Ho un router ADSL Texas Instruments vecchio ma affidabile.
Scheda AR7RD; BUILD = 061.005; VERSIONE = 3.7.1 Se è importante ...
Una cosa che mi preoccupa è che in qualche modo blocca il mio jabber (Pidgin collegato all'account Google).
So che il router lo sta causando, perché ho provato diversi router e jabber stava lavorando con loro. Ho cercato più volte le sue impostazioni, ma non sono riuscito a trovare nulla che indichi il blocco.
Sono riuscito a farlo usando SSH e ho pensato che dovesse essere nelle impostazioni di iptables. Purtroppo non riesco a leggerlo bene, quindi sarei grato per qualsiasi aiuto.
Ecco l'output originale di iptables -L
Chain INPUT (policy ACCEPT)
target prot opt source destination
CFG tcp -- Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
192.168.1.6 anywhere tcp dpt:www Records Packet's Source Interface
CFG tcp -- Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
192.168.1.6 anywhere tcp dpt:443 Records Packet's Source Interface
ACCEPT tcp -- Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
0.0.0.0 anywhere state NEW tcp dpt:ssh
DROP tcp -- Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
0.0.0.0 anywhere state NEW tcp dpt:888
ACCEPT tcp -- Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
0.0.0.0 anywhere state NEW tcp dpt:www
ACCEPT tcp -- anywhere anywhere tcp dpt:www
ACCEPT icmp -- anywhere anywhere icmp echo-request state NEW
ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED
DROP all -- anywhere anywhere
Chain FORWARD (policy ACCEPT)
target prot opt source destination
ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED
ACCEPT tcp -- anywhere Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
192.168.1.150 tcp dpt:ftp
ACCEPT tcp -- anywhere Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
192.168.1.150 tcp dpt:443
ACCEPT tcp -- anywhere Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
192.168.1.150 tcp dpt:www
TCPMSS tcp -- anywhere anywhere tcp flags:SYN,RST/SYN TCPMSS clamp to PMTU
DROP all -- anywhere anywhere
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
DROP icmp -- anywhere anywhere icmp destination-unreachable
DROP icmp -- anywhere anywhere state INVALID
e qui è lo stesso dopo averlo chiarito un po '
Chain INPUT (policy ACCEPT)
target prot opt source destination
CFG tcp -- 192.168.1.6 anywhere tcp dpt:www Records Packet's Source Interface
CFG tcp -- 192.168.1.6 anywhere tcp dpt:443 Records Packet's Source Interface
ACCEPT tcp -- 0.0.0.0 anywhere state NEW tcp dpt:ssh
DROP tcp -- 0.0.0.0 anywhere state NEW tcp dpt:888
ACCEPT tcp -- 0.0.0.0 anywhere state NEW tcp dpt:www
ACCEPT tcp -- anywhere anywhere tcp dpt:www
ACCEPT icmp -- anywhere anywhere icmp echo-request state NEW
ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED
DROP all -- anywhere anywhere
Chain FORWARD (policy ACCEPT)
target prot opt source destination
ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED
ACCEPT tcp -- anywhere 192.168.1.150 tcp dpt:ftp
ACCEPT tcp -- anywhere 192.168.1.150 tcp dpt:443
ACCEPT tcp -- anywhere 192.168.1.150 tcp dpt:www
TCPMSS tcp -- anywhere anywhere tcp flags:SYN,RST/SYN TCPMSS clamp to PMTU
DROP all -- anywhere anywhere
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
DROP icmp -- anywhere anywhere icmp destination-unreachable
DROP icmp -- anywhere anywhere state INVALID