par tomtom » 27 Mai 2003 18:22
<!-- BBCode Quote Start --><TABLE BORDER=0 ALIGN=CENTER WIDTH=85%><TR><TD><font size=-2>En réponse à:</font><HR></TD></TR><TR><TD><FONT SIZE=-2><BLOCKQUOTE>
<BR>Le 2003-05-27 18:07, zedd75 a écrit:
<BR>et hop !
<BR>
<BR>Chain INPUT (policy DROP)
<BR>target prot opt source destination
<BR>PSCAN tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,PSH,ACK,URG/FIN,SYN,RST,PSH,ACK,URG
<BR>PSCAN tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,PSH,ACK,URG/NONE
<BR> tcp -- anywhere anywhere tcp flags:SYN,RST,ACK/SYN limit: avg 10/sec burst 5
<BR>CUSTOMINPUT all -- anywhere anywhere
<BR>ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED
<BR>ACCEPT all -- anywhere anywhere
<BR>ACCEPT icmp -- anywhere anywhere
<BR>ACCEPT all -- anywhere anywhere
<BR>ACCEPT all -- anywhere anywhere
<BR>RED all -- anywhere anywhere
<BR>XTACCESS all -- anywhere anywhere
<BR>LOG all -- anywhere anywhere limit: avg 10/min burst 5 LOG level warning prefix `INPUT '
<BR>
<BR>Chain FORWARD (policy DROP)
<BR>target prot opt source destination
<BR>PSCAN tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,PSH,ACK,URG/FIN,SYN,RST,PSH,ACK,URG
<BR>PSCAN tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,PSH,ACK,URG/NONE
<BR>CUSTOMFORWARD all -- anywhere anywhere
<BR>ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED
<BR>ACCEPT all -- anywhere anywhere
<BR>ACCEPT all -- anywhere anywhere
<BR>PORTFWACCESS all -- anywhere anywhere
<BR>DMZHOLES all -- anywhere anywhere
<BR>LOG all -- anywhere anywhere limit: avg 10/min burst 5 LOG level warning prefix `OUTPUT '
<BR>
<BR>Chain OUTPUT (policy ACCEPT)
<BR>target prot opt source destination
<BR>
<BR>Chain CUSTOMFORWARD (1 references)
<BR>target prot opt source destination
<BR>
<BR>Chain CUSTOMINPUT (1 references)
<BR>target prot opt source destination
<BR>
<BR>Chain DMZHOLES (1 references)
<BR>target prot opt source destination
<BR>
<BR>Chain PORTFWACCESS (1 references)
<BR>target prot opt source destination
<BR>
<BR>Chain PSCAN (4 references)
<BR>target prot opt source destination
<BR>LOG tcp -- anywhere anywhere limit: avg 10/min burst 5 LOG level warning prefix `TCP Scan? '
<BR>LOG udp -- anywhere anywhere limit: avg 10/min burst 5 LOG level warning prefix `UDP Scan? '
<BR>LOG icmp -- anywhere anywhere limit: avg 10/min burst 5 LOG level warning prefix `ICMP Scan? '
<BR>LOG all -f anywhere anywhere limit: avg 10/min burst 5 LOG level warning prefix `FRAG Scan? '
<BR>DROP all -- anywhere anywhere
<BR>
<BR>Chain RED (1 references)
<BR>target prot opt source destination
<BR>
<BR>Chain XTACCESS (1 references)
<BR>target prot opt source destination
<BR>
<BR></BLOCKQUOTE></FONT></TD></TR><TR><TD><HR></TD></TR></TABLE><!-- BBCode Quote End -->
<BR>
<BR>Bon, tout à l'air à peu près normal..
<BR>Il faudrait verifier le MASQUERADING :
<BR>
<BR>iptables -t nat -L
<BR>
<BR>En plus, on ne voit rien avec ces saletés de règles à la ******
<BR>
<BR>Il faudrait que tu m'envoies ton rc.firewall stp !
<BR>(ou son equivalent, je ne sais plus exactement....)
<BR>
<BR>
<BR>Tom
One hundred thousand lemmings can't be wrong...