So entsperren Sie Jabber auf dem ADSL-Router von TI mit iptables

447
meridius

Ich habe einen alten, aber zuverlässigen ADSL-Router von Texas Instruments.

Board AR7RD; BUILD = 061005; VERSION = 3.7.1 Wenn das wichtig ist ...

Eine Sache, die mich stört, ist, dass es irgendwie meinen Jabber blockiert (Pidgin mit Google-Konto verbunden).

Ich weiß, dass der Router es verursacht, weil ich verschiedene Router ausprobiert habe und Jabber mit ihnen gearbeitet habe. Ich habe die Einstellungen mehrmals durchsucht, konnte aber nichts finden, was auf die Blockierung hindeutet.

Ich habe es geschafft, es mit SSH zu erreichen, und ich dachte, es muss in den iptables-Einstellungen sein. Leider kann ich es nicht gut lesen, also wäre ich für jede Hilfe dankbar.

Hier ist die Originalausgabe von iptables -L

Chain INPUT (policy ACCEPT) target prot opt source destination  CFG tcp -- Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 192.168.1.6 anywhere tcp dpt:www Records Packet's Source Interface   CFG tcp -- Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 192.168.1.6 anywhere tcp dpt:443 Records Packet's Source Interface   ACCEPT tcp -- Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 0.0.0.0 anywhere state NEW tcp dpt:ssh  DROP tcp -- Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 0.0.0.0 anywhere state NEW tcp dpt:888  ACCEPT tcp -- Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 0.0.0.0 anywhere state NEW tcp dpt:www  ACCEPT tcp -- anywhere anywhere tcp dpt:www  ACCEPT icmp -- anywhere anywhere icmp echo-request state NEW  ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED  DROP all -- anywhere anywhere   Chain FORWARD (policy ACCEPT) target prot opt source destination  ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED  ACCEPT tcp -- anywhere Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 192.168.1.150 tcp dpt:ftp  ACCEPT tcp -- anywhere Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 192.168.1.150 tcp dpt:443  ACCEPT tcp -- anywhere Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 Set PR mark for socket 0xf = 230 192.168.1.150 tcp dpt:www  TCPMSS tcp -- anywhere anywhere tcp flags:SYN,RST/SYN TCPMSS clamp to PMTU  DROP all -- anywhere anywhere   Chain OUTPUT (policy ACCEPT) target prot opt source destination  DROP icmp -- anywhere anywhere icmp destination-unreachable  DROP icmp -- anywhere anywhere state INVALID 

und hier ist das gleiche, nachdem ich es ein wenig aufgeräumt habe

Chain INPUT (policy ACCEPT) target prot opt source destination  CFG tcp -- 192.168.1.6 anywhere tcp dpt:www Records Packet's Source Interface  CFG tcp -- 192.168.1.6 anywhere tcp dpt:443 Records Packet's Source Interface  ACCEPT tcp -- 0.0.0.0 anywhere state NEW tcp dpt:ssh  DROP tcp -- 0.0.0.0 anywhere state NEW tcp dpt:888  ACCEPT tcp -- 0.0.0.0 anywhere state NEW tcp dpt:www  ACCEPT tcp -- anywhere anywhere tcp dpt:www  ACCEPT icmp -- anywhere anywhere icmp echo-request state NEW  ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED  DROP all -- anywhere anywhere   Chain FORWARD (policy ACCEPT) target prot opt source destination  ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED  ACCEPT tcp -- anywhere 192.168.1.150 tcp dpt:ftp  ACCEPT tcp -- anywhere 192.168.1.150 tcp dpt:443  ACCEPT tcp -- anywhere 192.168.1.150 tcp dpt:www  TCPMSS tcp -- anywhere anywhere tcp flags:SYN,RST/SYN TCPMSS clamp to PMTU  DROP all -- anywhere anywhere   Chain OUTPUT (policy ACCEPT) target prot opt source destination  DROP icmp -- anywhere anywhere icmp destination-unreachable  DROP icmp -- anywhere anywhere state INVALID 
1

0 Antworten auf die Frage