IPCop free degroupé RFC1483

Forum traitant de la distribution sécurisée montante nommée IP cop et basée sur la distribution Smoothwall. C'est à l'heure actuelle le forum le plus actif du site.

Modérateur: modos Ixus

Messagepar zedd75 » 27 Mai 2003 17:51

Yo atous, <BR> <BR>Gesp a fait du super boulot, <BR> <BR>mais apparemment on manque de retour pour les gens utilisant free degroupe sur un sagem usb. <BR> <BR>Je redonne ma config : <BR>Celeron433, 256Mo, 5Go DD (c'est une install temporaire) <BR> <BR>REd : <BR>Sagem Fast 800, RFC1483, Routed_IP_VC, DHCP <BR>avec l'option ip statique de chez free, qui doit etre en fait une reservation de bail infinie... <BR> <BR>Green : <BR>DLink 530TX <BR>Pas de dhcp, ipstatiques sur le spostes clients <BR>IP des DNS directement dans /etc/resolv.conf <BR> <BR>Proxy Web activé <BR>Snort desactivé <BR>DHCP desactivé <BR> <BR>proxyDNS activé <BR>CRON Activé <BR>SSH Activé <BR> <BR>Mon probleme : <BR>sans le proxy web, je n'ai aucun acces internet <BR> <BR>avec proxy web, je n'ai que le web...rien en email, ftp et autres... <BR> <BR>Mais ou est mon probleme ? <BR> <BR>Edd <IMG SRC="images/smiles/icon_bawling.gif">
Avatar de l’utilisateur
zedd75
Premier-Maître
Premier-Maître
 
Messages: 68
Inscrit le: 14 Mai 2003 00:00

Messagepar Gesp » 27 Mai 2003 18:03

Je ne pense pas que le problème vienne de mes modifs. J'ai repris exactement la même manière que pour le modem ECI USB. Mais je pense que cela n'a été testé par personne. <BR> <BR>Il faudrait regarder les règles iptable je pense. Pour moi, c'est encore un peu du chinois, j'ai pas encore joué à ce truc là mais tomtom va bien passer par ici pour te dire quoi regarder. <BR>un petit iptable --help te donnera déjà le mode d'emploi. <BR> <BR>une petite recherche sur le forum devrait permettre de retrouver pas mal d'explications aussi. <BR> <BR>Sinon je vais poser la question ce soir sur la devel-list d'IPCOP si quelqu'un a déjà utilisé dhcpcd ou IP fixe.<BR><BR><font size=-2></font>
Avatar de l’utilisateur
Gesp
Amiral
Amiral
 
Messages: 4481
Inscrit le: 29 Déc 2002 01:00

Messagepar zedd75 » 27 Mai 2003 18:07

et hop ! <BR> <BR>Chain INPUT (policy DROP) <BR>target prot opt source destination <BR>PSCAN tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,PSH,ACK,URG/FIN,SYN,RST,PSH,ACK,URG <BR>PSCAN tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,PSH,ACK,URG/NONE <BR> tcp -- anywhere anywhere tcp flags:SYN,RST,ACK/SYN limit: avg 10/sec burst 5 <BR>CUSTOMINPUT all -- anywhere anywhere <BR>ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED <BR>ACCEPT all -- anywhere anywhere <BR>ACCEPT icmp -- anywhere anywhere <BR>ACCEPT all -- anywhere anywhere <BR>ACCEPT all -- anywhere anywhere <BR>RED all -- anywhere anywhere <BR>XTACCESS all -- anywhere anywhere <BR>LOG all -- anywhere anywhere limit: avg 10/min burst 5 LOG level warning prefix `INPUT ' <BR> <BR>Chain FORWARD (policy DROP) <BR>target prot opt source destination <BR>PSCAN tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,PSH,ACK,URG/FIN,SYN,RST,PSH,ACK,URG <BR>PSCAN tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,PSH,ACK,URG/NONE <BR>CUSTOMFORWARD all -- anywhere anywhere <BR>ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED <BR>ACCEPT all -- anywhere anywhere <BR>ACCEPT all -- anywhere anywhere <BR>PORTFWACCESS all -- anywhere anywhere <BR>DMZHOLES all -- anywhere anywhere <BR>LOG all -- anywhere anywhere limit: avg 10/min burst 5 LOG level warning prefix `OUTPUT ' <BR> <BR>Chain OUTPUT (policy ACCEPT) <BR>target prot opt source destination <BR> <BR>Chain CUSTOMFORWARD (1 references) <BR>target prot opt source destination <BR> <BR>Chain CUSTOMINPUT (1 references) <BR>target prot opt source destination <BR> <BR>Chain DMZHOLES (1 references) <BR>target prot opt source destination <BR> <BR>Chain PORTFWACCESS (1 references) <BR>target prot opt source destination <BR> <BR>Chain PSCAN (4 references) <BR>target prot opt source destination <BR>LOG tcp -- anywhere anywhere limit: avg 10/min burst 5 LOG level warning prefix `TCP Scan? ' <BR>LOG udp -- anywhere anywhere limit: avg 10/min burst 5 LOG level warning prefix `UDP Scan? ' <BR>LOG icmp -- anywhere anywhere limit: avg 10/min burst 5 LOG level warning prefix `ICMP Scan? ' <BR>LOG all -f anywhere anywhere limit: avg 10/min burst 5 LOG level warning prefix `FRAG Scan? ' <BR>DROP all -- anywhere anywhere <BR> <BR>Chain RED (1 references) <BR>target prot opt source destination <BR> <BR>Chain XTACCESS (1 references) <BR>target prot opt source destination <BR>
Avatar de l’utilisateur
zedd75
Premier-Maître
Premier-Maître
 
Messages: 68
Inscrit le: 14 Mai 2003 00:00

Messagepar tomtom » 27 Mai 2003 18:22

<!-- BBCode Quote Start --><TABLE BORDER=0 ALIGN=CENTER WIDTH=85%><TR><TD><font size=-2>En réponse à:</font><HR></TD></TR><TR><TD><FONT SIZE=-2><BLOCKQUOTE> <BR>Le 2003-05-27 18:07, zedd75 a écrit: <BR>et hop ! <BR> <BR>Chain INPUT (policy DROP) <BR>target prot opt source destination <BR>PSCAN tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,PSH,ACK,URG/FIN,SYN,RST,PSH,ACK,URG <BR>PSCAN tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,PSH,ACK,URG/NONE <BR> tcp -- anywhere anywhere tcp flags:SYN,RST,ACK/SYN limit: avg 10/sec burst 5 <BR>CUSTOMINPUT all -- anywhere anywhere <BR>ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED <BR>ACCEPT all -- anywhere anywhere <BR>ACCEPT icmp -- anywhere anywhere <BR>ACCEPT all -- anywhere anywhere <BR>ACCEPT all -- anywhere anywhere <BR>RED all -- anywhere anywhere <BR>XTACCESS all -- anywhere anywhere <BR>LOG all -- anywhere anywhere limit: avg 10/min burst 5 LOG level warning prefix `INPUT ' <BR> <BR>Chain FORWARD (policy DROP) <BR>target prot opt source destination <BR>PSCAN tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,PSH,ACK,URG/FIN,SYN,RST,PSH,ACK,URG <BR>PSCAN tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,PSH,ACK,URG/NONE <BR>CUSTOMFORWARD all -- anywhere anywhere <BR>ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED <BR>ACCEPT all -- anywhere anywhere <BR>ACCEPT all -- anywhere anywhere <BR>PORTFWACCESS all -- anywhere anywhere <BR>DMZHOLES all -- anywhere anywhere <BR>LOG all -- anywhere anywhere limit: avg 10/min burst 5 LOG level warning prefix `OUTPUT ' <BR> <BR>Chain OUTPUT (policy ACCEPT) <BR>target prot opt source destination <BR> <BR>Chain CUSTOMFORWARD (1 references) <BR>target prot opt source destination <BR> <BR>Chain CUSTOMINPUT (1 references) <BR>target prot opt source destination <BR> <BR>Chain DMZHOLES (1 references) <BR>target prot opt source destination <BR> <BR>Chain PORTFWACCESS (1 references) <BR>target prot opt source destination <BR> <BR>Chain PSCAN (4 references) <BR>target prot opt source destination <BR>LOG tcp -- anywhere anywhere limit: avg 10/min burst 5 LOG level warning prefix `TCP Scan? ' <BR>LOG udp -- anywhere anywhere limit: avg 10/min burst 5 LOG level warning prefix `UDP Scan? ' <BR>LOG icmp -- anywhere anywhere limit: avg 10/min burst 5 LOG level warning prefix `ICMP Scan? ' <BR>LOG all -f anywhere anywhere limit: avg 10/min burst 5 LOG level warning prefix `FRAG Scan? ' <BR>DROP all -- anywhere anywhere <BR> <BR>Chain RED (1 references) <BR>target prot opt source destination <BR> <BR>Chain XTACCESS (1 references) <BR>target prot opt source destination <BR> <BR></BLOCKQUOTE></FONT></TD></TR><TR><TD><HR></TD></TR></TABLE><!-- BBCode Quote End --> <BR> <BR>Bon, tout à l'air à peu près normal.. <BR>Il faudrait verifier le MASQUERADING : <BR> <BR>iptables -t nat -L <BR> <BR>En plus, on ne voit rien avec ces saletés de règles à la ****** <BR> <BR>Il faudrait que tu m'envoies ton rc.firewall stp ! <BR>(ou son equivalent, je ne sais plus exactement....) <BR> <BR> <BR>Tom
One hundred thousand lemmings can't be wrong...
Avatar de l’utilisateur
tomtom
Amiral
Amiral
 
Messages: 6035
Inscrit le: 26 Avr 2002 00:00
Localisation: Paris

Messagepar zedd75 » 27 Mai 2003 18:27

# iptables -t nat -L <BR> <BR>Chain PREROUTING (policy ACCEPT) <BR>target prot opt source destination <BR>CUSTOMPREROUTING all -- anywhere anywhere <BR>SQUID all -- anywhere anywhere <BR>PORTFW all -- anywhere anywhere <BR> <BR>Chain POSTROUTING (policy ACCEPT) <BR>target prot opt source destination <BR>RED all -- anywhere anywhere <BR> <BR>Chain OUTPUT (policy ACCEPT) <BR>target prot opt source destination <BR> <BR>Chain CUSTOMPREROUTING (1 references) <BR>target prot opt source destination <BR> <BR>Chain PORTFW (1 references) <BR>target prot opt source destination <BR> <BR>Chain RED (1 references) <BR>target prot opt source destination <BR> <BR>Chain SQUID (1 references) <BR>target prot opt source destination <BR>REDIRECT tcp -- anywhere anywhere tcp dpt:http redir ports 800 <BR> <BR> <BR><B><U>cat /etc/rc.d/rc.firewall</B></U> <BR> <BR> <BR>#!/bin/sh <BR> <BR>. /var/ipcop/ppp/settings <BR>. /var/ipcop/ethernet/settings <BR>IFACE=`/bin/cat /var/ipcop/red/iface | /usr/bin/tr -d '012'` <BR> <BR>iptables_init() { <BR> echo 0 > /proc/sys/net/ipv4/conf/all/rp_filter <BR> echo 0 > /proc/sys/net/ipv4/conf/all/accept_redirects <BR> echo 0 > /proc/sys/net/ipv4/conf/all/accept_source_route <BR> echo 1 > /proc/sys/net/ipv4/conf/all/log_martians <BR> <BR> # Reduce DoS'ing ability by reducing timeouts <BR> echo 30 > /proc/sys/net/ipv4/tcp_fin_timeout <BR> echo 0 > /proc/sys/net/ipv4/tcp_window_scaling <BR> echo 0 > /proc/sys/net/ipv4/tcp_timestamps <BR> echo 0 > /proc/sys/net/ipv4/tcp_sack <BR> echo 1024 > /proc/sys/net/ipv4/tcp_max_syn_backlog <BR> <BR> # Flush all rules and delete all custom chains <BR> /sbin/iptables -F <BR> /sbin/iptables -t nat -F <BR> /sbin/iptables -X <BR> /sbin/iptables -t nat -X <BR> <BR> # Set up policies <BR> /sbin/iptables -P INPUT DROP <BR> /sbin/iptables -P FORWARD DROP <BR> /sbin/iptables -P OUTPUT ACCEPT <BR> <BR> # This chain will log, then DROPs "Xmas" and Null packets which might <BR> # indicate a port-scan attempt <BR> /sbin/iptables -N PSCAN <BR> /sbin/iptables -A PSCAN -p tcp -m limit --limit 10/minute -j LOG --log-prefix "TCP Scan? " <BR> /sbin/iptables -A PSCAN -p udp -m limit --limit 10/minute -j LOG --log-prefix "UDP Scan? " <BR> /sbin/iptables -A PSCAN -p icmp -m limit --limit 10/minute -j LOG --log-prefix "ICMP Scan? " <BR> /sbin/iptables -A PSCAN -f -m limit --limit 10/minute -j LOG --log-prefix "FRAG Scan? " <BR> /sbin/iptables -A PSCAN -j DROP <BR> <BR> # Disallow packets frequently used by port-scanners, XMas and Null <BR> /sbin/iptables -A INPUT -p tcp --tcp-flags ALL ALL -j PSCAN <BR> /sbin/iptables -A FORWARD -p tcp --tcp-flags ALL ALL -j PSCAN <BR> /sbin/iptables -A INPUT -p tcp --tcp-flags ALL NONE -j PSCAN <BR> /sbin/iptables -A FORWARD -p tcp --tcp-flags ALL NONE -j PSCAN <BR>} <BR> <BR>iptables_red() { <BR> /sbin/iptables -F RED <BR> /sbin/iptables -t nat -F RED <BR> <BR> # PPPoE / PPTP Device <BR> if [ "$IFACE" != "" ]; then <BR> # PPPoE / PPTP <BR> if [ "$DEVICE" != "" ]; then <BR> /sbin/iptables -A RED -i $DEVICE -j ACCEPT <BR> fi <BR> if [ "$RED_TYPE" = "PPTP" -o "$RED_TYPE" = "PPPOE" ]; then <BR> if [ "$RED_DEV" != "" ]; then <BR> /sbin/iptables -A RED -i $RED_DEV -j ACCEPT <BR> fi <BR> fi <BR> fi <BR> <BR> if [ "$IFACE" != "" -a -f /var/ipcop/red/active ]; then <BR> # DHCP <BR> if [ "$RED_DEV" != "" -a "$RED_TYPE" = "DHCP" ]; then <BR> /sbin/iptables -A RED -p tcp --source-port 67 --destination-port 68 -i $IFACE -j ACCEPT <BR> /sbin/iptables -A RED -p udp --source-port 67 --destination-port 68 -i $IFACE -j ACCEPT <BR> fi <BR> if [ "$PROTOCOL" = "RFC1483" -a "$METHOD" = "DHCP" ]; then <BR> /sbin/iptables -A RED -p tcp --source-port 67 --destination-port 68 -i $IFACE -j ACCEPT <BR> /sbin/iptables -A RED -p udp --source-port 67 --destination-port 68 -i $IFACE -j ACCEPT <BR> fi <BR> <BR> # Allow IPSec <BR> /sbin/iptables -A RED -p 47 -i $IFACE -j ACCEPT <BR> /sbin/iptables -A RED -p 50 -i $IFACE -j ACCEPT <BR> /sbin/iptables -A RED -p 51 -i $IFACE -j ACCEPT <BR> /sbin/iptables -A RED -p udp -i $IFACE --sport 500 --dport 500 -j ACCEPT <BR> <BR> # Outgoing masquerading <BR> /sbin/iptables -t nat -A RED -o $IFACE -j MASQUERADE <BR> fi <BR>} <BR> <BR># See how we were called. <BR>case "$1" in <BR> start) <BR> iptables_init <BR> <BR> # Limit Packets- helps reduce dos/syn attacks <BR> /sbin/iptables -A INPUT -p tcp -m tcp --tcp-flags SYN,RST,ACK SYN -m limit --limit 10/sec <BR> <BR> # CUSTOM chains, can be used by the users themselves <BR> /sbin/iptables -N CUSTOMINPUT <BR> /sbin/iptables -A INPUT -j CUSTOMINPUT <BR> /sbin/iptables -N CUSTOMFORWARD <BR> /sbin/iptables -A FORWARD -j CUSTOMFORWARD <BR> /sbin/iptables -t nat -N CUSTOMPREROUTING <BR> /sbin/iptables -t nat -A PREROUTING -j CUSTOMPREROUTING <BR> <BR> # Accept everyting connected <BR> /sbin/iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT <BR> /sbin/iptables -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT <BR> <BR> # localhost and ethernet. <BR> /sbin/iptables -A INPUT -i lo -j ACCEPT <BR> /sbin/iptables -A INPUT -p icmp -j ACCEPT <BR> /sbin/iptables -A INPUT -i $GREEN_DEV -j ACCEPT <BR> /sbin/iptables -A FORWARD -i $GREEN_DEV -j ACCEPT <BR> <BR> # accept all traffic from ipsec interfaces <BR> /sbin/iptables -A INPUT -i ipsec+ -j ACCEPT <BR> /sbin/iptables -A FORWARD -i ipsec+ -j ACCEPT <BR> <BR> # Port forwarding <BR> if [ "$ORANGE_DEV" != "" ]; then <BR> # This rule enables a host on ORANGE network to connect to the outside <BR> /sbin/iptables -A FORWARD -i $ORANGE_DEV -p tcp <BR> -o ! $GREEN_DEV -j ACCEPT <BR> /sbin/iptables -A FORWARD -i $ORANGE_DEV -p udp <BR> -o ! $GREEN_DEV -j ACCEPT <BR> fi <BR> <BR> # RED chain, used for the red interface <BR> /sbin/iptables -N RED <BR> /sbin/iptables -A INPUT -j RED <BR> /sbin/iptables -t nat -N RED <BR> /sbin/iptables -t nat -A POSTROUTING -j RED <BR> <BR> iptables_red <BR> <BR> # XTACCESS chain, used for external access <BR> /sbin/iptables -N XTACCESS <BR> /sbin/iptables -A INPUT -j XTACCESS <BR> <BR> # PORTFWACCESS chain, used for portforwarding <BR> /sbin/iptables -N PORTFWACCESS <BR> /sbin/iptables -A FORWARD -j PORTFWACCESS <BR> <BR> # DMZ pinhole chain. setdmzholes setuid prog adds rules here to allow <BR> # ORANGE to talk to GREEN. <BR> /sbin/iptables -N DMZHOLES <BR> /sbin/iptables -A FORWARD -o $GREEN_DEV -j DMZHOLES <BR> <BR> # Custom prerouting chains (for transparent proxy and port forwarding) <BR> /sbin/iptables -t nat -N SQUID <BR> /sbin/iptables -t nat -A PREROUTING -j SQUID <BR> /sbin/iptables -t nat -N PORTFW <BR> /sbin/iptables -t nat -A PREROUTING -j PORTFW <BR> <BR> # last rule in input and forward chain is for logging. <BR> /sbin/iptables -A INPUT -m limit --limit 10/minute -j LOG --log-prefix "INPUT " <BR> /sbin/iptables -A FORWARD -m limit --limit 10/minute -j LOG --log-prefix "OUTPUT " <BR> ;; <BR> stop) <BR> iptables_init <BR> <BR> # Accept everyting connected <BR> /sbin/iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT <BR> <BR> # localhost and ethernet. <BR> /sbin/iptables -A INPUT -i lo -j ACCEPT <BR> /sbin/iptables -A INPUT -i $GREEN_DEV -j ACCEPT <BR> <BR> if [ "$RED_DEV" != "" -a "$RED_TYPE" = "DHCP" ]; then <BR> /sbin/iptables -A input -p tcp --source-port 67 --destination-port 68 -i $IFACE -j ACCEPT <BR> /sbin/iptables -A input -p udp --source-port 67 --destination-port 68 -i $IFACE -j ACCEPT <BR> fi <BR> if [ "$PROTOCOL" = "RFC1483" -a "$METHOD" = "DHCP" ]; then <BR> /sbin/iptables -A input -p tcp --source-port 67 --destination-port 68 -i $IFACE -j ACCEPT <BR> /sbin/iptables -A input -p udp --source-port 67 --destination-port 68 -i $IFACE -j ACCEPT <BR> fi <BR> <BR> /sbin/iptables -A INPUT -m limit --limit 10/minute -j LOG --log-prefix "INPUT " <BR> /sbin/iptables -A FORWARD -m limit --limit 10/minute -j LOG --log-prefix "OUTPUT " <BR> ;; <BR> reload) <BR> iptables_red <BR> ;; <BR> restart) <BR> $0 stop <BR> $0 start <BR> ;; <BR> *) <BR> echo "Usage: $0 {start|stop|reload|restart}" <BR> exit 1 <BR> ;; <BR>esac <BR> <BR>exit 0 <BR>
Avatar de l’utilisateur
zedd75
Premier-Maître
Premier-Maître
 
Messages: 68
Inscrit le: 14 Mai 2003 00:00

Messagepar tomtom » 27 Mai 2003 18:34

Deja, je ne vois pas le -j MASQUERADE dans la chaine RED de la table nat (dans ton iptables -t nat -L). <BR> <BR>donc evidemment, ca ne va pas marcher ! <BR> <BR>peux-tu essayer de faire un <BR>rc.firewall restart <BR> <BR>et tu me redonnes le resultat de iptables -t nat -L <BR> <BR>thx <BR> <BR>
One hundred thousand lemmings can't be wrong...
Avatar de l’utilisateur
tomtom
Amiral
Amiral
 
Messages: 6035
Inscrit le: 26 Avr 2002 00:00
Localisation: Paris

Messagepar zedd75 » 27 Mai 2003 18:38

J'en ai meme perdu ma connexion pdt un temps (arret et redemmarrage du proxy) <BR> <BR> <BR>/etc/rc.d # ./rc.firewall restart <BR> <BR>iptables: No chain/target/match by that name <BR>iptables: No chain/target/match by that name <BR> <BR> <BR>iptables -t nat -L <BR> <BR>Chain PREROUTING (policy ACCEPT) <BR>target prot opt source destination <BR>CUSTOMPREROUTING all -- anywhere anywhere <BR>SQUID all -- anywhere anywhere <BR>PORTFW all -- anywhere anywhere <BR> <BR>Chain POSTROUTING (policy ACCEPT) <BR>target prot opt source destination <BR>RED all -- anywhere anywhere <BR> <BR>Chain OUTPUT (policy ACCEPT) <BR>target prot opt source destination <BR> <BR>Chain CUSTOMPREROUTING (1 references) <BR>target prot opt source destination <BR> <BR>Chain PORTFW (1 references) <BR>target prot opt source destination <BR> <BR>Chain RED (1 references) <BR>target prot opt source destination <BR> <BR>Chain SQUID (1 references) <BR>target prot opt source destination <BR>
Avatar de l’utilisateur
zedd75
Premier-Maître
Premier-Maître
 
Messages: 68
Inscrit le: 14 Mai 2003 00:00

Messagepar zedd75 » 27 Mai 2003 18:39

tu peux m'expliquer l'histoire du MASQUERADE ? <BR>
Avatar de l’utilisateur
zedd75
Premier-Maître
Premier-Maître
 
Messages: 68
Inscrit le: 14 Mai 2003 00:00

Messagepar tomtom » 27 Mai 2003 18:44

C'est tout simple : <BR> <BR>tu ne possèdes qu'un seule ip publique (connectee sur internet) mais tu veux connecter plusieurs machine. <BR> <BR>IL faut donc faire des transferts d'adresses et de port. Une cible de netfilter fait ça toute seule : <BR> <BR>Masquerade. <BR> <BR>Du reste, tu peux voir dans ton script de règles qu'il y a un <BR>iptables -t nat -A RED -o $IFACE -j MASQUERADE. <BR> <BR>on devrait donc la retrouver dans les règles appliquées, ce qui n'est pas le cas. <BR> <BR>Desactives ton proxy stp, et refais le test. <BR> <BR>Thomas <BR> <BR>
One hundred thousand lemmings can't be wrong...
Avatar de l’utilisateur
tomtom
Amiral
Amiral
 
Messages: 6035
Inscrit le: 26 Avr 2002 00:00
Localisation: Paris

Messagepar zedd75 » 27 Mai 2003 18:54

meme chose... <BR> <BR>Je remarque que la ligne masquerade dont tu parles est avant un fi. <BR>Ce qui pourrait laisser entendre que la condition du if n'aie pas été vérifiée... <BR> <BR>Edd <BR>
Avatar de l’utilisateur
zedd75
Premier-Maître
Premier-Maître
 
Messages: 68
Inscrit le: 14 Mai 2003 00:00

Messagepar Gesp » 27 Mai 2003 18:56

Tu peux regarder la valeur dans /var/ipcop/red/iface?
Avatar de l’utilisateur
Gesp
Amiral
Amiral
 
Messages: 4481
Inscrit le: 29 Déc 2002 01:00

Messagepar zedd75 » 27 Mai 2003 18:58

hehe meme reflexe.... <BR> <BR>nada, rien du tout <BR> <BR>Edd <BR>
Avatar de l’utilisateur
zedd75
Premier-Maître
Premier-Maître
 
Messages: 68
Inscrit le: 14 Mai 2003 00:00

Messagepar tomtom » 27 Mai 2003 18:58

Bonne remarque mais ce serait grave quand même... <BR> <BR>Fait moi un <BR> <BR>echo $IFACE
One hundred thousand lemmings can't be wrong...
Avatar de l’utilisateur
tomtom
Amiral
Amiral
 
Messages: 6035
Inscrit le: 26 Avr 2002 00:00
Localisation: Paris

Messagepar tomtom » 27 Mai 2003 18:59

Si tu n'as rien, tu peux refaire une install <IMG SRC="images/smiles/icon_smile.gif"> <BR> <BR>Il ne connait pas d'interface pour aller sur internet :s <BR> <BR> <BR>Tom
One hundred thousand lemmings can't be wrong...
Avatar de l’utilisateur
tomtom
Amiral
Amiral
 
Messages: 6035
Inscrit le: 26 Avr 2002 00:00
Localisation: Paris

Messagepar zedd75 » 27 Mai 2003 19:00

j'ai une belle ligne blanche... <BR> <BR><!-- BBcode auto-mailto start --><a href="mailto:root@stopedd:/etc/rc.d">root@stopedd:/etc/rc.d</a><!-- BBCode auto-mailto end --> # echo $IFACE <BR> <BR><!-- BBcode auto-mailto start --><a href="mailto:root@stopedd:/etc/rc.d">root@stopedd:/etc/rc.d</a><!-- BBCode auto-mailto end --> # <BR>
Avatar de l’utilisateur
zedd75
Premier-Maître
Premier-Maître
 
Messages: 68
Inscrit le: 14 Mai 2003 00:00

Suivant

Retour vers IPCop

Qui est en ligne ?

Utilisateur(s) parcourant actuellement ce forum : Aucun utilisateur inscrit et 1 invité