On May 15, 2011, at 10:09 AM, Wietse Venema wrote:

> jason hirsh:
>> 08:40:31.036997 IP mail-iy0-f182.google.com.51101 >  
>> tuna.theoceanwindow-bv.com.smtp: Flags [S], seq 850119283, win 5720,  
>> options [mss 1430,sackOK,TS val 2972295960 ecr 0,nop,wscale 6], length 0
> 
> SYN from google.com -> theoceanwindow-bv.com
> 
>> 08:40:34.037857 IP mail-iy0-f182.google.com.51101 >  
>> tuna.theoceanwindow-bv.com.smtp: Flags [S], seq 850119283, win 5720,  
>> options [mss 1430,sackOK,TS val 2972298960 ecr 0,nop,wscale 6], length 0
> 
> Retransmission: SYN from google.com -> theoceanwindow-bv.com
> 
>> 08:40:40.036791 IP mail-iy0-f182.google.com.51101 >  
>> tuna.theoceanwindow-bv.com.smtp: Flags [S], seq 850119283, win 5720,  
>> options [mss 1430,sackOK,TS val 2972304960 ecr 0,nop,wscale 6], length 0
> 
> Retransmission: SYN from google.com -> theoceanwindow-bv.com
> 
>> 08:40:50.037758 IP mail-iy0-f182.google.com.51101 >  
>> tuna.theoceanwindow-bv.com.smtp: Flags [S], seq 850119283, win 5720,  
>> options [mss 1430,sackOK,TS val 2972314960 ecr 0,nop,wscale 6], length 0
> 
> and so on.
> 
> The packet arrives on the network interface, but it is dropped
> (by firewall rule) before it reaches your TCP protocol engine,
> and therefore your machine does not respond.
> 
> Show your IPFW rules (or whatever the packet filter). I suspect
> a malformed net/mask rule.
> 
IPFW show as follows


00010  10199  16170990 allow ip from any to any via lo0
00015   2038    374094 allow ip from any to any via tap0
00035      0         0 allow ip from any to 10.8.0.0/24 keep-state
00037      0         0 allow ip from 10.8.0.0/24 to any keep-state
00040      0         0 deny tcp from any to any frag
00041      0         0 deny log ip from 221.192.199.49 to any
00050      0         0 check-state
00060 189242 105467724 allow tcp from any to any established
00070  32719   3680271 allow ip from any to any out keep-state
00080    324     27140 allow icmp from any to any
00100   3825    245465 allow log tcp from any to me dst-port 21 in setup 
keep-state
00105      0         0 allow log tcp from me 20,21 to any out keep-state
00120      0         0 allow log tcp from any to any dst-port 21 out
00130     13       676 allow tcp from any to any dst-port 22 in
00140      0         0 allow tcp from any to any dst-port 22 out
00150    261     15020 allow tcp from any to any dst-port 25 in
00160      0         0 allow tcp from any to any dst-port 25 out
00170   2625    197570 allow udp from any to any dst-port 53 in
00175      0         0 allow tcp from any to any dst-port 53 in
00180      0         0 allow udp from any to any dst-port 53 out
00185      0         0 allow tcp from any to any dst-port 53 out
00190    552     32580 allow tcp from any to any dst-port 80 in
00192      0         0 allow tcp from any to any dst-port 8010 in
00193      0         0 allow tcp from any to any dst-port 8010 out
00195      0         0 allow tcp from any to any dst-port 80 out
00196      0         0 allow tcp from any to any dst-port 81 in
00197      0         0 allow tcp from any to any dst-port 81 out
00198      0         0 allow udp from any to any dst-port 81 in
00199      0         0 allow udp from any to any dst-port 81 out
00209    156      9696 allow tcp from any to any dst-port 110 in
00210      0         0 allow tcp from any to any dst-port 110 out
00211 218000  17030046 allow udp from any to any dst-port 137 in
00212      0         0 allow tcp from any to any dst-port 137 in
00213      0         0 allow udp from any to any dst-port 137 out
00214      0         0 allow tcp from any to any dst-port 137 out
00215  24493   5357641 allow udp from any to any dst-port 138 in
00216      0         0 allow tcp from any to any dst-port 138 in
00217      0         0 allow udp from any to any dst-port 138 out
00218      0         0 allow tcp from any to any dst-port 138 out
00223      0         0 allow udp from any to any dst-port 139 in
00224      0         0 allow udp from any to any dst-port 139 out
00225      5       288 allow tcp from any to any dst-port 139 in
00226      0         0 allow tcp from any to any dst-port 139 out
00227      0         0 allow tcp from any to any dst-port 445 in
00228      0         0 allow tcp from any to any dst-port 445 out
00229      0         0 allow udp from any to any dst-port 445 in
00230      0         0 allow udp from any to any dst-port 445 out
00231    118      7264 allow ip from any to any dst-port 465 in
00232      0         0 allow ip from any to any dst-port 465 out
00240      0         0 allow ip from any to any dst-port 587 in
00242      0         0 allow ip from any to any dst-port 587 out
00250     57      3544 allow tcp from any to any dst-port 993 in
00251      0         0 allow tcp from any to any dst-port 993 out
00260   1714    108268 allow tcp from any to any dst-port 995 in
00261      0         0 allow tcp from any to any dst-port 995 out
00270      0         0 allow ip from any to any dst-port 1194 setup
00271     73      8194 allow udp from any to me dst-port 1194
00300   1172     60776 allow tcp from any to any dst-port 2500 in
00301      0         0 allow tcp from any to any dst-port 2500 out
00320      2        80 allow tcp from any to any dst-port 3128 in
00322      0         0 allow tcp from any to any dst-port 3218 out
00350      0         0 allow tcp from any to any dst-port 3306 in keep-state
00356      0         0 allow tcp from any to any dst-port 3306 out keep-state
00380      0         0 allow tcp from any to any dst-port 9000 in
00381      0         0 allow tcp from any to any dst-port 9000 out
00400      0         0 allow tcp from 209.160.65.133 to any keep-state
00405      0         0 allow tcp from 209.160.68.112 to any keep-state
00410      0         0 allow udp from me to any keep-state
00500   7812    887732 deny log ip from any to any
65535      0         0 deny ip from any to any


this may be a dumb question even for me.... but do i need a rule for 10025 
which I am using for amavisd-new??



>       Wietse

Reply via email to