Como desbloquear o jabber no roteador ADSL da TI com iptables

1

Tenho um roteador ADSL antigo, porém confiável, da Texas Instruments.

Board AR7RD; BUILD=061005; VERSION=3.7.1 If that matters...

Uma coisa que me incomoda é que de alguma forma bloquear o meu jabber (Pidgin conectado à conta do Google).

Eu sei que o roteador está causando isso, porque eu tentei vários roteadores diferentes e o jabber estava trabalhando com eles. Pesquisei várias vezes por suas configurações, mas não consegui encontrar nada que indicasse o bloqueio.

Consegui fazê-lo usando o SSH e concluí que deveria estar nas configurações do iptables. Infelizmente não consigo lê-lo bem, então eu ficaria muito grato por qualquer ajuda.

Aqui está a saída original do iptables -L

Chain INPUT (policy ACCEPT)
target     prot opt source               destination         
CFG        tcp  --  Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
192.168.1.6          anywhere           tcp dpt:www Records Packet's Source Interface 

CFG        tcp  --  Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
192.168.1.6          anywhere           tcp dpt:443 Records Packet's Source Interface 

ACCEPT     tcp  --  Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
0.0.0.0              anywhere           state NEW tcp dpt:ssh 
DROP       tcp  --  Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
0.0.0.0              anywhere           state NEW tcp dpt:888 
ACCEPT     tcp  --  Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
0.0.0.0              anywhere           state NEW tcp dpt:www 
ACCEPT     tcp  --  anywhere             anywhere           tcp dpt:www 
ACCEPT     icmp --  anywhere             anywhere           icmp echo-request state NEW 
ACCEPT     all  --  anywhere             anywhere           state RELATED,ESTABLISHED 
DROP       all  --  anywhere             anywhere           

Chain FORWARD (policy ACCEPT)
target     prot opt source               destination         
ACCEPT     all  --  anywhere             anywhere           state RELATED,ESTABLISHED 
ACCEPT     tcp  --  anywhere             Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
192.168.1.150      tcp dpt:ftp 
ACCEPT     tcp  --  anywhere             Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
192.168.1.150      tcp dpt:443 
ACCEPT     tcp  --  anywhere             Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
Set PR mark for socket 0xf = 230
192.168.1.150      tcp dpt:www 
TCPMSS     tcp  --  anywhere             anywhere           tcp flags:SYN,RST/SYN TCPMSS clamp to PMTU 
DROP       all  --  anywhere             anywhere           

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination         
DROP       icmp --  anywhere             anywhere           icmp destination-unreachable 
DROP       icmp --  anywhere             anywhere           state INVALID

e aqui é o mesmo depois que eu limpei um pouco

Chain INPUT (policy ACCEPT)
target     prot opt source               destination         
CFG        tcp  --  192.168.1.6          anywhere           tcp dpt:www Records Packet's Source Interface 
CFG        tcp  --  192.168.1.6          anywhere           tcp dpt:443 Records Packet's Source Interface 
ACCEPT     tcp  --  0.0.0.0              anywhere           state NEW tcp dpt:ssh 
DROP       tcp  --  0.0.0.0              anywhere           state NEW tcp dpt:888 
ACCEPT     tcp  --  0.0.0.0              anywhere           state NEW tcp dpt:www 
ACCEPT     tcp  --  anywhere             anywhere           tcp dpt:www 
ACCEPT     icmp --  anywhere             anywhere           icmp echo-request state NEW 
ACCEPT     all  --  anywhere             anywhere           state RELATED,ESTABLISHED 
DROP       all  --  anywhere             anywhere           

Chain FORWARD (policy ACCEPT)
target     prot opt source               destination         
ACCEPT     all  --  anywhere             anywhere           state RELATED,ESTABLISHED 
ACCEPT     tcp  --  anywhere             192.168.1.150      tcp dpt:ftp 
ACCEPT     tcp  --  anywhere             192.168.1.150      tcp dpt:443 
ACCEPT     tcp  --  anywhere             192.168.1.150      tcp dpt:www 
TCPMSS     tcp  --  anywhere             anywhere           tcp flags:SYN,RST/SYN TCPMSS clamp to PMTU 
DROP       all  --  anywhere             anywhere           

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination         
DROP       icmp --  anywhere             anywhere           icmp destination-unreachable 
DROP       icmp --  anywhere             anywhere           state INVALID
    
por meridius 07.01.2013 / 08:28

0 respostas