Nowe posty

Autor Wątek: HP psc1410 na openSuSE 10  (Przeczytany 905 razy)

Offline Tomasz Jezierczuk

  • Users
  • Guru
  • *****
  • Wiadomości: 852
    • Zobacz profil
HP psc1410 na openSuSE 10
« Odpowiedź #15 dnia: 2006-03-05, 13:03:19 »
2006-03-05 12:02:48 tom123 napisał:

> 2006-03-05 11:56:57 jezior napisał:  
 >  > a po co Ci maskarada? udostepniasz lacze?
 >
 > nie,mam zamiar tylko kiedys korzystac z p2p

Nie widze najmniejszego zwiazku ;-)

Offline Tomasz Jezierczuk

  • Users
  • Guru
  • *****
  • Wiadomości: 852
    • Zobacz profil
HP psc1410 na openSuSE 10
« Odpowiedź #16 dnia: 2006-03-05, 13:40:09 »
2006-03-05 12:07:23 tom123 napisał:

> co do iptables
 > to wszystko co czytam to pod debiana.Musze jeszcze poszperac i dopiero pozniej zadawac
 > pytanie.

Wszystko jedno czy debiljan czy cos innego. Iptables to iptables ;-)

Offline

  • Users
  • Użytkownik
  • **
  • Wiadomości: 94
    • Zobacz profil
HP psc1410 na openSuSE 10
« Odpowiedź #17 dnia: 2006-03-05, 16:51:43 »
 > I to wynik tej komendy?
 > less /var/log/messages | grep \\"SUseFirewall2\\"
 >
 > Cos sciemniasz ;-)

Jak wpisuje

su
haslo
less(spacja)/var/log/messages(spacja)|(spacja)grep(spacja)\\"SUseFirewall2
 to mam znow
linux:/home/***** #

Offline

  • Users
  • Użytkownik
  • **
  • Wiadomości: 94
    • Zobacz profil
HP psc1410 na openSuSE 10
« Odpowiedź #18 dnia: 2006-03-05, 16:57:38 »
2006-03-05 13:40:09 jezior napisał:

> 2006-03-05 12:07:23 tom123 napisał:
 >
 > > co do iptables
 >  > to wszystko co czytam to pod debiana.Musze jeszcze poszperac i dopiero pozniej zadawac
 >  > pytanie.
 >
 > Wszystko jedno czy debiljan czy cos innego. Iptables to iptables ;-)
 >

dla mnie nie wszystko jedno.Dlugo mialem winde,ciezko mi sie przyzwyczaic.
Nawet nie wiem gdzie,ani jak wejsc w iptables,wiem tylko Yast i firewall a tam z konsoli to nie wiem czy cos sie wpisuje?Chyba nie?

Offline Tomasz Jezierczuk

  • Users
  • Guru
  • *****
  • Wiadomości: 852
    • Zobacz profil
HP psc1410 na openSuSE 10
« Odpowiedź #19 dnia: 2006-03-05, 16:59:51 »
2006-03-05 16:51:43 tom123 napisał:
less(spacja)/var/log/messages(spacja)|(spacja)grep(spacja)\\"SUseFirewall2
 >  to mam znow
 > linux:/home/***** #

czyli albo zle wpisales komunikat bledu, albo Susefirewall nie zostawia nic w logach.

Przepisz tu jeszcze raz DOKLADNIE BEZ LITERÓWEK TYPU \\"SETAP\\" komunikat bledu bo napewno nie jest to jak pisales:
cytat:
\\"Nie mozna wlaczyc SUseFirewall2_setap\\"

Offline

  • Users
  • Użytkownik
  • **
  • Wiadomości: 94
    • Zobacz profil
HP psc1410 na openSuSE 10
« Odpowiedź #20 dnia: 2006-03-05, 17:00:07 »
Ja nawet nie wiem,a czytalem o tym jak sie logowac jako root:(To nie wskazane,wiem.Loguje sie automatycznie jako uzytkownik a haslo root podaje jesli porzebuje tego jakas opcja

Offline

  • Users
  • Użytkownik
  • **
  • Wiadomości: 94
    • Zobacz profil
HP psc1410 na openSuSE 10
« Odpowiedź #21 dnia: 2006-03-05, 17:05:29 »
2006-03-05 16:59:51 jezior napisał:

> 2006-03-05 16:51:43 tom123 napisał:
 > less(spacja)/var/log/messages(spacja)|(spacja)grep(spacja)\\"SUseFirewall2
 >  >  to mam znow
 >  > linux:/home/***** #
 >
 > czyli albo zle wpisales komunikat bledu, albo Susefirewall nie zostawia nic w logach.
 >
 > Przepisz tu jeszcze raz DOKLADNIE BEZ LITERÓWEK TYPU \\"SETAP\\" komunikat bledu bo
 > napewno nie jest to jak pisales:
 > cytat:

 > \\"Nie mozna wlaczyc SUseFirewall2_setap\\"


Dokladnie jest tak:


X   Błąd

Nie można włączyć usługi `SuSEfirewall2_setup`

Offline Tomasz Jezierczuk

  • Users
  • Guru
  • *****
  • Wiadomości: 852
    • Zobacz profil
HP psc1410 na openSuSE 10
« Odpowiedź #22 dnia: 2006-03-05, 17:07:28 »
2006-03-05 17:05:29 tom123 napisał:

 > Nie można włączyć usługi `SuSEfirewall2_setup`

whereis SuSEfirewall2_setup

Offline

  • Users
  • Użytkownik
  • **
  • Wiadomości: 94
    • Zobacz profil
HP psc1410 na openSuSE 10
« Odpowiedź #23 dnia: 2006-03-05, 17:13:58 »
2006-03-05 17:07:28 jezior napisał:

> 2006-03-05 17:05:29 tom123 napisał:
 >
 >  > Nie można włączyć usługi `SuSEfirewall2_setup`
 >
 > whereis SuSEfirewall2_setup

Wlasnie sprawdzalem w Yast czy mam zainstalowane pakiety.
Wpisalem iptables i wyskoczylo od haczykowane
iptables
SuSEfirewall2

Offline Tomasz Jezierczuk

  • Users
  • Guru
  • *****
  • Wiadomości: 852
    • Zobacz profil
HP psc1410 na openSuSE 10
« Odpowiedź #24 dnia: 2006-03-05, 17:17:14 »
2006-03-05 17:13:58 tom123 napisał:

 > Wlasnie sprawdzalem w Yast czy mam zainstalowane pakiety.
 > Wpisalem iptables i wyskoczylo od haczykowane
 > iptables
 > SuSEfirewall2

Brawo ;-)
To podstawowa roznica pomiedzy linuxem i windowsem. Linux wymaga myslenia ;-)

Offline

  • Users
  • Użytkownik
  • **
  • Wiadomości: 94
    • Zobacz profil
HP psc1410 na openSuSE 10
« Odpowiedź #25 dnia: 2006-03-05, 17:17:58 »
log z wpisanym poprawnie bledem



Mar  3 13:02:16 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  3 13:02:17 linux SuSEfirewall2: batch committing...
Mar  3 13:02:18 linux SuSEfirewall2: Firewall rules set to CLOSE.
Mar  3 13:02:18 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  3 13:02:18 linux SuSEfirewall2: Setting up rules from /etc/sysconfig/SuSEfirewall2 ...
Mar  3 13:02:18 linux SuSEfirewall2: Warning: no interface active
Mar  3 13:02:19 linux SuSEfirewall2: batch committing...
Mar  3 13:02:19 linux SuSEfirewall2: Firewall rules successfully set
Mar  3 21:53:40 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  3 21:53:40 linux SuSEfirewall2: /var/lock/SuSEfirewall2.booting exists which means system boot in progress, exit.
Mar  3 21:54:06 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  3 21:54:06 linux SuSEfirewall2: /var/lock/SuSEfirewall2.booting exists which means system boot in progress, exit.
Mar  3 21:54:21 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  3 21:54:21 linux SuSEfirewall2: /var/lock/SuSEfirewall2.booting exists which means system boot in progress, exit.
Mar  3 21:55:03 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  3 21:55:03 linux SuSEfirewall2: /var/lock/SuSEfirewall2.booting exists which means system boot in progress, exit.
Mar  3 21:55:19 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  3 21:55:19 linux SuSEfirewall2: /var/lock/SuSEfirewall2.booting exists which means system boot in progress, exit.
Mar  4 19:56:20 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  4 19:56:21 linux SuSEfirewall2: batch committing...
Mar  4 19:56:21 linux SuSEfirewall2: Firewall rules set to CLOSE.
Mar  4 19:56:21 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  4 19:56:21 linux SuSEfirewall2: Setting up rules from /etc/sysconfig/SuSEfirewall2 ...
Mar  4 19:56:21 linux SuSEfirewall2: Warning: no interface active
Mar  4 19:56:22 linux SuSEfirewall2: batch committing...
Mar  4 19:56:22 linux SuSEfirewall2: Firewall rules successfully set
Mar  4 19:56:27 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  4 19:56:27 linux SuSEfirewall2: batch committing...
Mar  4 19:56:27 linux SuSEfirewall2: Firewall rules unloaded.
Mar  4 19:56:28 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  4 19:56:28 linux SuSEfirewall2: batch committing...
Mar  4 19:56:28 linux SuSEfirewall2: Firewall rules set to CLOSE.
Mar  4 19:56:28 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  4 19:56:28 linux SuSEfirewall2: Setting up rules from /etc/sysconfig/SuSEfirewall2 ...
Mar  4 19:56:28 linux SuSEfirewall2: Warning: no interface active
Mar  4 19:56:29 linux SuSEfirewall2: batch committing...
Mar  4 19:56:29 linux SuSEfirewall2: Firewall rules successfully set
Mar  4 20:00:11 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  4 20:00:12 linux SuSEfirewall2: batch committing...
Mar  4 20:00:12 linux SuSEfirewall2: Firewall rules unloaded.
Mar  4 20:00:12 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  4 20:00:12 linux SuSEfirewall2: batch committing...
Mar  4 20:00:12 linux SuSEfirewall2: Firewall rules set to CLOSE.
Mar  4 20:00:12 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  4 20:00:12 linux SuSEfirewall2: Setting up rules from /etc/sysconfig/SuSEfirewall2 ...
Mar  4 20:00:12 linux SuSEfirewall2: Warning: no interface active
Mar  4 20:00:13 linux SuSEfirewall2: batch committing...
Mar  4 20:00:14 linux SuSEfirewall2: Firewall rules successfully set
Mar  5 09:17:37 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  5 09:17:37 linux SuSEfirewall2: /var/lock/SuSEfirewall2.booting exists which means system boot in progress, exit.
Mar  5 09:17:38 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  5 09:17:38 linux SuSEfirewall2: /var/lock/SuSEfirewall2.booting exists which means system boot in progress, exit.
Mar  5 09:17:38 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  5 09:17:38 linux SuSEfirewall2: Setting up rules from /etc/sysconfig/SuSEfirewall2 ...
Mar  5 09:17:38 linux SuSEfirewall2: Warning: no interface active
Mar  5 09:17:38 linux SuSEfirewall2: batch committing...
Mar  5 09:17:39 linux SuSEfirewall2: Firewall rules successfully set
Mar  5 09:17:43 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  5 09:17:43 linux SuSEfirewall2: batch committing...
Mar  5 09:17:43 linux SuSEfirewall2: Firewall rules unloaded.
Mar  5 09:17:44 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  5 09:17:44 linux SuSEfirewall2: batch committing...
Mar  5 09:17:44 linux SuSEfirewall2: Firewall rules set to CLOSE.
Mar  5 09:17:44 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  5 09:17:44 linux SuSEfirewall2: Setting up rules from /etc/sysconfig/SuSEfirewall2 ...
Mar  5 09:17:44 linux SuSEfirewall2: Warning: no interface active
Mar  5 09:17:45 linux SuSEfirewall2: batch committing...
Mar  5 09:17:45 linux SuSEfirewall2: Firewall rules successfully set
Mar  5 09:27:49 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  5 09:27:49 linux SuSEfirewall2: /var/lock/SuSEfirewall2.booting exists which means system boot in progress, exit.
Mar  5 09:27:50 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  5 09:27:50 linux SuSEfirewall2: /var/lock/SuSEfirewall2.booting exists which means system boot in progress, exit.
Mar  5 09:27:50 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  5 09:27:50 linux SuSEfirewall2: Setting up rules from /etc/sysconfig/SuSEfirewall2 ...
Mar  5 09:27:50 linux SuSEfirewall2: Warning: no interface active
Mar  5 09:27:50 linux SuSEfirewall2: batch committing...
Mar  5 09:27:51 linux SuSEfirewall2: Firewall rules successfully set
Mar  5 17:02:04 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  5 17:02:04 linux SuSEfirewall2: /var/lock/SuSEfirewall2.booting exists which means system boot in progress, exit.
Mar  5 17:02:04 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  5 17:02:05 linux SuSEfirewall2: /var/lock/SuSEfirewall2.booting exists which means system boot in progress, exit.
Mar  5 17:02:05 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  5 17:02:05 linux SuSEfirewall2: Setting up rules from /etc/sysconfig/SuSEfirewall2 ...
Mar  5 17:02:05 linux SuSEfirewall2: Warning: no interface active
Mar  5 17:02:05 linux SuSEfirewall2: batch committing...
Mar  5 17:02:05 linux SuSEfirewall2: Firewall rules successfully set

Offline Tomasz Jezierczuk

  • Users
  • Guru
  • *****
  • Wiadomości: 852
    • Zobacz profil
HP psc1410 na openSuSE 10
« Odpowiedź #26 dnia: 2006-03-05, 17:23:22 »
2006-03-05 17:17:58 tom123 napisał:

 > Mar  5 17:02:05 linux SuSEfirewall2: Warning: no interface active
 > Mar  5 17:02:05 linux SuSEfirewall2: batch committing...
 > Mar  5 17:02:05 linux SuSEfirewall2: Firewall rules successfully set
 >

iptables -nL

Offline

  • Users
  • Użytkownik
  • **
  • Wiadomości: 94
    • Zobacz profil
HP psc1410 na openSuSE 10
« Odpowiedź #27 dnia: 2006-03-05, 17:25:10 »
2006-03-05 17:23:22 jezior napisał:

> 2006-03-05 17:17:58 tom123 napisał:
 >
 >  > Mar  5 17:02:05 linux SuSEfirewall2: Warning: no interface active
 >  > Mar  5 17:02:05 linux SuSEfirewall2: batch committing...
 >  > Mar  5 17:02:05 linux SuSEfirewall2: Firewall rules successfully set
 >  >
 >
 > iptables -nL

nie rozumiem??

Offline Tomasz Jezierczuk

  • Users
  • Guru
  • *****
  • Wiadomości: 852
    • Zobacz profil
HP psc1410 na openSuSE 10
« Odpowiedź #28 dnia: 2006-03-05, 17:28:35 »
2006-03-05 17:25:10 tom123 napisał:
 
 >  > iptables -nL
 >
 > nie rozumiem??
 >

konsola a w niej:
su
haslo
iptables -nL

Offline

  • Users
  • Użytkownik
  • **
  • Wiadomości: 94
    • Zobacz profil
HP psc1410 na openSuSE 10
« Odpowiedź #29 dnia: 2006-03-05, 17:30:04 »
 >  > iptables -nL
 >
 
 Wpisalem jako root ta komende i oto log

 
Chain INPUT (policy DROP)
target     prot opt source               destination
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED
input_ext  all  --  0.0.0.0/0            0.0.0.0/0
LOG        all  --  0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-IN-ILL-TARGET \\'
DROP       all  --  0.0.0.0/0            0.0.0.0/0

Chain FORWARD (policy DROP)
target     prot opt source               destination
LOG        all  --  0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-FWD-ILL-ROUTING \\'

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0           state NEW,RELATED,ESTABLISHED
LOG        all  --  0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-OUT-ERROR \\'

Chain forward_ext (0 references)
target     prot opt source               destination

Chain input_ext (1 references)
target     prot opt source               destination
DROP       all  --  0.0.0.0/0            0.0.0.0/0           PKTTYPE = broadcast
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           icmp type 4
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           icmp type 8
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 0
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 3
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 11
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 12
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 14
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 18
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 3 code 2
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 5
reject_func  tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:113 state NEW
LOG        tcp  --  0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 tcp flags:0x17/0x02 LOG flags 6 level 4 prefix `SFW2-INext-DROP-DEFLT \\'
LOG        icmp --  0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-INext-DROP-DEFLT \\'
LOG        udp  --  0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-INext-DROP-DEFLT \\'
LOG        all  --  0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 state INVALID LOG flags 6 level 4 prefix `SFW2-INext-DROP-DEFLT-INV \\'
DROP       all  --  0.0.0.0/0            0.0.0.0/0

Chain reject_func (1 references)
target     prot opt source               destination
REJECT     tcp  --  0.0.0.0/0            0.0.0.0/0           reject-with tcp-reset
REJECT     udp  --  0.0.0.0/0            0.0.0.0/0           reject-with icmp-port-unreachable
REJECT     all  --  0.0.0.0/0            0.0.0.0/0           reject-with icmp-proto-unreachable