Nowe posty

xx Problem ze sterownikami. (5)
2024-04-13, 21:25:16
xx Instalacja xfce4 (2)
2024-04-13, 16:20:17
xx Serie kompilacji bez instalacji dla “emerge” w Gentoo (2)
2024-04-08, 18:40:04
xx Plasma 6 w Neonie ssie trochę mniej ... (17)
2024-04-05, 10:03:46
xx Problem z Linux Lite po instalacji (3)
2024-04-03, 14:23:40
xx Jak właczyć num locka przy starcie systemu debian 12? (12)
2024-04-02, 17:43:54
xx Brak dźwieku w systemie. (5)
2024-04-02, 16:13:41
xx Dystrybucja pod HP Omen (7)
2024-03-29, 11:33:05
xx [Poradnik] Wyszukiwanie Sterowników (2)
2024-03-27, 21:08:23
xx Ile pingwinów? (1)
2024-03-27, 08:59:24

Autor Wątek: HP psc1410 na openSuSE 10  (Przeczytany 2083 razy)

jezior

  • Gość
HP psc1410 na openSuSE 10
« Odpowiedź #15 dnia: 2006-03-05, 13:03:19 »
2006-03-05 12:02:48 tom123 napisał:

> 2006-03-05 11:56:57 jezior napisał:  
 >  > a po co Ci maskarada? udostepniasz lacze?
 >
 > nie,mam zamiar tylko kiedys korzystac z p2p

Nie widze najmniejszego zwiazku ;-)

jezior

  • Gość
HP psc1410 na openSuSE 10
« Odpowiedź #16 dnia: 2006-03-05, 13:40:09 »
2006-03-05 12:07:23 tom123 napisał:

> co do iptables
 > to wszystko co czytam to pod debiana.Musze jeszcze poszperac i dopiero pozniej zadawac
 > pytanie.

Wszystko jedno czy debiljan czy cos innego. Iptables to iptables ;-)

tom123

  • Gość
HP psc1410 na openSuSE 10
« Odpowiedź #17 dnia: 2006-03-05, 16:51:43 »
 > I to wynik tej komendy?
 > less /var/log/messages | grep \\"SUseFirewall2\\"
 >
 > Cos sciemniasz ;-)

Jak wpisuje

su
haslo
less(spacja)/var/log/messages(spacja)|(spacja)grep(spacja)\\"SUseFirewall2
 to mam znow
linux:/home/***** #

tom123

  • Gość
HP psc1410 na openSuSE 10
« Odpowiedź #18 dnia: 2006-03-05, 16:57:38 »
2006-03-05 13:40:09 jezior napisał:

> 2006-03-05 12:07:23 tom123 napisał:
 >
 > > co do iptables
 >  > to wszystko co czytam to pod debiana.Musze jeszcze poszperac i dopiero pozniej zadawac
 >  > pytanie.
 >
 > Wszystko jedno czy debiljan czy cos innego. Iptables to iptables ;-)
 >

dla mnie nie wszystko jedno.Dlugo mialem winde,ciezko mi sie przyzwyczaic.
Nawet nie wiem gdzie,ani jak wejsc w iptables,wiem tylko Yast i firewall a tam z konsoli to nie wiem czy cos sie wpisuje?Chyba nie?

jezior

  • Gość
HP psc1410 na openSuSE 10
« Odpowiedź #19 dnia: 2006-03-05, 16:59:51 »
2006-03-05 16:51:43 tom123 napisał:
less(spacja)/var/log/messages(spacja)|(spacja)grep(spacja)\\"SUseFirewall2
 >  to mam znow
 > linux:/home/***** #

czyli albo zle wpisales komunikat bledu, albo Susefirewall nie zostawia nic w logach.

Przepisz tu jeszcze raz DOKLADNIE BEZ LITERÓWEK TYPU \\"SETAP\\" komunikat bledu bo napewno nie jest to jak pisales:
cytat:
\\"Nie mozna wlaczyc SUseFirewall2_setap\\"

tom123

  • Gość
HP psc1410 na openSuSE 10
« Odpowiedź #20 dnia: 2006-03-05, 17:00:07 »
Ja nawet nie wiem,a czytalem o tym jak sie logowac jako root:(To nie wskazane,wiem.Loguje sie automatycznie jako uzytkownik a haslo root podaje jesli porzebuje tego jakas opcja

tom123

  • Gość
HP psc1410 na openSuSE 10
« Odpowiedź #21 dnia: 2006-03-05, 17:05:29 »
2006-03-05 16:59:51 jezior napisał:

> 2006-03-05 16:51:43 tom123 napisał:
 > less(spacja)/var/log/messages(spacja)|(spacja)grep(spacja)\\"SUseFirewall2
 >  >  to mam znow
 >  > linux:/home/***** #
 >
 > czyli albo zle wpisales komunikat bledu, albo Susefirewall nie zostawia nic w logach.
 >
 > Przepisz tu jeszcze raz DOKLADNIE BEZ LITERÓWEK TYPU \\"SETAP\\" komunikat bledu bo
 > napewno nie jest to jak pisales:
 > cytat:

 > \\"Nie mozna wlaczyc SUseFirewall2_setap\\"


Dokladnie jest tak:


X   Błąd

Nie można włączyć usługi `SuSEfirewall2_setup`

jezior

  • Gość
HP psc1410 na openSuSE 10
« Odpowiedź #22 dnia: 2006-03-05, 17:07:28 »
2006-03-05 17:05:29 tom123 napisał:

 > Nie można włączyć usługi `SuSEfirewall2_setup`

whereis SuSEfirewall2_setup

tom123

  • Gość
HP psc1410 na openSuSE 10
« Odpowiedź #23 dnia: 2006-03-05, 17:13:58 »
2006-03-05 17:07:28 jezior napisał:

> 2006-03-05 17:05:29 tom123 napisał:
 >
 >  > Nie można włączyć usługi `SuSEfirewall2_setup`
 >
 > whereis SuSEfirewall2_setup

Wlasnie sprawdzalem w Yast czy mam zainstalowane pakiety.
Wpisalem iptables i wyskoczylo od haczykowane
iptables
SuSEfirewall2

jezior

  • Gość
HP psc1410 na openSuSE 10
« Odpowiedź #24 dnia: 2006-03-05, 17:17:14 »
2006-03-05 17:13:58 tom123 napisał:

 > Wlasnie sprawdzalem w Yast czy mam zainstalowane pakiety.
 > Wpisalem iptables i wyskoczylo od haczykowane
 > iptables
 > SuSEfirewall2

Brawo ;-)
To podstawowa roznica pomiedzy linuxem i windowsem. Linux wymaga myslenia ;-)

tom123

  • Gość
HP psc1410 na openSuSE 10
« Odpowiedź #25 dnia: 2006-03-05, 17:17:58 »
log z wpisanym poprawnie bledem



Mar  3 13:02:16 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  3 13:02:17 linux SuSEfirewall2: batch committing...
Mar  3 13:02:18 linux SuSEfirewall2: Firewall rules set to CLOSE.
Mar  3 13:02:18 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  3 13:02:18 linux SuSEfirewall2: Setting up rules from /etc/sysconfig/SuSEfirewall2 ...
Mar  3 13:02:18 linux SuSEfirewall2: Warning: no interface active
Mar  3 13:02:19 linux SuSEfirewall2: batch committing...
Mar  3 13:02:19 linux SuSEfirewall2: Firewall rules successfully set
Mar  3 21:53:40 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  3 21:53:40 linux SuSEfirewall2: /var/lock/SuSEfirewall2.booting exists which means system boot in progress, exit.
Mar  3 21:54:06 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  3 21:54:06 linux SuSEfirewall2: /var/lock/SuSEfirewall2.booting exists which means system boot in progress, exit.
Mar  3 21:54:21 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  3 21:54:21 linux SuSEfirewall2: /var/lock/SuSEfirewall2.booting exists which means system boot in progress, exit.
Mar  3 21:55:03 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  3 21:55:03 linux SuSEfirewall2: /var/lock/SuSEfirewall2.booting exists which means system boot in progress, exit.
Mar  3 21:55:19 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  3 21:55:19 linux SuSEfirewall2: /var/lock/SuSEfirewall2.booting exists which means system boot in progress, exit.
Mar  4 19:56:20 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  4 19:56:21 linux SuSEfirewall2: batch committing...
Mar  4 19:56:21 linux SuSEfirewall2: Firewall rules set to CLOSE.
Mar  4 19:56:21 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  4 19:56:21 linux SuSEfirewall2: Setting up rules from /etc/sysconfig/SuSEfirewall2 ...
Mar  4 19:56:21 linux SuSEfirewall2: Warning: no interface active
Mar  4 19:56:22 linux SuSEfirewall2: batch committing...
Mar  4 19:56:22 linux SuSEfirewall2: Firewall rules successfully set
Mar  4 19:56:27 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  4 19:56:27 linux SuSEfirewall2: batch committing...
Mar  4 19:56:27 linux SuSEfirewall2: Firewall rules unloaded.
Mar  4 19:56:28 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  4 19:56:28 linux SuSEfirewall2: batch committing...
Mar  4 19:56:28 linux SuSEfirewall2: Firewall rules set to CLOSE.
Mar  4 19:56:28 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  4 19:56:28 linux SuSEfirewall2: Setting up rules from /etc/sysconfig/SuSEfirewall2 ...
Mar  4 19:56:28 linux SuSEfirewall2: Warning: no interface active
Mar  4 19:56:29 linux SuSEfirewall2: batch committing...
Mar  4 19:56:29 linux SuSEfirewall2: Firewall rules successfully set
Mar  4 20:00:11 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  4 20:00:12 linux SuSEfirewall2: batch committing...
Mar  4 20:00:12 linux SuSEfirewall2: Firewall rules unloaded.
Mar  4 20:00:12 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  4 20:00:12 linux SuSEfirewall2: batch committing...
Mar  4 20:00:12 linux SuSEfirewall2: Firewall rules set to CLOSE.
Mar  4 20:00:12 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  4 20:00:12 linux SuSEfirewall2: Setting up rules from /etc/sysconfig/SuSEfirewall2 ...
Mar  4 20:00:12 linux SuSEfirewall2: Warning: no interface active
Mar  4 20:00:13 linux SuSEfirewall2: batch committing...
Mar  4 20:00:14 linux SuSEfirewall2: Firewall rules successfully set
Mar  5 09:17:37 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  5 09:17:37 linux SuSEfirewall2: /var/lock/SuSEfirewall2.booting exists which means system boot in progress, exit.
Mar  5 09:17:38 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  5 09:17:38 linux SuSEfirewall2: /var/lock/SuSEfirewall2.booting exists which means system boot in progress, exit.
Mar  5 09:17:38 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  5 09:17:38 linux SuSEfirewall2: Setting up rules from /etc/sysconfig/SuSEfirewall2 ...
Mar  5 09:17:38 linux SuSEfirewall2: Warning: no interface active
Mar  5 09:17:38 linux SuSEfirewall2: batch committing...
Mar  5 09:17:39 linux SuSEfirewall2: Firewall rules successfully set
Mar  5 09:17:43 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  5 09:17:43 linux SuSEfirewall2: batch committing...
Mar  5 09:17:43 linux SuSEfirewall2: Firewall rules unloaded.
Mar  5 09:17:44 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  5 09:17:44 linux SuSEfirewall2: batch committing...
Mar  5 09:17:44 linux SuSEfirewall2: Firewall rules set to CLOSE.
Mar  5 09:17:44 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  5 09:17:44 linux SuSEfirewall2: Setting up rules from /etc/sysconfig/SuSEfirewall2 ...
Mar  5 09:17:44 linux SuSEfirewall2: Warning: no interface active
Mar  5 09:17:45 linux SuSEfirewall2: batch committing...
Mar  5 09:17:45 linux SuSEfirewall2: Firewall rules successfully set
Mar  5 09:27:49 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  5 09:27:49 linux SuSEfirewall2: /var/lock/SuSEfirewall2.booting exists which means system boot in progress, exit.
Mar  5 09:27:50 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  5 09:27:50 linux SuSEfirewall2: /var/lock/SuSEfirewall2.booting exists which means system boot in progress, exit.
Mar  5 09:27:50 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  5 09:27:50 linux SuSEfirewall2: Setting up rules from /etc/sysconfig/SuSEfirewall2 ...
Mar  5 09:27:50 linux SuSEfirewall2: Warning: no interface active
Mar  5 09:27:50 linux SuSEfirewall2: batch committing...
Mar  5 09:27:51 linux SuSEfirewall2: Firewall rules successfully set
Mar  5 17:02:04 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  5 17:02:04 linux SuSEfirewall2: /var/lock/SuSEfirewall2.booting exists which means system boot in progress, exit.
Mar  5 17:02:04 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  5 17:02:05 linux SuSEfirewall2: /var/lock/SuSEfirewall2.booting exists which means system boot in progress, exit.
Mar  5 17:02:05 linux SuSEfirewall2: Warning: ip6tables does not support state matching. Extended IPv6 support disabled.
Mar  5 17:02:05 linux SuSEfirewall2: Setting up rules from /etc/sysconfig/SuSEfirewall2 ...
Mar  5 17:02:05 linux SuSEfirewall2: Warning: no interface active
Mar  5 17:02:05 linux SuSEfirewall2: batch committing...
Mar  5 17:02:05 linux SuSEfirewall2: Firewall rules successfully set

jezior

  • Gość
HP psc1410 na openSuSE 10
« Odpowiedź #26 dnia: 2006-03-05, 17:23:22 »
2006-03-05 17:17:58 tom123 napisał:

 > Mar  5 17:02:05 linux SuSEfirewall2: Warning: no interface active
 > Mar  5 17:02:05 linux SuSEfirewall2: batch committing...
 > Mar  5 17:02:05 linux SuSEfirewall2: Firewall rules successfully set
 >

iptables -nL

tom123

  • Gość
HP psc1410 na openSuSE 10
« Odpowiedź #27 dnia: 2006-03-05, 17:25:10 »
2006-03-05 17:23:22 jezior napisał:

> 2006-03-05 17:17:58 tom123 napisał:
 >
 >  > Mar  5 17:02:05 linux SuSEfirewall2: Warning: no interface active
 >  > Mar  5 17:02:05 linux SuSEfirewall2: batch committing...
 >  > Mar  5 17:02:05 linux SuSEfirewall2: Firewall rules successfully set
 >  >
 >
 > iptables -nL

nie rozumiem??

jezior

  • Gość
HP psc1410 na openSuSE 10
« Odpowiedź #28 dnia: 2006-03-05, 17:28:35 »
2006-03-05 17:25:10 tom123 napisał:
 
 >  > iptables -nL
 >
 > nie rozumiem??
 >

konsola a w niej:
su
haslo
iptables -nL

tom123

  • Gość
HP psc1410 na openSuSE 10
« Odpowiedź #29 dnia: 2006-03-05, 17:30:04 »
 >  > iptables -nL
 >
 
 Wpisalem jako root ta komende i oto log

 
Chain INPUT (policy DROP)
target     prot opt source               destination
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED
input_ext  all  --  0.0.0.0/0            0.0.0.0/0
LOG        all  --  0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-IN-ILL-TARGET \\'
DROP       all  --  0.0.0.0/0            0.0.0.0/0

Chain FORWARD (policy DROP)
target     prot opt source               destination
LOG        all  --  0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-FWD-ILL-ROUTING \\'

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0           state NEW,RELATED,ESTABLISHED
LOG        all  --  0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-OUT-ERROR \\'

Chain forward_ext (0 references)
target     prot opt source               destination

Chain input_ext (1 references)
target     prot opt source               destination
DROP       all  --  0.0.0.0/0            0.0.0.0/0           PKTTYPE = broadcast
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           icmp type 4
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           icmp type 8
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 0
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 3
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 11
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 12
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 14
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 18
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 3 code 2
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 5
reject_func  tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:113 state NEW
LOG        tcp  --  0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 tcp flags:0x17/0x02 LOG flags 6 level 4 prefix `SFW2-INext-DROP-DEFLT \\'
LOG        icmp --  0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-INext-DROP-DEFLT \\'
LOG        udp  --  0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-INext-DROP-DEFLT \\'
LOG        all  --  0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 state INVALID LOG flags 6 level 4 prefix `SFW2-INext-DROP-DEFLT-INV \\'
DROP       all  --  0.0.0.0/0            0.0.0.0/0

Chain reject_func (1 references)
target     prot opt source               destination
REJECT     tcp  --  0.0.0.0/0            0.0.0.0/0           reject-with tcp-reset
REJECT     udp  --  0.0.0.0/0            0.0.0.0/0           reject-with icmp-port-unreachable
REJECT     all  --  0.0.0.0/0            0.0.0.0/0           reject-with icmp-proto-unreachable