[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Can't use my console because of logs?



Hi all,

I have Debian on a firewall which until now has only needed SSH
access.  Now I need to be able to use a monitor and can't because of
errant logging appearing continuously on the screen.

This is what appears:

Jun  5 15:53:32 enterprise kernel: catch-allIN=ppp0 OUT= MAC=
SRC=64.19.48.6 DST=217.36.12.107 LEN=48 TOS=0x00 PREC=0x00 TTL=109
ID=5038 DF PROTO=TCP SPT=52451 DPT=6347 WINDOW=64240 RES=0x00 SYN
URGP=0 OPT (020405B401010402)

Its a continuous stream of info.

If anyone can tell me what the problem is or where to start looking
I'd be greatful.

My firewall rule-set is attached in case that's the problem.

Thanks.

-- 

Patrick

"Faced with the choice between changing one's mind and proving that
there is no need to do so, almost everyone gets busy on the proof. " 
- John Kenneth Galbraith 

#!/bin/sh

# PATH and modules 
PATH=/sbin:$PATH; export PATH

modprobe ip_conntrack
modprobe ip_conntrack_ftp
modprobe iptable_nat

# Change to your hostname
hostname=zulfiqar

# Don't touch this
any="0.0.0.0/0.0.0.0"

#Flush things
iptables -F
iptables -F -t nat
iptables -F -t mangle
iptables -X

## Create chain which blocks new connections, except if coming from inside.
iptables -N block
iptables -N DLOG

# Anti-spoofing rule
iptables -A block -m state --state INVALID -j DLOG

# Continuations
iptables -A block -m state --state ESTABLISHED,RELATED -j ACCEPT

# Allow services on lo in entirety - Squirrelmail, etc. need this.
iptables -A block -s 127.0.0.1/32 -i lo -j ACCEPT

# Allow LAN on eth0 in entirety - assuming the Lan consists
# of trusted users only.  Otherwise use the Internet rules for 
# the LAN with exceptions for your machine.
iptables -A block -s 192.168.0.0/24 -i eth0 -j ACCEPT

# FTP
iptables -A block -p tcp --destination-port 21 -j ACCEPT

# Open ssh port - there are no circumstances in which denying
# yourself ssh access is a good idea.
iptables -A block -p tcp --destination-port 22 -j ACCEPT

# Open httpd port, if you run websites
iptables -A block -p tcp --destination-port 80 -j ACCEPT

# Open imapd port, if you provide IMAP mail service.
iptables -A block -p tcp --destination-port 143 -j ACCEPT

# Open gnutella port - I need this for my URL from gnutella to work
iptables -A block -p tcp --destination-port 6346 -j ACCEPT

# Catch-all
iptables -A block -j DLOG

#The DLOG (drop+log) chain
iptables -A DLOG -j LOG --log-prefix="catch-all" --log-tcp-options \
         --log-ip-options

iptables -A DLOG -j DROP

## Jump to that chain from INPUT and FORWARD chains.
iptables -A INPUT -j block
iptables -A FORWARD -j block

## Set up masquerading - sharing my ADSL connection.
iptables -t nat -A POSTROUTING -o ppp0 -j MASQUERADE

## Turn on IP forwarding
echo 1 > /proc/sys/net/ipv4/ip_forward



Reply to: