[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <Pine.LNX.4.64.0803300018020.21317@ask.diku.dk>
Date: Sun, 30 Mar 2008 00:22:00 +0100 (CET)
From: Jesper Dangaard Brouer <hawk@...u.dk>
To: Don Harter <donharter@...cast.net>
Cc: harterc1@...cast.net, netdev <netdev@...r.kernel.org>
Subject: Re: [Bugme-new] [Bug 10350] New: SYN flooding crashed the kernel?
(not bug related, move along...)
On Fri, 28 Mar 2008, Don Harter wrote:
> My iptables config is partly:
> root:~>iptables -L
> Chain INPUT (policy DROP)
> target prot opt source destination
> ACCEPT all -- anywhere anywhere
> ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED
> input_ext all -- anywhere anywhere
> input_ext all -- anywhere anywhere
> LOG all -- anywhere anywhere limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-IN-ILL-TARGET '
> DROP all -- anywhere anywhere
>
> This is generated by the Susefirewall2. I thought I understood iptables but
> it seems that he first statement accepts all traffic and none of the others
> get executed. I took that statement out once and my web browser stopped
> functioning. I wasn't running apparmor and perhaps that plays a role
> somewhere. I may reboot and try to run the kernel as what suse calls
> "failsafe".
You need to add "-v" to the iptables command, then you will probably see
that the rules make sense, as you will be able to see the in and out
interfaces.
iptables -vL
Hilsen
Jesper Brouer
--
-------------------------------------------------------------------
MSc. Master of Computer Science
Dept. of Computer Science, University of Copenhagen
Author of http://www.adsl-optimizer.dk
-------------------------------------------------------------------
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists