[isf-wifidog] I have a router that is being tempremental.
Don Druce
dondruce at sympatico.ca
Jeu 30 Aou 00:27:46 EDT 2007
Hi Pascal
Thanks for the info. I was not aware of the iptables -L command.
Here are my results, and the results of Ping attempts. I tried Ping to
the Google URL and IP address from X-Wrt with no success.
-------------------------
login as: root
root at 192.168.5.1's password:
BusyBox v1.00 (2007.01.31-14:50+0000) Built-in shell (ash)
Enter 'help' for a list of built-in commands.
_______ ________ __
| |.-----.-----.-----.| | | |.----.| |_
| - || _ | -__| || | | || _|| _|
|_______|| __|_____|__|__||________||__| |____|
|__| W I R E L E S S F R E E D O M
WHITE RUSSIAN (0.9) -------------------------------
* 2 oz Vodka Mix the Vodka and Kahlua together
* 1 oz Kahlua over ice, then float the cream or
* 1/2oz cream milk on the top.
---------------------------------------------------
root at CS-Linksys-G-X-WRT:~# iptables -L
Chain INPUT (policy DROP)
target prot opt source destination
DROP all -- anywhere anywhere state INVALID
ACCEPT all -- anywhere anywhere state
RELATED,ESTAB LISHED
DROP tcp -- anywhere anywhere tcp
option=!2 flags :SYN/SYN
input_rule all -- anywhere anywhere
input_wan all -- anywhere anywhere
LAN_ACCEPT all -- anywhere anywhere
ACCEPT icmp -- anywhere anywhere
ACCEPT gre -- anywhere anywhere
REJECT tcp -- anywhere anywhere reject-with
tcp-res et
REJECT all -- anywhere anywhere reject-with
icmp-po rt-unreachable
Chain FORWARD (policy DROP)
target prot opt source destination
WiFiDog_WIFI2Internet all -- anywhere anywhere
DROP all -- anywhere anywhere state INVALID
TCPMSS tcp -- anywhere anywhere tcp
flags:SYN,RST/S YN TCPMSS
clamp to PMTU
ACCEPT all -- anywhere anywhere state
RELATED,ESTAB LISHED
forwarding_rule all -- anywhere anywhere
forwarding_wan all -- anywhere anywhere
ACCEPT all -- anywhere anywhere
ACCEPT all -- anywhere anywhere
Chain LAN_ACCEPT (1 references)
target prot opt source destination
RETURN all -- anywhere anywhere
ACCEPT all -- anywhere anywhere
Chain OUTPUT (policy DROP)
target prot opt source destination
DROP all -- anywhere anywhere state INVALID
ACCEPT all -- anywhere anywhere state
RELATED,ESTAB LISHED
output_rule all -- anywhere anywhere
ACCEPT all -- anywhere anywhere
REJECT tcp -- anywhere anywhere reject-with
tcp-res et
REJECT all -- anywhere anywhere reject-with
icmp-po rt-unreachable
Chain WiFiDog_AuthServers (1 references)
target prot opt source destination
root at CS-Linksys-G-X-WRT:~#
root at CS-Linksys-G-X-WRT:~# ping www.google.ca
ping: www.google.ca: Unknown host
root at CS-Linksys-G-X-WRT:~# ping 64.233.167.147
PING 64.233.167.147 (64.233.167.147): 56 data bytes
ping 64.233.167.147
--- 64.233.167.147 ping statistics ---
229 packets transmitted, 0 packets received, 100% packet loss
root at CS-Linksys-G-X-WRT:~#
----------------------------
Pascal Charest wrote:
> The correct syntax to get the iptables listing would be :
> iptables -L
>
> that should give us bit more info.
>
> Another good thing would be the output from "ifconfig" and knowing if
> "ping www.google.com <http://www.google.com>" and "ping 64.233.167.147
> <http://64.233.167.147>" work.
>
> Pascal Ch.
>
> --
> Pascal Charest, Consultant en logiciel libre.
> http://blog.pacharest.com
>
> On 8/28/07, *Don Druce* <dondruce at sympatico.ca
> <mailto:dondruce at sympatico.ca>> wrote:
>
> Router Linksys WRT54 works at times, but when it does not want
> to, it acts like a mule and just does nothing.
> I managed to coax it into telling me about its problems, can
> anyone help me diagnose this. It is a bit beyond me.
>
> This is on my LAN and was working with my Captive Server. (when it
> wanted to)
>
> Don
> ----------------------------------------------------
> root at CS-Linksys-G-X-WRT:~# wifidog-init status
> WiFiDog status
>
> Version: 1.1.3_rc1
> Uptime: 0d 0h 8m 20s
> Has been restarted: no
> Internet Connectivity: yes
> *Auth server reachable: no*
> Clients served this session: 0
>
> 0 clients connected.
>
> Authentication servers:
> Host: 192.168.2.200 <http://192.168.2.200> ( 192.168.2.200
> <http://192.168.2.200>)
> root at CS-Linksys-G-X-WRT:~#
>
>
> -----------------------------------------------
> Authentication servers:
> Host: 192.168.2.200 <http://192.168.2.200> ( 192.168.2.200
> <http://192.168.2.200>)
> OK
> Starting Wifidog ...
> Testing for iptables modules
> Testing ipt_mac
> ipt_mac module is working
> Testing ipt_mark
> ipt_mark module is working
> Testing ipt_REDIRECT
> ipt_REDIRECT module is working
> OK
> *root at CS-Linksys-G-X-WRT:~# iptables: Invalid argument
> iptables: Invalid argument
> iptables: Invalid argument
> [3][Fri Dec 31 19:02:49 1999][1371](centralserver.c:176) Failed to
> connect to any of the auth servers
>
> --------------------------------------------------
>
> *Help, comments, leads, ideas etc appreciated.*
> *
>
> _______________________________________________
> WiFiDog mailing list
> WiFiDog at listes.ilesansfil.org <mailto:WiFiDog at listes.ilesansfil.org>
> http://listes.ilesansfil.org/cgi-bin/mailman/listinfo/wifidog
>
>
>
>
> ------------------------------------------------------------------------
>
> _______________________________________________
> WiFiDog mailing list
> WiFiDog at listes.ilesansfil.org
> http://listes.ilesansfil.org/cgi-bin/mailman/listinfo/wifidog
> ------------------------------------------------------------------------
>
> No virus found in this incoming message.
> Checked by AVG Free Edition.
> Version: 7.5.484 / Virus Database: 269.12.10/977 - Release Date: 8/28/2007 4:29 PM
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://listes.ilesansfil.org/pipermail/wifidog/attachments/20070830/b65b73f2/attachment.htm
Plus d'informations sur la liste de diffusion WiFiDog