Zdravim, narazil som na nejaky zavazny problem, pouzivam Greenie 5.0.2j a mam tam nastavenu siet (Gateway=10.16.115.1,Maska siete=255.255.255.0, DNS server=195.146.128.60,195.146.132.59,IP=10.16.115.35) doteraz mi siet bez problemov fungovala.Dneska som si napojil svoj cp zase na siet a pustil Firefox ale ten na mna vybafol z hlaskou ze adresa sa nenasla,odpojil a pripojil kabel a Greenie mi zahlasil ze som pripojeny k pracovnej skupine IVT, zase som spustil browser a nic, tak som si otvoril terminal a skusal pingovat jednotlive zariadenia ale sietovka sa tvarila ze nie je pripojena do siete, tak som vypol pc a skusal ho napojit miesto ineho ktory je na sieti a zase to iste skusal som aj Nmap a nic, Greenie hlasi ze zo sietou je vsetko vporiadku.Vcera som ale instaloval velmi velke mnozstvo softwaru, moze to byt tym? nerobil som ale nic s drivermii alebo nastaveniami siete.Budem vdacny za akukolvek pomoc
..::RootLUG::..
--- 10.16.115.1 ping statistics ---
martin@martin-desktop:~$ ifconfig
eth0 Link encap:Ethernet HWaddr 00:13:d3:5f:56:a1
inet addr:10.16.115.35 Bcast:10.16.115.255 Mask:255.255.255.0
inet6 addr: fe80::213:d3ff:fe5f:56a1/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:13 errors:0 dropped:0 overruns:0 frame:0
TX packets:6 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:1959 (1.9 KB) TX bytes:468 (468.0 B)
Interrupt:21 Base address:0xc000
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:8 errors:0 dropped:0 overruns:0 frame:0
TX packets:8 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:480 (480.0 B) TX bytes:480 (480.0 B)
martin@martin-desktop:~$
martin@martin-desktop:~$ ping 10.16.115.1
PING 10.16.115.1 (10.16.115.1) 56(84) bytes of data.
ping: sendmsg: Operation not permitted
ping: sendmsg: Operation not permitted
ping: sendmsg: Operation not permitted
^C
3 packets transmitted, 0 received, 100% packet loss, time 2016ms
iptables v1.4.1.1: can't initialize iptables table `filter': Permission denied (you must be root)
Perhaps iptables or your kernel needs to be upgraded.
martin@martin-desktop:~$ sudo iptables -nvL
[sudo] password for martin:
Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
4 200 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- !lo * 127.0.0.0/8 0.0.0.0/0 LOG flags 0 level 4
0 0 DROP all -- !lo * 127.0.0.0/8 0.0.0.0/0
0 0 DROP all -- * * 0.0.0.0/0 224.0.0.1
17 2476 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4
17 2476 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 DROP all -- * * 0.0.0.0/0 224.0.0.1
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
4 200 ACCEPT all -- * lo 0.0.0.0/0 0.0.0.0/0
0 0 DROP all -- * * 0.0.0.0/0 224.0.0.1
360 34091 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4
360 34091 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
martin@martin-desktop:~$
iptables -P OUTPUT ACCEPT
martin@martin-desktop:~$ ifconfig
eth0 Link encap:Ethernet HWaddr 00:13:d3:5f:56:a1
inet addr:10.16.115.35 Bcast:10.16.115.255 Mask:255.255.255.0
inet6 addr: fe80::213:d3ff:fe5f:56a1/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:35 errors:0 dropped:0 overruns:0 frame:0
TX packets:6 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:3477 (3.4 KB) TX bytes:468 (468.0 B)
Interrupt:21
eth1 Link encap:Ethernet HWaddr 00:30:4f:03:5e:45
inet addr:10.16.115.35 Bcast:10.16.115.255 Mask:255.255.255.0
inet6 addr: fe80::230:4fff:fe03:5e45/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:6 dropped:0 overruns:0 carrier:12
collisions:102 txqueuelen:1000
RX bytes:0 (0.0 B) TX bytes:468 (468.0 B)
Interrupt:18 Base address:0xd000
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:8 errors:0 dropped:0 overruns:0 frame:0
TX packets:8 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:480 (480.0 B) TX bytes:480 (480.0 B)
martin@martin-desktop:~$ iptables -nVL
iptables v1.4.1.1
martin@martin-desktop:~$ iptables -nvL
iptables v1.4.1.1: can't initialize iptables table `filter': Permission denied (you must be root)
Perhaps iptables or your kernel needs to be upgraded.
martin@martin-desktop:~$ sudo iptables -nvL
[sudo] password for martin:
Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
4 200 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all -- !lo * 127.0.0.0/8 0.0.0.0/0 LOG flags 0 level 4
0 0 DROP all -- !lo * 127.0.0.0/8 0.0.0.0/0
0 0 DROP all -- * * 0.0.0.0/0 224.0.0.1
3 1232 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4
3 1232 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 DROP all -- * * 0.0.0.0/0 224.0.0.1
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
4 200 ACCEPT all -- * lo 0.0.0.0/0 0.0.0.0/0
0 0 DROP all -- * * 0.0.0.0/0 224.0.0.1
265 21454 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4
265 21454 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
martin@martin-desktop:~$
IPTABLES="/sbin/iptables"
$IPTABLES -F
$IPTABLES -X
$IPTABLES -P INPUT ACCEPT
$IPTABLES -P OUTPUT ACCEPT
$IPTABLES -P FORWARD ACCEPT
$IPTABLES -t nat -P PREROUTING ACCEPT
$IPTABLES -t nat -P OUTPUT ACCEPT
$IPTABLES -t nat -P POSTROUTING ACCEPT
$IPTABLES -t nat -F PREROUTING
$IPTABLES -t nat -F OUTPUT
$IPTABLES -t nat -F POSTROUTING
$IPTABLES -t mangle -P PREROUTING ACCEPT
$IPTABLES -t mangle -P OUTPUT ACCEPT
$IPTABLES -t mangle -F PREROUTING
$IPTABLES -t mangle -F OUTPUT
echo "1" > /proc/sys/net/ipv4/ip_forward
proste flush vsetko daj to do suboru daj mu priznak x a spusti, klasika bash :) chmod +x subor.sh
a pri iptable -nL mal by si dostat toto
iptables -nL
Chain INPUT (policy ACCEPT)
target prot opt source destination
Chain FORWARD (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Chain INPUT (policy ACCEPT)
target prot opt source destination
Chain FORWARD (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
takto je vsetko open