lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20070409212302.GF2299@csclub.uwaterloo.ca>
Date:	Mon, 9 Apr 2007 17:23:02 -0400
From:	lsorense@...lub.uwaterloo.ca (Lennart Sorensen)
To:	W Agtail <wagtail@....ie>
Cc:	Patrick McHardy <kaber@...sh.net>, netdev@...r.kernel.org
Subject: Re: two gateways with one NIC

On Mon, Apr 09, 2007 at 07:24:07PM +0100, W Agtail wrote:
> Yup, I've been flushing iptables each time. This is what we have atm:
> iptables -n -v -t mangle -L
> 
> Chain PREROUTING (policy ACCEPT 12656 packets, 2518K bytes)
>  pkts bytes target     prot opt in     out     source
> destination
>     0     0 LOG        tcp  --  *      *       0.0.0.0/0
> 0.0.0.0/0           tcp spt:8088 LOG flags 0 level 4 prefix `fwmark 1: '
>     0     0 LOG        tcp  --  *      *       0.0.0.0/0
> 0.0.0.0/0           tcp spt:8089 LOG flags 0 level 4 prefix `fwmark 2: '
>     0     0 MARK       tcp  --  *      *       0.0.0.0/0
> 0.0.0.0/0           tcp spt:8088 MARK set 0x1
>     0     0 MARK       tcp  --  *      *       0.0.0.0/0
> 0.0.0.0/0           tcp spt:8089 MARK set 0x2
>     0     0 LOG        all  --  *      *       0.0.0.0/0
> 0.0.0.0/0           MARK match 0x1 LOG flags 0 level 4 prefix `marked 1:
> '
>     0     0 LOG        all  --  *      *       0.0.0.0/0
> 0.0.0.0/0           MARK match 0x2 LOG flags 0 level 4 prefix `marked 2:
> '
> 
> Chain INPUT (policy ACCEPT 10664 packets, 2438K bytes)
>  pkts bytes target     prot opt in     out     source
> destination
> 
> Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
>  pkts bytes target     prot opt in     out     source
> destination
> 
> Chain OUTPUT (policy ACCEPT 6311 packets, 896K bytes)
>  pkts bytes target     prot opt in     out     source
> destination
> 
> Chain POSTROUTING (policy ACCEPT 6311 packets, 896K bytes)
>  pkts bytes target     prot opt in     out     source
> destination

Odd how the packet count on those mangle table entries is 0.  It seems
like it is never even getting to there.  Do you need a rule in the
output chain telling it to send some packets to the mangle table?  That
doesn't make sense either though.

--
Len Sorensen
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ