View previous topic :: View next topic |
Author |
Message |
L1nux Tux's lil' helper
Joined: 06 Jan 2004 Posts: 143
|
Posted: Fri Oct 08, 2004 8:34 pm Post subject: gentoo <--> win98 problem |
|
|
Hi there, i am trying to have a small LAN, my configuration is
Gentoo with ip 192.168.0.2
Win98 with ip 192.168.0.3
The problem is, when i ping from gentoo to win98 i got response, but when pinging from win98 to gentoo i have no response,
What is the problem?? |
|
Back to top |
|
|
AllTom Tux's lil' helper
Joined: 26 Nov 2003 Posts: 147 Location: Wherever danger lies...
|
Posted: Fri Oct 08, 2004 9:21 pm Post subject: Re: gentoo <--> win98 problem |
|
|
L1nux wrote: | The problem is, when i ping from gentoo to win98 i got response, but when pinging from win98 to gentoo i have no response,
What is the problem?? |
Do you have any firewall or packet filtering set up on the Gentoo machine? _________________ rtylershaw: "My computer doesn't even work and I love this distro. Weird." |
|
Back to top |
|
|
inode77 Veteran
Joined: 20 Jan 2004 Posts: 1303 Location: Heart of Europe
|
Posted: Fri Oct 08, 2004 9:21 pm Post subject: |
|
|
Do you use a iptables firewall that blocks icmp message type 0 packets?
Check with "iptables -L -v -n" as root.
If that's not the case, start ethereal on your gentoo box and check if the packets are correctly recieved by your box. |
|
Back to top |
|
|
L1nux Tux's lil' helper
Joined: 06 Jan 2004 Posts: 143
|
Posted: Sat Oct 09, 2004 6:22 am Post subject: |
|
|
Well, I start up the iptable with the following script:
Code: |
iptables -t nat -F
iptables -A FORWARD -i ppp0 -o eth0 -m state --state ESTABLISHED,RELATED -j ACCEPT
iptables -A FORWARD -i eth0 -o ppp0 -j ACCEPT
iptables -A FORWARD -j LOG
iptables -t nat -A POSTROUTING -o ppp0 -j MASQUERADE
|
when i tried the
i have the following output:
Code: |
Chain INPUT (policy DROP 9538 packets, 743K bytes)
pkts bytes target prot opt in out source destination
0 0 DROP all -- ppp0 * 10.0.0.0/8 0.0.0.0/0
0 0 DROP all -- ppp0 * 0.0.0.0/0 10.0.0.0/8
0 0 DROP all -- ppp0 * 172.16.0.0/16 0.0.0.0/0
0 0 DROP all -- ppp0 * 0.0.0.0/0 172.16.0.0/16
0 0 DROP all -- ppp0 * 192.168.0.0/16 0.0.0.0/0
0 0 DROP all -- ppp0 * 0.0.0.0/0 192.168.0.0/16
0 0 syn-flood_INT_IF tcp -- eth0 * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x17/0x04
24 960 syn-flood_EXT_IF tcp -- ppp0 * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x17/0x04
0 0 DROP tcp -- eth0 * 0.0.0.0/0 0.0.0.0/0 tcp flags:!0x16/0x02 state NEW
6 340 DROP tcp -- ppp0 * 0.0.0.0/0 0.0.0.0/0 tcp flags:!0x16/0x02 state NEW
0 0 LOG all -f eth0 * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4 prefix `IPTABLES FRAGMENTS eth0: '
0 0 DROP all -f eth0 * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -f ppp0 * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4 prefix `IPTABLES FRAGMENTS ppp0: '
0 0 DROP all -f ppp0 * 0.0.0.0/0 0.0.0.0/0
0 0 DROP all -- ppp0 * 0.0.0.0/0 192.168.0.0/24
0 0 LOG tcp -- eth0 * 0.0.0.0/0 0.0.0.0/0 multiport dports 12345,12346,1524,27665,31337 LOG flags 0 level 4 prefix `IPTABLES Trojan INT_IF: '
0 0 LOG udp -- eth0 * 0.0.0.0/0 0.0.0.0/0 multiport dports 12345,12346,27444,31335,31337 LOG flags 0 level 4 prefix `IPTABLES Trojan INT_IF: '
0 0 DROP tcp -- eth0 * 0.0.0.0/0 0.0.0.0/0 multiport dports 12345,12346,1524,27665,31337
0 0 DROP udp -- eth0 * 0.0.0.0/0 0.0.0.0/0 multiport dports 12345,12346,27444,31335,31337
0 0 LOG tcp -- ppp0 * 0.0.0.0/0 0.0.0.0/0 multiport dports 12345,12346,1524,27665,31337 LOG flags 0 level 4 prefix `IPTABLES Trojan EXT_IF: '
0 0 LOG udp -- ppp0 * 0.0.0.0/0 0.0.0.0/0 multiport dports 12345,12346,27444,31335,31337 LOG flags 0 level 4 prefix `IPTABLES Trojan EXT_IF: '
0 0 DROP tcp -- ppp0 * 0.0.0.0/0 0.0.0.0/0 multiport dports 12345,12346,1524,27665,31337
0 0 DROP udp -- ppp0 * 0.0.0.0/0 0.0.0.0/0 multiport dports 12345,12346,27444,31335,31337
2 168 ACCEPT icmp -- eth0 * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
0 0 ACCEPT icmp -- ppp0 * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
110 14303 ACCEPT udp -- ppp0 * 217.29.240.1 0.0.0.0/0 state ESTABLISHED
0 0 ACCEPT udp -- ppp0 * 217.29.240.1 0.0.0.0/0 state ESTABLISHED
5789 6804K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
0 0 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0 state NEW,RELATED,ESTABLISHED
0 0 ACCEPT tcp -- eth0 * 0.0.0.0/0 0.0.0.0/0 state NEW,ESTABLISHED multiport dports 22,80
0 0 ACCEPT tcp -- ppp0 * 0.0.0.0/0 0.0.0.0/0 state NEW,ESTABLISHED multiport dports 80
0 0 ACCEPT tcp -- ppp0 * 0.0.0.0/0 0.0.0.0/0 tcp spt:20 state NEW,RELATED,ESTABLISHED
0 0 ACCEPT tcp -- ppp0 * 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:65535 dpts:1024:65535 state ESTABLISHED
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 ACCEPT icmp -- eth0 ppp0 0.0.0.0/0 0.0.0.0/0 state NEW,ESTABLISHED
7110 446K ACCEPT udp -- eth0 ppp0 0.0.0.0/0 217.29.240.1 state NEW,ESTABLISHED udp dpt:53
0 0 ACCEPT udp -- eth0 ppp0 0.0.0.0/0 217.29.240.1 state NEW,ESTABLISHED udp dpt:53
0 0 ACCEPT tcp -- eth0 ppp0 0.0.0.0/0 0.0.0.0/0 state NEW,ESTABLISHED multiport dports 20,21,22,23,25,79,80,81,110,119
0 0 ACCEPT udp -- eth0 ppp0 0.0.0.0/0 0.0.0.0/0 state NEW,ESTABLISHED multiport dports 20,21,22,23,25,79,80,81,110,119
0 0 ACCEPT tcp -- eth0 ppp0 0.0.0.0/0 0.0.0.0/0 state NEW,ESTABLISHED multiport dports 194,443
0 0 ACCEPT udp -- eth0 ppp0 0.0.0.0/0 0.0.0.0/0 state NEW,ESTABLISHED multiport dports 194,443
0 0 ACCEPT tcp -- eth0 ppp0 0.0.0.0/0 0.0.0.0/0 tcp dpt:20 state ESTABLISHED
0 0 ACCEPT tcp -- eth0 ppp0 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:65535 dpts:1024:65535 state RELATED,ESTABLISHED
0 0 ACCEPT all -- ppp0 eth0 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
0 0 ACCEPT all -- ppp0 eth0 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
220K 11M ACCEPT all -- eth0 ppp0 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4
0 0 ACCEPT all -- ppp0 eth0 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
0 0 ACCEPT all -- eth0 ppp0 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4
0 0 ACCEPT all -- ppp0 eth0 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
0 0 ACCEPT all -- eth0 ppp0 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4
0 0 ACCEPT all -- ppp0 eth0 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
0 0 ACCEPT all -- eth0 ppp0 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4
0 0 ACCEPT all -- ppp0 eth0 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
0 0 ACCEPT all -- eth0 ppp0 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4
0 0 ACCEPT all -- eth0 ppp0 0.0.0.0/0 0.0.0.0/0 state NEW,ESTABLISHED
Chain OUTPUT (policy DROP 7562 packets, 592K bytes)
pkts bytes target prot opt in out source destination
0 0 DROP all -- * ppp0 10.0.0.0/8 0.0.0.0/0
0 0 DROP all -- * ppp0 0.0.0.0/0 10.0.0.0/8
0 0 DROP all -- * ppp0 172.16.0.0/16 0.0.0.0/0
0 0 DROP all -- * ppp0 0.0.0.0/0 172.16.0.0/16
0 0 DROP all -- * ppp0 192.168.0.0/16 0.0.0.0/0
0 0 DROP all -- * ppp0 0.0.0.0/0 192.168.0.0/16
12 928 ACCEPT icmp -- * eth0 0.0.0.0/0 0.0.0.0/0 state NEW,RELATED,ESTABLISHED
4 405 ACCEPT icmp -- * ppp0 0.0.0.0/0 0.0.0.0/0 state NEW,RELATED,ESTABLISHED
112 7190 ACCEPT udp -- * ppp0 0.0.0.0/0 217.29.240.1 state NEW,ESTABLISHED udp dpt:53
0 0 ACCEPT udp -- * ppp0 0.0.0.0/0 217.29.240.1 state NEW,ESTABLISHED udp dpt:53
5213 630K ACCEPT all -- * ppp0 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
0 0 ACCEPT all -- * lo 0.0.0.0/0 0.0.0.0/0 state NEW,RELATED,ESTABLISHED
0 0 ACCEPT tcp -- * eth0 0.0.0.0/0 0.0.0.0/0 state NEW,ESTABLISHED multiport sports 22,80
0 0 ACCEPT tcp -- * ppp0 0.0.0.0/0 0.0.0.0/0 state NEW,ESTABLISHED multiport sports 80
0 0 ACCEPT tcp -- * eth0 0.0.0.0/0 0.0.0.0/0 state NEW,ESTABLISHED multiport dports 22,80
256 15360 ACCEPT tcp -- * ppp0 0.0.0.0/0 0.0.0.0/0 state NEW,ESTABLISHED multiport dports 21,22,80,119
0 0 ACCEPT tcp -- * ppp0 0.0.0.0/0 0.0.0.0/0 tcp dpt:20 state NEW,RELATED,ESTABLISHED
0 0 ACCEPT tcp -- * ppp0 0.0.0.0/0 0.0.0.0/0 tcp spts:1024:65535 dpts:1024:65535 state RELATED,ESTABLISHED
Chain syn-flood_EXT_IF (1 references)
pkts bytes target prot opt in out source destination
23 920 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 4
1 40 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain syn-flood_INT_IF (1 references)
pkts bytes target prot opt in out source destination
0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 1/sec burst 4
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
|
wishes this help,, |
|
Back to top |
|
|
inode77 Veteran
Joined: 20 Jan 2004 Posts: 1303 Location: Heart of Europe
|
Posted: Sat Oct 09, 2004 10:15 am Post subject: |
|
|
I'm still a little but try to add temporary the following rule into your iptables ruleset. Code: | iptables -I INPUT 1 -i eth0 -p icmp --icmp-type echo-request -m state --state NEW -s 192.168.0.3/32 -j ACCEPT |
This rule should allow your gentoo box to let in icmp type 0 requests from the win98 box. |
|
Back to top |
|
|
|
|
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
|