Can't use my console because of logs?
Hi all,
I have Debian on a firewall which until now has only needed SSH
access. Now I need to be able to use a monitor and can't because of
errant logging appearing continuously on the screen.
This is what appears:
Jun 5 15:53:32 enterprise kernel: catch-allIN=ppp0 OUT= MAC=
SRC=64.19.48.6 DST=217.36.12.107 LEN=48 TOS=0x00 PREC=0x00 TTL=109
ID=5038 DF PROTO=TCP SPT=52451 DPT=6347 WINDOW=64240 RES=0x00 SYN
URGP=0 OPT (020405B401010402)
Its a continuous stream of info.
If anyone can tell me what the problem is or where to start looking
I'd be greatful.
My firewall rule-set is attached in case that's the problem.
Thanks.
--
Patrick
"Faced with the choice between changing one's mind and proving that
there is no need to do so, almost everyone gets busy on the proof. "
- John Kenneth Galbraith
#!/bin/sh
# PATH and modules
PATH=/sbin:$PATH; export PATH
modprobe ip_conntrack
modprobe ip_conntrack_ftp
modprobe iptable_nat
# Change to your hostname
hostname=zulfiqar
# Don't touch this
any="0.0.0.0/0.0.0.0"
#Flush things
iptables -F
iptables -F -t nat
iptables -F -t mangle
iptables -X
## Create chain which blocks new connections, except if coming from inside.
iptables -N block
iptables -N DLOG
# Anti-spoofing rule
iptables -A block -m state --state INVALID -j DLOG
# Continuations
iptables -A block -m state --state ESTABLISHED,RELATED -j ACCEPT
# Allow services on lo in entirety - Squirrelmail, etc. need this.
iptables -A block -s 127.0.0.1/32 -i lo -j ACCEPT
# Allow LAN on eth0 in entirety - assuming the Lan consists
# of trusted users only. Otherwise use the Internet rules for
# the LAN with exceptions for your machine.
iptables -A block -s 192.168.0.0/24 -i eth0 -j ACCEPT
# FTP
iptables -A block -p tcp --destination-port 21 -j ACCEPT
# Open ssh port - there are no circumstances in which denying
# yourself ssh access is a good idea.
iptables -A block -p tcp --destination-port 22 -j ACCEPT
# Open httpd port, if you run websites
iptables -A block -p tcp --destination-port 80 -j ACCEPT
# Open imapd port, if you provide IMAP mail service.
iptables -A block -p tcp --destination-port 143 -j ACCEPT
# Open gnutella port - I need this for my URL from gnutella to work
iptables -A block -p tcp --destination-port 6346 -j ACCEPT
# Catch-all
iptables -A block -j DLOG
#The DLOG (drop+log) chain
iptables -A DLOG -j LOG --log-prefix="catch-all" --log-tcp-options \
--log-ip-options
iptables -A DLOG -j DROP
## Jump to that chain from INPUT and FORWARD chains.
iptables -A INPUT -j block
iptables -A FORWARD -j block
## Set up masquerading - sharing my ADSL connection.
iptables -t nat -A POSTROUTING -o ppp0 -j MASQUERADE
## Turn on IP forwarding
echo 1 > /proc/sys/net/ipv4/ip_forward
Reply to: