Tenho um roteador ADSL antigo, porém confiável, da Texas Instruments.
Board AR7RD; BUILD=061005; VERSION=3.7.1 If that matters...
Uma coisa que me incomoda é que de alguma forma bloquear o meu jabber (Pidgin conectado à conta do Google).
Eu sei que o roteador está causando isso, porque eu tentei vários roteadores diferentes e o jabber estava trabalhando com eles. Pesquisei várias vezes por suas configurações, mas não consegui encontrar nada que indicasse o bloqueio.
Consegui fazê-lo usando o SSH e concluí que deveria estar nas configurações do iptables. Infelizmente não consigo lê-lo bem, então eu ficaria muito grato por qualquer ajuda.
Aqui está a saída original do iptables -L
Chain INPUT (policy ACCEPT)
target prot opt source destination
CFG tcp -- Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
192.168.1.6 anywhere tcp dpt:www Records Packet's Source Interface
CFG tcp -- Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
192.168.1.6 anywhere tcp dpt:443 Records Packet's Source Interface
ACCEPT tcp -- Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
0.0.0.0 anywhere state NEW tcp dpt:ssh
DROP tcp -- Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
0.0.0.0 anywhere state NEW tcp dpt:888
ACCEPT tcp -- Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
0.0.0.0 anywhere state NEW tcp dpt:www
ACCEPT tcp -- anywhere anywhere tcp dpt:www
ACCEPT icmp -- anywhere anywhere icmp echo-request state NEW
ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED
DROP all -- anywhere anywhere
Chain FORWARD (policy ACCEPT)
target prot opt source destination
ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED
ACCEPT tcp -- anywhere Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
192.168.1.150 tcp dpt:ftp
ACCEPT tcp -- anywhere Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
192.168.1.150 tcp dpt:443
ACCEPT tcp -- anywhere Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
192.168.1.150 tcp dpt:www
TCPMSS tcp -- anywhere anywhere tcp flags:SYN,RST/SYN TCPMSS clamp to PMTU
DROP all -- anywhere anywhere
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
DROP icmp -- anywhere anywhere icmp destination-unreachable
DROP icmp -- anywhere anywhere state INVALID
e aqui é o mesmo depois que eu limpei um pouco
Chain INPUT (policy ACCEPT)
target prot opt source destination
CFG tcp -- 192.168.1.6 anywhere tcp dpt:www Records Packet's Source Interface
CFG tcp -- 192.168.1.6 anywhere tcp dpt:443 Records Packet's Source Interface
ACCEPT tcp -- 0.0.0.0 anywhere state NEW tcp dpt:ssh
DROP tcp -- 0.0.0.0 anywhere state NEW tcp dpt:888
ACCEPT tcp -- 0.0.0.0 anywhere state NEW tcp dpt:www
ACCEPT tcp -- anywhere anywhere tcp dpt:www
ACCEPT icmp -- anywhere anywhere icmp echo-request state NEW
ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED
DROP all -- anywhere anywhere
Chain FORWARD (policy ACCEPT)
target prot opt source destination
ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED
ACCEPT tcp -- anywhere 192.168.1.150 tcp dpt:ftp
ACCEPT tcp -- anywhere 192.168.1.150 tcp dpt:443
ACCEPT tcp -- anywhere 192.168.1.150 tcp dpt:www
TCPMSS tcp -- anywhere anywhere tcp flags:SYN,RST/SYN TCPMSS clamp to PMTU
DROP all -- anywhere anywhere
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
DROP icmp -- anywhere anywhere icmp destination-unreachable
DROP icmp -- anywhere anywhere state INVALID