Come sbloccare il jabber sul router ADSL TI con iptables


1

Ho un router ADSL Texas Instruments vecchio ma affidabile.

Scheda AR7RD; BUILD = 061.005; VERSIONE = 3.7.1 Se è importante ...

Una cosa che mi preoccupa è che in qualche modo blocca il mio jabber (Pidgin collegato all'account Google).

So che il router lo sta causando, perché ho provato diversi router e jabber stava lavorando con loro. Ho cercato più volte le sue impostazioni, ma non sono riuscito a trovare nulla che indichi il blocco.

Sono riuscito a farlo usando SSH e ho pensato che dovesse essere nelle impostazioni di iptables. Purtroppo non riesco a leggerlo bene, quindi sarei grato per qualsiasi aiuto.

Ecco l'output originale di iptables -L

Chain INPUT (policy ACCEPT)
target     prot opt source               destination         
CFG        tcp  --  Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
192.168.1.6          anywhere           tcp dpt:www Records Packet's Source Interface 

CFG        tcp  --  Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
192.168.1.6          anywhere           tcp dpt:443 Records Packet's Source Interface 

ACCEPT     tcp  --  Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
0.0.0.0              anywhere           state NEW tcp dpt:ssh 
DROP       tcp  --  Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
0.0.0.0              anywhere           state NEW tcp dpt:888 
ACCEPT     tcp  --  Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
0.0.0.0              anywhere           state NEW tcp dpt:www 
ACCEPT     tcp  --  anywhere             anywhere           tcp dpt:www 
ACCEPT     icmp --  anywhere             anywhere           icmp echo-request state NEW 
ACCEPT     all  --  anywhere             anywhere           state RELATED,ESTABLISHED 
DROP       all  --  anywhere             anywhere           

Chain FORWARD (policy ACCEPT)
target     prot opt source               destination         
ACCEPT     all  --  anywhere             anywhere           state RELATED,ESTABLISHED 
ACCEPT     tcp  --  anywhere             Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
192.168.1.150      tcp dpt:ftp 
ACCEPT     tcp  --  anywhere             Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
192.168.1.150      tcp dpt:443 
ACCEPT     tcp  --  anywhere             Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
192.168.1.150      tcp dpt:www 
TCPMSS     tcp  --  anywhere             anywhere           tcp flags:SYN,RST/SYN TCPMSS clamp to PMTU 
DROP       all  --  anywhere             anywhere           

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination         
DROP       icmp --  anywhere             anywhere           icmp destination-unreachable 
DROP       icmp --  anywhere             anywhere           state INVALID

e qui è lo stesso dopo averlo chiarito un po '

Chain INPUT (policy ACCEPT)
target     prot opt source               destination         
CFG        tcp  --  192.168.1.6          anywhere           tcp dpt:www Records Packet's Source Interface 
CFG        tcp  --  192.168.1.6          anywhere           tcp dpt:443 Records Packet's Source Interface 
ACCEPT     tcp  --  0.0.0.0              anywhere           state NEW tcp dpt:ssh 
DROP       tcp  --  0.0.0.0              anywhere           state NEW tcp dpt:888 
ACCEPT     tcp  --  0.0.0.0              anywhere           state NEW tcp dpt:www 
ACCEPT     tcp  --  anywhere             anywhere           tcp dpt:www 
ACCEPT     icmp --  anywhere             anywhere           icmp echo-request state NEW 
ACCEPT     all  --  anywhere             anywhere           state RELATED,ESTABLISHED 
DROP       all  --  anywhere             anywhere           

Chain FORWARD (policy ACCEPT)
target     prot opt source               destination         
ACCEPT     all  --  anywhere             anywhere           state RELATED,ESTABLISHED 
ACCEPT     tcp  --  anywhere             192.168.1.150      tcp dpt:ftp 
ACCEPT     tcp  --  anywhere             192.168.1.150      tcp dpt:443 
ACCEPT     tcp  --  anywhere             192.168.1.150      tcp dpt:www 
TCPMSS     tcp  --  anywhere             anywhere           tcp flags:SYN,RST/SYN TCPMSS clamp to PMTU 
DROP       all  --  anywhere             anywhere           

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination         
DROP       icmp --  anywhere             anywhere           icmp destination-unreachable 
DROP       icmp --  anywhere             anywhere           state INVALID
Utilizzando il nostro sito, riconosci di aver letto e compreso le nostre Informativa sui cookie e Informativa sulla privacy.
Licensed under cc by-sa 3.0 with attribution required.