Gervase wanted us to know:

>Sorry, how do I check that?  My name servers as listed are 212.67.96.129 & 130.
>> Can you telnet to port 53 of each of your nameservers (listed in
>> /etc/resolv.conf)?
>No. It tries and then hangs.

Same for me from the outside.  I agree with the other gentleman, you
need to ask them to allow TCP on their nameservers.   If they ask why,
tell them that not all DNS responses fit into a single UDP packet so it
will revert to TCP.  If they still question it, find another ISP.

>I actually turned off my firewall through YAST, the interface provided
>by SuSE, but have now turned the rules off again as suggested by Todd
>Lyons through 
>  iptables -F
>  iptables -P INPUT ACCEPT
>  iptables -P OUTPUT ACCEPT
>(how do I reverse this I wonder?)

I know how to do it in RedHat and Mandrake, not sure about Suse.

>I then get: 
>Chain INPUT (policy DROP)

Something has the firewall put back in.  Here's what I see on mine.  I
put in two sample rules and then used -F (Flush) to drop it.  If you are
still seeing rules in your system, then Yast is not doing what it tells
you it is doing (which has been my experience with Yast anyway).

[EMAIL PROTECTED] root]# iptables -L
Chain INPUT (policy ACCEPT)
target     prot opt source               destination         

Chain FORWARD (policy ACCEPT)
target     prot opt source               destination         

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination         

[EMAIL PROTECTED] root]# iptables -A INPUT -s 144.44.44.44 -j DROP
[EMAIL PROTECTED] root]# iptables -A OUTPUT -d 144.44.44.44 -j DROP
[EMAIL PROTECTED] root]# iptables -L -n
Chain INPUT (policy ACCEPT)
target     prot opt source               destination         
DROP       all  --  144.44.44.44         0.0.0.0/0           

Chain FORWARD (policy ACCEPT)
target     prot opt source               destination         

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination         
DROP       all  --  0.0.0.0/0            144.44.44.44        

[EMAIL PROTECTED] root]# iptables -F      
[EMAIL PROTECTED] root]# iptables -L -n
Chain INPUT (policy ACCEPT)
target     prot opt source               destination         

Chain FORWARD (policy ACCEPT)
target     prot opt source               destination         

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination         
[EMAIL PROTECTED] root]# 

-- 
Regards...              Todd
They that can give up essential liberty to obtain a little temporary 
safety deserve neither liberty nor safety.       --Benjamin Franklin
Linux kernel 2.6.3-4mdkenterprise   2 users,  load average: 0.00, 0.01, 0.00


-------------------------------------------------------
This SF.Net email is sponsored by: GNOME Foundation
Hackers Unite!  GUADEC: The world's #1 Open Source Desktop Event.
GNOME Users and Developers European Conference, 28-30th June in Norway
http://2004/guadec.org
_______________________________________________
Clamav-users mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/clamav-users

Reply via email to