Hi, just to be more precise, i include here my iptable config, sysctl.conf, and i list the rc.local stuff. Is it possible that i did some mess in some of these files and that caused the crashes that follow me in many systems (wheezy, stable).
Iptables firewall config: #!/bin/sh sysctl net.netfilter.nf_conntrack_acct=1 # Variables IPTABLES=/sbin/iptables WAN_IFACE="ath0 eth0" if [ "$1" = "start" ]; then echo "Starting Firewall" # Flush Current Rules $IPTABLES -F $IPTABLES -X # delete all user-defined chains echo 1 > /proc/sys/net/ipv4/tcp_syncookies # DoS Protection echo 1 > /proc/sys/net/ipv4/icmp_echo_ignore_broadcasts # Disable responding to ping broadcasts echo 1 > /proc/sys/net/ipv4/conf/all/rp_filter # disable spoofing on all interfaces # Set Default Rules for Chains $IPTABLES -P INPUT DROP # Drop every packet from the outside $IPTABLES -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT # Allow requested INPUTS # Accept local requests $IPTABLES -P OUTPUT ACCEPT # Drop since NAT protocol is not required $IPTABLES -P FORWARD DROP #allow src==dst==lo $IPTABLES -A INPUT -i lo -d 127.0.0.1 -j ACCEPT $IPTABLES -A OUTPUT -o lo -s 127.0.0.1 -j ACCEPT $IPTABLES -A INPUT -p tcp -m tcp --dport 6000 -j DROP $IPTABLES -A OUTPUT -p tcp -m tcp --sport 6000 -j DROP cat /root/stop6 |ip6tables-restore # Section to open desired ports # Open Ports for SSH and HTTP #$IPTABLES -A INPUT -i $WAN_IFACE -p TCP --destination-port 22 -j ACCEPT #$IPTABLES -A INPUT -i $WAN_IFACE -p TCP --destination-port 80 -j ACCEPT elif [ "$1" = "stop" ]; then echo "Firewall Halted" $IPTABLES -F $IPTABLES -X $IPTABLES -P INPUT ACCEPT $IPTABLES -P FORWARD DROP $IPTABLES -A INPUT -p tcp -m tcp --dport 6000 -j DROP $IPTABLES -A OUTPUT -p tcp -m tcp --sport 6000 -j DROP elif [ "$1" = "status" ]; then $IPTABLES -L -v -n else echo "usage: $0 start|stop|status" fi #iptables -A INPUT -p tcp -m tcp --dport 6000 -j DROP;iptables -A OUTPUT -p tcp -m tcp --sport 6000 -j DROP ----------------------------- /etc/sysctl.conf: # # /etc/sysctl.conf - Configuration file for setting system variables # See /etc/sysctl.d/ for additonal system variables # See sysctl.conf (5) for information. # #kernel.domainname = example.com # Uncomment the following to stop low-level messages on console #kernel.printk = 3 4 1 3 ##############################################################3 # Functions previously found in netbase # # Uncomment the next two lines to enable Spoof protection (reverse-path filter) # Turn on Source Address Verification in all interfaces to # prevent some spoofing attacks #net.ipv4.conf.default.rp_filter=1 #net.ipv4.conf.all.rp_filter=1 # Uncomment the next line to enable TCP/IP SYN cookies # See http://lwn.net/Articles/277146/ # Note: This may impact IPv6 TCP sessions too #net.ipv4.tcp_syncookies=1 # Uncomment the next line to enable packet forwarding for IPv4 #net.ipv4.ip_forward=1 # Uncomment the next line to enable packet forwarding for IPv6 # Enabling this option disables Stateless Address Autoconfiguration # based on Router Advertisements for this host #net.ipv6.conf.all.forwarding=1 ################################################################### # Additional settings - these settings can improve the network # security of the host and prevent against some network attacks # including spoofing attacks and man in the middle attacks through # redirection. Some network environments, however, require that these # settings are disabled so review and enable them as needed. # # Do not accept ICMP redirects (prevent MITM attacks) net.ipv4.conf.all.accept_redirects = 0 #net.ipv6.conf.all.accept_redirects = 0 # _or_ # Accept ICMP redirects only for gateways listed in our default # gateway list (enabled by default) # net.ipv4.conf.all.secure_redirects = 1 # # Do not send ICMP redirects (we are not a router) #net.ipv4.conf.all.send_redirects = 0 # # Do not accept IP source route packets (we are not a router) #net.ipv4.conf.all.accept_source_route = 0 #net.ipv6.conf.all.accept_source_route = 0 # # Log Martian Packets net.ipv4.conf.all.log_martians = 1 # net.ipv4.conf.default.accept_source_route = 0 net.ipv6.conf.default.disable_ipv6 = 1 net.ipv4.ip_default_ttl = 128 net.ipv4.conf.eth0.accept_source_route = 0 net.ipv4.conf.wlan0.accept_source_route = 0 net.ipv6.conf.lo.disable_ipv6 = 1 net.ipv6.conf.eth0.disable_ipv6 = 1 net.ipv6.conf.wlan0.disable_ipv6 = 1 -------------------------- /etc/rc.config call some scripts to set the firewall, bring eth0 up, it removes two modules (the cam and the joystik modules), remove the dhcp-fail network (169.254.0.0/16), mount the ramdisk (1 GB) and then call ethtool to fix the "UDP checksum fail" issue of my net card: #!/bin/sh -e # # rc.local # # This script is executed at the end of each multiuser runlevel. # Make sure that the script will "exit 0" on success or any other # value on error. # # In order to enable or disable this script just change the execution # bits. # # By default this script does nothing. /root/./btfirewall.sh start /root/./btfirewall.sh start /root/./upnet modprobe -r uvcvideo;modprobe -r joydev route del -net 169.254.0.0/16 /root/./IL-RDISK-1G ethtool -K eth0 rx off exit 0 ------------------ These files are the only cusomisation i did on this machine. I use these files either in squeeze and wheezy. I hope this can help to further investigate on this issue. bye Asdrubale -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org