0.0/0 172.16.255.255
  135. 0 0 DROP all -- * * 0.0.0.0/0 192.168.1.255
  136. 0 0 DROP all -- * * 0.0.0.0/0 255.255.255.255
  137. 0 0 DROP all -- * * 224.0.0.0/4 0.0.0.0/0
  138. 0 0 DROP 2 -- * * 0.0.0.0/0 0.0.0.0/0
  139. 0 0 REJECT tcp -- * * 0.0.0.0/0 0.0.0.0/0 reject-with tcp-reset
  140. 0 0 REJECT udp -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
  141. 0 0 REJECT icmp -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-unreachable
  142. 0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
  143.  
  144. Chain shorewall (0 references)
  145. pkts bytes target prot opt in out source destination
  146.  
  147. Log (/var/log/messages)
  148.  
  149. Nov 11 13:37:12 OUTPUT:REJECT:IN= OUT=eth0 SRC=172.16.0.3 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=17388 DF PROTO=TCP SPT=49140 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
  150. Nov 11 13:37:12 OUTPUT:REJECT:IN= OUT=eth0 SRC=172.16.0.3 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=58966 DF PROTO=TCP SPT=49141 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
  151. Nov 11 13:37:12 OUTPUT:REJECT:IN= OUT=eth0 SRC=172.16.0.3 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=39544 DF PROTO=TCP SPT=49142 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
  152. Nov 11 13:37:20 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=16264 DF PROTO=TCP SPT=58096 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
  153. Nov 11 13:37:20 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=59986 DF PROTO=TCP SPT=58097 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
  154. Nov 11 13:37:20 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=209.85.229.101 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=4801 DF PROTO=TCP SPT=55550 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
  155. Nov 11 13:37:20 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=209.85.229.100 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=21338 DF PROTO=TCP SPT=37745 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
  156. Nov 11 13:37:20 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=209.85.229.102 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=41802 DF PROTO=TCP SPT=55590 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
  157. Nov 11 13:37:32 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=20034 DF PROTO=TCP SPT=58101 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
  158. Nov 11 13:37:32 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=27782 DF PROTO=TCP SPT=58102 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
  159. Nov 11 13:37:32 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=46900 DF PROTO=TCP SPT=58103 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
  160. Nov 11 13:37:33 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=64675 DF PROTO=TCP SPT=58104 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
  161. Nov 11 13:37:33 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=16001 DF PROTO=TCP SPT=58105 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
  162. Nov 11 13:37:49 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=53780 DF PROTO=TCP SPT=58106 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
  163. Nov 11 13:37:49 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=34355 DF PROTO=TCP SPT=58107 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
  164. Nov 11 13:37:50 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=21129 DF PROTO=TCP SPT=58108 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
  165. Nov 11 13:37:50 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=60942 DF PROTO=TCP SPT=58109 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
  166. Nov 11 13:38:01 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=53233 DF PROTO=TCP SPT=58110 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
  167. Nov 11 13:38:01 OUTPUT:REJECT:IN= OUT=eth0 SRC=192.168.0.121 DST=192.168.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=58673 DF PROTO=TCP SPT=58111 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
  168. Nov 11 16:41:23 net2fw:REJECT:IN=wlan0 OUT= SRC=192.168.1.1 DST=192.168.1.100 LEN=408 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=UDP SPT=1031 DPT=49796 LEN=388
  169.  
  170. NAT Table
  171.  
  172. Chain PREROUTING (policy ACCEPT 15 packets, 4043 bytes)
  173. pkts bytes target prot opt in out source destination
  174.  
  175. Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
  176. pkts bytes target prot opt in out source destination
  177.  
  178. Chain POSTROUTING (policy ACCEPT 0 packets, 0 bytes)
  179. pkts bytes target prot opt in out source destination
  180. 0 0 wlan0_masq all -- * wlan0 0.0.0.0/0 0.0.0.0/0
  181.  
  182. Chain wlan0_masq (1 references)
  183. pkts bytes target prot opt in out source destination
  184. 0 0 MASQUERADE all -- * * 192.168.0.0/24 0.0.0.0/0
  185.  
  186. Mangle Table
  187.  
  188. Chain PREROUTING (policy ACCEPT 22 packets, 10047 bytes)
  189. pkts bytes target prot opt in out source destination
  190. 22 10047 tcpre all -- * * 0.0.0.0/0 0.0.0.0/0
  191.  
  192. Chain INPUT (policy ACCEPT 13 packets, 6544 bytes)
  193. pkts bytes target prot opt in out source destination
  194.  
  195. Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
  196. pkts bytes target prot opt in out source destination
  197. 0 0 tcfor all -- * * 0.0.0.0/0 0.0.0.0/0
  198.  
  199. Chain OUTPUT (policy ACCEPT 9 packets, 521 bytes)
  200. pkts bytes target prot opt in out source destination
  201. 9 521 tcout all -- * * 0.0.0.0/0 0.0.0.0/0
  202.  
  203. Chain POSTROUTING (policy ACCEPT 9 packets, 521 bytes)
  204. pkts bytes target prot opt in out source destination
  205. 9 521 tcpost all -- * * 0.0.0.0/0 0.0.0.0/0
  206.  
  207. Chain tcfor (1 references)
  208. pkts bytes target prot opt in out source destination
  209.  
  210. Chain tcout (1 references)
  211. pkts bytes target prot opt in out source destination
  212.  
  213. Chain tcpost (1 references)
  214. pkts bytes target prot opt in out source destination
  215.  
  216. Chain tcpre (1 references)
  217. pkts bytes target prot opt in out source destination
  218.  
  219. Conntrack Table (23 out of 65536)
  220.  
  221. tcp 6 424881 ESTABLISHED src=172.16.0.120 dst=66.249.92.104 sport=37702 dport=80 src=66.249.92.104 dst=172.16.0.120 sport=80 dport=37702 [ASSURED] use=2
  222. tcp 6 425171 ESTABLISHED src=172.16.0.120 dst=92.123.73.59 sport=39157 dport=80 src=92.123.73.59 dst=172.16.0.120 sport=80 dport=39157 [ASSURED] use=2
  223. tcp 6 425170 ESTABLISHED src=172.16.0.120 dst=92.123.73.16 sport=51970 dport=80 src=92.123.73.16 dst=172.16.0.120 sport=80 dport=51970 [ASSURED] use=2
  224. tcp 6 425124 ESTABLISHED src=172.16.0.120 dst=209.85.227.16 sport=59831 dport=993 src=209.85.227.16 dst=172.16.0.120 sport=993 dport=59831 [ASSURED] use=2
  225. tcp 6 425170 ESTABLISHED src=172.16.0.120 dst=92.123.73.16 sport=51969 dport=80 src=92.123.73.16 dst=172.16.0.120 sport=80 dport=51969 [ASSURED] use=2
  226. tcp 6 425154 ESTABLISHED src=172.16.0.120 dst=209.85.229.100 sport=37198 dport=80 src=209.85.229.100 dst=172.16.0.120 sport=80 dport=37198 [ASSURED] use=2
  227. tcp 6 425170 ESTABLISHED src=172.16.0.120 dst=92.123.73.16 sport=51967 dport=80 src=92.123.73.16 dst=172.16.0.120 sport=80 dport=51967 [ASSURED] use=2
  228. tcp 6 425170 ESTABLISHED src=172.16.0.120 dst=92.123.73.16 sport=51973 dport=80 src=92.123.73.16 dst=172.16.0.120 sport=80 dport=51973 [ASSURED] use=2
  229. tcp 6 425178 ESTABLISHED src=172.16.0.120 dst=92.123.73.50 sport=33341 dport=80 src=92.123.73.50 dst=172.16.0.120 sport=80 dport=33341 [ASSURED] use=2
  230. tcp 6 431734 ESTABLISHED src=192.168.1.100 dst=74.125.39.102 sport=58525 dport=80 src=74.125.39.102 dst=192.168.1.100 sport=80 dport=58525 [ASSURED] use=2
  231. tcp 6 425287 ESTABLISHED src=172.16.0.120 dst=209.85.227.16 sport=48942 dport=993 src=209.85.227.16 dst=172.16.0.120 sport=993 dport=48942 [ASSURED] use=2
  232. tcp 6 425154 ESTABLISHED src=172.16.0.120 dst=209.85.229.100 sport=37200 dport=80 src=209.85.229.100 dst=172.16.0.120 sport=80 dport=37200 [ASSURED] use=2
  233. tcp 6 425179 ESTABLISHED src=172.16.0.120 dst=92.123.73.16 sport=51968 dport=80 src=92.123.73.16 dst=172.16.0.120 sport=80 dport=51968 [ASSURED] use=2
  234. tcp 6 425153 ESTABLISHED src=172.16.0.120 dst=209.85.229.100 sport=37199 dport=80 src=209.85.229.100 dst=172.16.0.120 sport=80 dport=37199 [ASSURED] use=2
  235. tcp 6 425170 ESTABLISHED src=172.16.0.120 dst=92.123.73.16 sport=51965 dport=80 src=92.123.73.16 dst=172.16.0.120 sport=80 dport=51965 [ASSURED] use=2
  236. tcp 6 425061 ESTABLISHED src=172.16.0.120 dst=209.85.227.16 sport=59816 dport=993 src=209.85.227.16 dst=172.16.0.120 sport=993 dport=59816 [ASSURED] use=2
  237. tcp 6 425155 ESTABLISHED src=172.16.0.120 dst=209.85.229.102 sport=51203 dport=80 src=209.85.229.102 dst=172.16.0.120 sport=80 dport=51203 [ASSURED] use=2
  238. tcp 6 425170 ESTABLISHED src=172.16.0.120 dst=92.123.73.16 sport=51966 dport=80 src=92.123.73.16 dst=172.16.0.120 sport=80 dport=51966 [ASSURED] use=2
  239. tcp 6 431993 ESTABLISHED src=192.168.1.100 dst=213.179.58.83 sport=53158 dport=6667 src=213.179.58.83 dst=192.168.1.100 sport=6667 dport=53158 [ASSURED] use=2
  240. tcp 6 425159 ESTABLISHED src=172.16.0.120 dst=66.249.92.104 sport=37703 dport=80 src=66.249.92.104 dst=172.16.0.120 sport=80 dport=37703 [ASSURED] use=2
  241. tcp 6 425069 ESTABLISHED src=172.16.0.120 dst=209.85.227.16 sport=59818 dport=993 src=209.85.227.16 dst=172.16.0.120 sport=993 dport=59818 [ASSURED] use=2
  242. tcp 6 431706 ESTABLISHED src=192.168.1.100 dst=212.158.173.11 sport=59010 dport=80 src=212.158.173.11 dst=192.168.1.100 sport=80 dport=59010 [ASSURED] use=2
  243. tcp 6 425176 ESTABLISHED src=172.16.0.120 dst=92.123.73.50 sport=33340 dport=80 src=92.123.73.50 dst=172.16.0.120 sport=80 dport=33340 [ASSURED] use=2
  244.  
  245. IP Configuration
  246.  
  247. 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN
  248. inet 127.0.0.1/8 scope host lo
  249. 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP qlen 1000
  250. inet 172.16.0.145/16 brd 172.16.255.255 scope global eth0
  251. 3: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP qlen 1000
  252. inet 192.168.1.100/24 brd 192.168.1.255 scope global wlan0
  253.  
  254. IP Stats
  255.  
  256. 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN
  257. link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
  258. RX: bytes packets errors dropped overrun mcast
  259. 19726 279 0 0 0 0
  260. TX: bytes packets errors dropped carrier collsns
  261. 19726 279 0 0 0 0
  262. 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP qlen 1000
  263. link/ether 00:1d:72:f1:d4:e0 brd ff:ff:ff:ff:ff:ff
  264. RX: bytes packets errors dropped overrun mcast
  265. 3079269 11479 0 0 0 0
  266. TX: bytes packets errors dropped carrier collsns
  267. 1289600 11661 0 0 0 0
  268. 3: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP qlen 1000
  269. link/ether 00:21:6b:11:16:f2 brd ff:ff:ff:ff:ff:ff
  270. RX: bytes packets errors dropped overrun mcast
  271. 46492534 50180 0 0 0 0
  272. TX: bytes packets errors dropped carrier collsns
  273. 5225180 39814 0 0 0 0
  274.  
  275. Bridges
  276.  
  277. bridge name bridge id STP enabled interfaces
  278.  
  279. /proc
  280.  
  281. /proc/version = Linux version 2.6.35-gentoo-r8 (root@localhost) (gcc version 4.4.4 (Gentoo 4.4.4-r2 p1.2, pie-0.4.5) ) #10 SMP PREEMPT Fri Oct 29 13:12:35 EEST 2010
  282. /proc/sys/net/ipv4/ip_forward = 1
  283. /proc/sys/net/ipv4/icmp_echo_ignore_all = 0
  284. /proc/sys/net/ipv4/conf/all/proxy_arp = 0
  285. /proc/sys/net/ipv4/conf/all/arp_filter = 0
  286. /proc/sys/net/ipv4/conf/all/arp_ignore = 0
  287. /proc/sys/net/ipv4/conf/all/rp_filter = 0
  288. /proc/sys/net/ipv4/conf/all/log_martians = 0
  289. /proc/sys/net/ipv4/conf/default/proxy_arp = 0
  290. /proc/sys/net/ipv4/conf/default/arp_filter = 0
  291. /proc/sys/net/ipv4/conf/default/arp_ignore = 0
  292. /proc/sys/net/ipv4/conf/default/rp_filter = 0
  293. /proc/sys/net/ipv4/conf/default/log_martians = 1
  294. /proc/sys/net/ipv4/conf/eth0/proxy_arp = 0
  295. /proc/sys/net/ipv4/conf/eth0/arp_filter = 0
  296. /proc/sys/net/ipv4/conf/eth0/arp_ignore = 0
  297. /proc/sys/net/ipv4/conf/eth0/rp_filter = 0
  298. /proc/sys/net/ipv4/conf/eth0/log_martians = 1
  299. /proc/sys/net/ipv4/conf/lo/proxy_arp = 0
  300. /proc/sys/net/ipv4/conf/lo/arp_filter = 0
  301. /proc/sys/net/ipv4/conf/lo/arp_ignore = 0
  302. /proc/sys/net/ipv4/conf/lo/rp_filter = 0
  303. /proc/sys/net/ipv4/conf/lo/log_martians = 1
  304. /proc/sys/net/ipv4/conf/wlan0/proxy_arp = 0
  305. /proc/sys/net/ipv4/conf/wlan0/arp_filter = 0
  306. /proc/sys/net/ipv4/conf/wlan0/arp_ignore = 0
  307. /proc/sys/net/ipv4/conf/wlan0/rp_filter = 0
  308. /proc/sys/net/ipv4/conf/wlan0/log_martians = 1
  309. RTNETLINK answers: Operation not supported
  310. Dump terminated
  311.  
  312. Routing Table
  313.  
  314. 192.168.1.0/24 dev wlan0 proto kernel scope link src 192.168.1.100 metric 2
  315. 172.16.0.0/16 dev eth0 proto kernel scope link src 172.16.0.145 metric 1
  316. 127.0.0.0/8 via 127.0.0.1 dev lo
  317. default via 192.168.1.1 dev wlan0 proto static
  318.  
  319. ARP
  320.  
  321. ? (192.168.1.1) at 00:21:00:32:d7:e1 [ether] on wlan0
  322.  
  323. Modules
  324.  
  325. iptable_mangle 1208 1
  326. iptable_nat 2979 1
  327. ipt_MASQUERADE 1458 1
  328. nf_conntrack_ipv4 8617 15 iptable_nat,nf_nat
  329. nf_defrag_ipv4 1091 1 nf_conntrack_ipv4
  330. nf_nat 12597 2 ipt_MASQUERADE,iptable_nat
  331.  
  332. Shorewall has detected the following iptables/netfilter capabilities:
  333. NAT: Available
  334. Packet Mangling: Available
  335. Multi-port Match: Available
  336. Extended Multi-port Match: Available
  337. Connection Tracking Match: Available
  338. Extended Connection Tracking Match Support: Available
  339. Packet Type Match: Not available
  340. Policy Match: Not available
  341. Physdev Match: Not available
  342. Physdev-is-bridged Support: Not available
  343. Packet length Match: Not available
  344. IP range Match: Not available
  345. Recent Match: Not available
  346. Owner Match: Not available
  347. Ipset Match: Not available
  348. CONNMARK Target: Not available
  349. Connmark Match: Not available
  350. Raw Table: Not available
  351. IPP2P Match: Not available
  352. CLASSIFY Target: Not available
  353. Extended REJECT: Available
  354. Repeat match: Not available
  355. MARK Target: Not available
  356. Mangle FORWARD Chain: Available
  357. Comments: Not available
  358. Address Type Match: Not available
  359. TCPMSS Match: Not available
  360. Hashlimit Match: Not available
  361. NFQUEUE Target: Not available
  362. Realm Match: Not available
  363. Helper Match: Not available
  364. Connlimit Match: Not available
  365. Time Match: Not available
  366. Goto Support: Available
  367. LOGMARK Target: Not available
  368. IPMARK Target: Not available
  369. LOG Target: Available
  370. Persistent SNAT: Available
  371. TPROXY Target: Not available
  372. FLOW Classifier: Available
  373.  
  374. Active Internet connections (servers and established)
  375. Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
  376. tcp 0 0 0.0.0.0:139 0.0.0.0:* LISTEN 6859/smbd
  377. tcp 0 0 127.0.0.1:631 0.0.0.0:* LISTEN 6638/cupsd
  378. tcp 0 0 0.0.0.0:445 0.0.0.0:* LISTEN 6859/smbd
  379. tcp 0 0 192.168.1.100:53158 213.179.58.83:6667 ESTABLISHED 24428/kvirc4
  380. tcp 0 0 192.168.1.100:59010 212.158.173.11:80 ESTABLISHED 13175/chrome
  381. tcp 0 0 192.168.1.100:58525 74.125.39.102:80 ESTABLISHED 13175/chrome
  382. udp 0 0 172.16.0.145:137 0.0.0.0:* 6864/nmbd
  383. udp 0 0 192.168.1.100:137 0.0.0.0:* 6864/nmbd
  384. udp 0 0 0.0.0.0:137 0.0.0.0:* 6864/nmbd
  385. udp 0 0 172.16.0.145:138 0.0.0.0:* 6864/nmbd
  386. udp 0 0 192.168.1.100:138 0.0.0.0:* 6864/nmbd
  387. udp 0 0 0.0.0.0:138 0.0.0.0:* 6864/nmbd
  388. udp 0 0 0.0.0.0:631 0.0.0.0:* 6638/cupsd
  389.  
  390. Traffic Control
  391.  
  392. RTNETLINK answers: Operation not supported
  393. Dump terminated
  394. RTNETLINK answers: Operation not supported
  395. Dump terminated
  396. RTNETLINK answers: Operation not supported
  397. Dump terminated
  398.  
  399. TC Filters
  400.  
  401. RTNETLINK answers: Operation not supported
  402. Dump terminated
  403. RTNETLINK answers: Operation not supported
  404. Dump terminated
  405. RTNETLINK answers: Operation not supported
  406. Dump terminated
  407. localhost dem #
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement