Hi,
ich versuch noch mal mein Glück mit Ipsec!
> % setkey -D
setkey -D
192.168.2.2 192.168.2.8
esp mode=tunnel spi=889221295(0x350070af) reqid=0(0x00000000)
E: 3des-cbc 76c52359 4f493b5f 4aa89dbb 3cbabd39 d3c041b7 f2a0004d
A: hmac-sha1 8c00dcb0 60e1d07d dc764168 8f051666 3883b1f5
seq=0x0000000f replay=4 flags=0x00000000 state=mature
created: Nov 30 17:29:55 2004 current: Nov 30 17:31:03 2004
diff: 68(s) hard: 900(s) soft: 720(s)
last: Nov 30 17:30:53 2004 hard: 0(s) soft: 0(s)
current: 1776(bytes) hard: 0(bytes) soft: 0(bytes)
allocated: 15 hard: 0 soft: 0
sadb_seq=1 pid=678 refcnt=2
192.168.2.8 192.168.2.2
esp mode=tunnel spi=216811875(0x0cec4963) reqid=0(0x00000000)
E: 3des-cbc 7710a450 fc84245c 8f011bcc 52a8eaa9 f7cccc02 2d8dd854
A: hmac-sha1 655df519 fc75c7d3 10d5427c 4bdcfc73 ab89b238
seq=0x00000000 replay=4 flags=0x00000000 state=mature
created: Nov 30 17:29:55 2004 current: Nov 30 17:31:03 2004
diff: 68(s) hard: 900(s) soft: 720(s)
last: Nov 30 17:30:58 2004 hard: 0(s) soft: 0(s)
current: 2502(bytes) hard: 0(bytes) soft: 0(bytes)
allocated: 28 hard: 0 soft: 0
sadb_seq=0 pid=678 refcnt=1
> % setkey -DP
setkey -DP
192.168.2.8[any] 0.0.0.0/0[any] any
in ipsec
esp/tunnel/192.168.2.8-192.168.2.2/require
spid=1 seq=1 pid=679
refcnt=1
0.0.0.0/0[any] 192.168.2.8[any] any
out ipsec
esp/tunnel/192.168.2.2-192.168.2.8/require
spid=2 seq=0 pid=679
refcnt=1
> auf FreeBSD und die Ausgabe von
>
> % ipseccmd show all
Local Policy
-----------------------
Local Policy Name: wifi
Description:
Last Changed: Fri Nov 26 16:33:47 2004
Policy Path:
HKLM\SOFTWARE\Policies\Microsoft\Windows\IPSec\Policy\Local\ipsecPolicy{2585cf0b-587a-4d2e-a80f-a07878cedcae}
Generic MM Filters
------------------------------
Generic MM Filter #1:
Name : 4
Filter Id : {93E3BF55-2A6B-4137-B179-1008AC51C7FB}
Policy Id : {E6C31F1A-64DC-4B94-85CB-6F109B67A1FA}
Name : 2
Policy Id : {E6C31F1A-64DC-4B94-85CB-6F109B67A1FA}
Flags : 2 (Default)
Soft SA expiration time : 28800
Offer #1
3DES SHA1 DH Group 2
Quickmode limit : 0, Lifetime 0Kbytes/28800seconds
Offer #2
3DES MD5 DH Group 2
Quickmode limit : 0, Lifetime 0Kbytes/28800seconds
Offer #3
DES SHA1 DH Group 1
Quickmode limit : 0, Lifetime 0Kbytes/28800seconds
Offer #4
DES MD5 DH Group 1
Quickmode limit : 0, Lifetime 0Kbytes/28800seconds
Src Addr : Me
Des Addr : 192.168.2.2
Mirrored : True
Interface Type : LAN
Auth Methods Id: {15D44B0B-3D49-4368-B457-F74F565DD7AD}
AM #1 : Preshared Key : *************** :-)
Generic MM Filter #2:
Name : 3
Filter Id : {7950E7D7-C01D-415A-B42E-B2659F3D5EF0}
Policy Id : {E6C31F1A-64DC-4B94-85CB-6F109B67A1FA}
Name : 2
Policy Id : {E6C31F1A-64DC-4B94-85CB-6F109B67A1FA}
Flags : 2 (Default)
Soft SA expiration time : 28800
Offer #1
3DES SHA1 DH Group 2
Quickmode limit : 0, Lifetime 0Kbytes/28800seconds
Offer #2
3DES MD5 DH Group 2
Quickmode limit : 0, Lifetime 0Kbytes/28800seconds
Offer #3
DES SHA1 DH Group 1
Quickmode limit : 0, Lifetime 0Kbytes/28800seconds
Offer #4
DES MD5 DH Group 1
Quickmode limit : 0, Lifetime 0Kbytes/28800seconds
Src Addr : Me
Des Addr : 192.168.2.8
Mirrored : True
Interface Type : LAN
Auth Methods Id: {6C19988B-FF71-4DB6-8F41-40BCDABDFF64}
AM #1 : Preshared Key : *************** :-)
Specific MM Filters
------------------------------
Specific MM Filter #1:
Name : 4
Filter Id : {93E3BF55-2A6B-4137-B179-1008AC51C7FB}
Policy Id : {E6C31F1A-64DC-4B94-85CB-6F109B67A1FA}
Src Addr : 192.168.2.8
Des Addr : 192.168.2.2
Direction : Outbound, Weight : 69206017
Interface Type : LAN
Auth Methods Id: {15D44B0B-3D49-4368-B457-F74F565DD7AD}
Specific MM Filter #2:
Name : 4
Filter Id : {93E3BF55-2A6B-4137-B179-1008AC51C7FB}
Policy Id : {E6C31F1A-64DC-4B94-85CB-6F109B67A1FA}
Src Addr : 192.168.2.2
Des Addr : 192.168.2.8
Direction : Inbound, Weight : 69206017
Interface Type : LAN
Auth Methods Id: {15D44B0B-3D49-4368-B457-F74F565DD7AD}
Specific MM Filter #3:
Name : 4
Filter Id : {93E3BF55-2A6B-4137-B179-1008AC51C7FB}
Policy Id : {E6C31F1A-64DC-4B94-85CB-6F109B67A1FA}
Src Addr : 169.254.166.129
Des Addr : 192.168.2.2
Direction : Outbound, Weight : 69206017
Interface Type : LAN
Auth Methods Id: {15D44B0B-3D49-4368-B457-F74F565DD7AD}
Specific MM Filter #4:
Name : 4
Filter Id : {93E3BF55-2A6B-4137-B179-1008AC51C7FB}
Policy Id : {E6C31F1A-64DC-4B94-85CB-6F109B67A1FA}
Src Addr : 192.168.2.2
Des Addr : 169.254.166.129
Direction : Inbound, Weight : 69206017
Interface Type : LAN
Auth Methods Id: {15D44B0B-3D49-4368-B457-F74F565DD7AD}
Generic Transport Filters
------------------------------
No filters
Specific Transport Filters
------------------------------
No filters
Generic Tunnel Filters
------------------------------
Generic Tunnel Filter #1:
Name : 3
Filter Id : {7950E7D7-C01D-415A-B42E-B2659F3D5EF0}
Policy Id : {7238523F-70FA-11D1-864C-14A300000000}
Name : Sicherheit erforderlich
Policy Id : {7238523F-70FA-11D1-864C-14A300000000}
Flags : 1 (Tunnel)
Offer #1
Algo #1 : Encryption 3DES SHA1
PFS : False, Lifetime 100000Kbytes/900seconds
Offer #2
Algo #1 : Encryption 3DES MD5
PFS : False, Lifetime 100000Kbytes/900seconds
Offer #3
Algo #1 : Encryption DES SHA1
PFS : False, Lifetime 100000Kbytes/900seconds
Offer #4
Algo #1 : Encryption DES MD5
PFS : False, Lifetime 100000Kbytes/900seconds
Src Addr : Any
Des Addr : Me
Src Tunnel Addr : Any
Des Tunnel Addr : 192.168.2.8
Protocol : 0 Src Port : 0 Des Port : 0
Inbound Passthru
Mirrored : False
Interface Type : LAN
Generic Tunnel Filter #2:
Name : 4
Filter Id : {93E3BF55-2A6B-4137-B179-1008AC51C7FB}
Policy Id : {7238523F-70FA-11D1-864C-14A300000000}
Name : Sicherheit erforderlich
Policy Id : {7238523F-70FA-11D1-864C-14A300000000}
Flags : 1 (Tunnel)
Offer #1
Algo #1 : Encryption 3DES SHA1
PFS : False, Lifetime 100000Kbytes/900seconds
Offer #2
Algo #1 : Encryption 3DES MD5
PFS : False, Lifetime 100000Kbytes/900seconds
Offer #3
Algo #1 : Encryption DES SHA1
PFS : False, Lifetime 100000Kbytes/900seconds
Offer #4
Algo #1 : Encryption DES MD5
PFS : False, Lifetime 100000Kbytes/900seconds
Src Addr : Me
Des Addr : Any
Src Tunnel Addr : Any
Des Tunnel Addr : 192.168.2.2
Protocol : 0 Src Port : 0 Des Port : 0
Inbound Passthru
Mirrored : False
Interface Type : LAN
Specific Tunnel Filters
------------------------------
Specific Tunnel Filter #1:
Name : 3
Filter Id : {7950E7D7-C01D-415A-B42E-B2659F3D5EF0}
Policy Id : {7238523F-70FA-11D1-864C-14A300000000}
Src Addr : Any
Des Addr : 192.168.2.8
Src Tunnel Addr : Any
Des Tunnel Addr : 192.168.2.8
Protocol : 0 Src Port : 0 Des Port : 0
Inbound Passthru
Direction : Inbound, Weight : 34615297
Interface Type : LAN
Specific Tunnel Filter #2:
Name : 3
Filter Id : {7950E7D7-C01D-415A-B42E-B2659F3D5EF0}
Policy Id : {7238523F-70FA-11D1-864C-14A300000000}
Src Addr : Any
Des Addr : 169.254.166.129
Src Tunnel Addr : Any
Des Tunnel Addr : 192.168.2.8
Protocol : 0 Src Port : 0 Des Port : 0
Inbound Passthru
Direction : Inbound, Weight : 34615297
Interface Type : LAN
Specific Tunnel Filter #3:
Name : 4
Filter Id : {93E3BF55-2A6B-4137-B179-1008AC51C7FB}
Policy Id : {7238523F-70FA-11D1-864C-14A300000000}
Src Addr : 192.168.2.8
Des Addr : Any
Src Tunnel Addr : Any
Des Tunnel Addr : 192.168.2.2
Protocol : 0 Src Port : 0 Des Port : 0
Direction : Outbound, Weight : 34615296
Interface Type : LAN
Specific Tunnel Filter #4:
Name : 4
Filter Id : {93E3BF55-2A6B-4137-B179-1008AC51C7FB}
Policy Id : {7238523F-70FA-11D1-864C-14A300000000}
Src Addr : 169.254.166.129
Des Addr : Any
Src Tunnel Addr : Any
Des Tunnel Addr : 192.168.2.2
Protocol : 0 Src Port : 0 Des Port : 0
Direction : Outbound, Weight : 34615296
Interface Type : LAN
Main Mode Policies
------------------------------
Main Mode Policy #1:
Name : 2
Policy Id : {E6C31F1A-64DC-4B94-85CB-6F109B67A1FA}
Flags : 2 (Default)
Soft SA expiration time : 28800
Offer #1
3DES SHA1 DH Group 2
Quickmode limit : 0, Lifetime 0Kbytes/28800seconds
Offer #2
3DES MD5 DH Group 2
Quickmode limit : 0, Lifetime 0Kbytes/28800seconds
Offer #3
DES SHA1 DH Group 1
Quickmode limit : 0, Lifetime 0Kbytes/28800seconds
Offer #4
DES MD5 DH Group 1
Quickmode limit : 0, Lifetime 0Kbytes/28800seconds
Quick Mode Policies
------------------------------
Quick Mode Policy #1:
Name : Sicherheit erforderlich
Policy Id : {7238523F-70FA-11D1-864C-14A300000000}
Flags : 1 (Tunnel)
Offer #1
Algo #1 : Encryption 3DES SHA1
PFS : False, Lifetime 100000Kbytes/900seconds
Offer #2
Algo #1 : Encryption 3DES MD5
PFS : False, Lifetime 100000Kbytes/900seconds
Offer #3
Algo #1 : Encryption DES SHA1
PFS : False, Lifetime 100000Kbytes/900seconds
Offer #4
Algo #1 : Encryption DES MD5
PFS : False, Lifetime 100000Kbytes/900seconds
Main Mode Authentication Methods
------------------------------
Main Mode Authentication Methods #1:
Auth Methods Id: {15D44B0B-3D49-4368-B457-F74F565DD7AD}
AM #1 : Preshared Key : *************** :-)
Main Mode Authentication Methods #2:
Auth Methods Id: {6C19988B-FF71-4DB6-8F41-40BCDABDFF64}
AM #1 : Preshared Key : *************** :-)
IKE Statistics
------------------------------
Main Modes 2
Quick Modes 6
Soft SAs 0
Authentication Failures 0
Active Acquire 1
Active Receive 0
Acquire fail 0
Receive fail 0
Send fail 0
Acquire Heap size 2
Receive Heap size 2
Negotiation Failures 3
Invalid Cookies Rcvd 0
Total Acquire 7
TotalGetSpi 6
TotalKeyAdd 6
TotalKeyUpdate 6
GetSpiFail 0
KeyAddFail 0
KeyUpdateFail 0
IsadbListSize 1
ConnListSize 0
IPSec Statistics
------------------------------
Active Assoc 1
Pending Key 0
Key Adds 6
Key Deletes 5
ReKeys 0
Active Tunnels 1
Bad SPI Pkts 410
Pkts not Decrypted 0
Pkts not Authenticated 0
Pkts with Replay Detection 0
Confidential Bytes Sent 41,465
Confidential Bytes Received 26,434
Authenticated Bytes Sent 53,544
Authenticated Bytes Received 33,056
Offloaded Bytes Sent 0
Offloaded Bytes Received 0
Bytes Sent In Tunnels 41,465
Bytes Received In Tunnels 43,168
Transport Bytes Sent 0
Transport Bytes Received 0
Main Mode SAs
------------------------------
Main Mode SA #1:
From 192.168.2.8
To 192.168.2.2
Policy Id : {E6C31F1A-64DC-4B94-85CB-6F109B67A1FA}
Offer Used :
3DES SHA1 DH Group 2
Quickmode limit : 0, Lifetime 0Kbytes/28800seconds
Auth Used : Preshared Key
Initiator cookie b10961c6c7df8e68
Responder cookie 7b9568cceaa665f4
Source UDP Encap port : 500 Dest UDP Encap port: 500
Quick Mode SAs
------------------------------
Quick Mode SA #1:
Filter Id : {93E3BF55-2A6B-4137-B179-1008AC51C7FB}
Tunnel Filter
From 192.168.2.8
To Any
Protocol : 0 Src Port : 0 Des Port : 0
Direction : Outbound
Tunnel From 192.168.2.8
Tunnel To 192.168.2.2
Policy Id : {7238523F-70FA-11D1-864C-14A300000000}
Offer Used :
Algo #1 : Encryption 3DES SHA1 (24bytes/0rounds) (20secbytes/0secrounds)
MySpi 889221295 PeerSpi 216811875
PFS : False, Lifetime 100000Kbytes/900seconds
Initiator cookie b10961c6c7df8e68
Responder cookie 7b9568cceaa665f4
The command completed successfully.
> % tcpdump -vvvv -i <if>
tcpdump -i wi0 -t
tcpdump: listening on wi0
wifi.mobile > ibm.mobile: ESP(spi=0x350070af,seq=0xfc)
wifi.mobile.netbios-dgm > 192.168.2.15.netbios-dgm: NBT UDP PACKET(138)
wifi.mobile.netbios-dgm > 192.168.2.15.netbios-dgm: NBT UDP PACKET(138)
wifi.mobile > ibm.mobile: ESP(spi=0x350070af,seq=0xfd)
ibm.mobile > wifi.mobile: ESP(spi=0x0cec4963,seq=0xd6)
wifi.mobile > ibm.mobile: ESP(spi=0x350070af,seq=0xfe)
ibm.mobile > wifi.mobile: ESP(spi=0x0cec4963,seq=0xd7)
wifi.mobile > ibm.mobile: ESP(spi=0x350070af,seq=0xff)
ibm.mobile > wifi.mobile: ESP(spi=0x0cec4963,seq=0xd8)
arp who-has wifi.mobile tell ibm.mobile
arp who-has wifi.mobile tell ibm.mobile
arp reply wifi.mobile is-at 0:9:5b:91:85:6e
ibm.mobile > wifi.mobile: ESP(spi=0x0cec4963,seq=0xd9) [ttl 1]
wifi.mobile > ibm.mobile: ESP(spi=0x350070af,seq=0x100)
wifi.mobile > ibm.mobile: ESP(spi=0x350070af,seq=0x101)
ibm.mobile > wifi.mobile: ESP(spi=0x0cec4963,seq=0xda)
wifi.mobile > ibm.mobile: ESP(spi=0x350070af,seq=0x102)
ibm.mobile > wifi.mobile: ESP(spi=0x0cec4963,seq=0xdb)
ibm.mobile > wifi.mobile: ESP(spi=0x0cec4963,seq=0xdc)
ibm.mobile > wifi.mobile: ESP(spi=0x0cec4963,seq=0xdd)
wifi.mobile > ibm.mobile: ESP(spi=0x350070af,seq=0x103)
wifi.mobile > ibm.mobile: ESP(spi=0x350070af,seq=0x104)
ibm.mobile > wifi.mobile: ESP(spi=0x0cec4963,seq=0xde)
ibm.mobile > wifi.mobile: ESP(spi=0x0cec4963,seq=0xdf)
wifi.mobile > ibm.mobile: ESP(spi=0x350070af,seq=0x105)
wifi.mobile > ibm.mobile: ESP(spi=0x350070af,seq=0x106)
ibm.mobile > wifi.mobile: ESP(spi=0x0cec4963,seq=0xe0)
wifi.mobile > ibm.mobile: ESP(spi=0x350070af,seq=0x107)
wifi.mobile > ibm.mobile: ESP(spi=0x350070af,seq=0x108)
ibm.mobile > wifi.mobile: ESP(spi=0x0cec4963,seq=0xe1)
wifi.mobile > ibm.mobile: ESP(spi=0x350070af,seq=0x109)
wifi.mobile > ibm.mobile: ESP(spi=0x350070af,seq=0x10a)
ibm.mobile > wifi.mobile: ESP(spi=0x0cec4963,seq=0xe2)
ibm.mobile > wifi.mobile: ESP(spi=0x0cec4963,seq=0xe3)
wifi.mobile > ibm.mobile: ESP(spi=0x350070af,seq=0x10b)
wifi.mobile > ibm.mobile: ESP(spi=0x350070af,seq=0x10c)
ibm.mobile > wifi.mobile: ESP(spi=0x0cec4963,seq=0xe4)
wifi.mobile > ibm.mobile: ESP(spi=0x350070af,seq=0x10d)
^C
39 packets received by filter
0 packets dropped by kernel
Unter dieser Konfiguration passiert folgendes wenn ich die Windows
Firewall & FreeBSD FW auf ganz offen stelle:
Beide können sich pingen, ich kann z.B. auf Samba Shares zugreifen.
Sobald ich die Windows Firewall nur auf 500 (192.168.2.8) öffne
kann erwartungsgemäß nur noch der M$ den FBSD pingen.
Das Problem das sich mir jetzt stellt ist, dass ich sie für ICMP
(m.E.) nicht weiter öffnen kann da ich alle Klick-and-Pray boxen
der M$ Firewall selektiert habe. Hab ich da was vergessen?
Firewall M$ Log:
#Version: 1.5
#Software: Microsoft Windows Firewall
#Time Format: Local
#Fields: date time action protocol src-ip dst-ip src-port dst-port
size tcpflags tcpsyn tcpack tcpwin icmptype icmpcode info path
2004-11-30 17:32:35 DROP UDP 0.0.0.0 255.255.255.255 68 67 328 - - - -
- - - RECEIVE
2004-11-30 17:32:37 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:32:42 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:32:43 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:32:44 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:32:45 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:32:46 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:32:47 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:32:48 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:32:49 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:32:50 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:32:51 DROP UDP 0.0.0.0 255.255.255.255 68 67 328 - - - -
- - - RECEIVE
2004-11-30 17:32:51 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:32:52 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:32:53 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:32:54 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:32:55 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:32:56 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:32:57 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:32:58 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:32:59 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:33:00 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:33:01 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:33:02 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:33:03 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:33:04 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:33:05 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:33:06 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:33:07 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:33:08 OPEN TCP 192.168.2.8 64.233.161.107 1375 443 - - -
- - - - - -
2004-11-30 17:33:13 OPEN TCP 192.168.2.8 192.168.2.2 1365 445 - - - - - - - - -
2004-11-30 17:33:13 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:33:14 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:33:22 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:33:29 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:33:29 CLOSE TCP 192.168.2.8 64.233.161.107 1375 443 - -
- - - - - - -
2004-11-30 17:33:29 OPEN TCP 192.168.2.8 64.233.161.106 1378 443 - - -
- - - - - -
2004-11-30 17:33:36 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:33:37 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:33:44 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:33:50 CLOSE TCP 192.168.2.8 64.233.161.106 1378 443 - -
- - - - - - -
2004-11-30 17:33:51 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:33:58 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:33:59 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:34:05 OPEN UDP 192.168.2.8 192.168.1.3 1045 53 - - - - - - - - -
2004-11-30 17:34:05 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:34:06 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:34:07 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:34:09 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:34:13 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:34:14 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:34:20 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:34:28 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:34:35 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:34:42 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:34:50 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:34:57 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:35:05 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:35:06 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:35:08 OPEN TCP 192.168.2.8 64.233.161.107 1379 443 - - -
- - - - - -
2004-11-30 17:35:13 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:35:20 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:35:27 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:35:27 CLOSE UDP 192.168.2.8 192.168.1.3 1045 53 - - - - - - - - -
2004-11-30 17:35:28 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:35:29 CLOSE TCP 192.168.2.8 64.233.161.107 1379 443 - -
- - - - - - -
2004-11-30 17:35:29 OPEN TCP 192.168.2.8 64.233.161.106 1380 443 - - -
- - - - - -
2004-11-30 17:35:29 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:35:32 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:35:35 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:35:36 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:35:38 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:35:41 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:35:42 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:35:49 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:35:50 CLOSE TCP 192.168.2.8 64.233.161.106 1380 443 - -
- - - - - - -
2004-11-30 17:35:50 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:35:51 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:35:57 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:00 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:04 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:05 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:11 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:12 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:17 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:18 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:19 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:20 OPEN UDP 192.168.2.8 192.168.1.3 1045 53 - - - - - - - - -
2004-11-30 17:36:20 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:21 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:22 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:24 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:25 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:26 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:28 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:32 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:33 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:34 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:41 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:42 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:44 OPEN UDP 192.168.2.8 192.168.1.3 137 137 - - - - - - - - -
2004-11-30 17:36:49 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:53 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:56 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
2004-11-30 17:36:57 DROP ICMP 192.168.2.8 192.168.2.2 - - 84 - - - - 0 0 - SEND
Desweiteren frage ich mich, ob er, wenn ich alles offen habe, mittels
VPN kommuniziert oder einfach dran vorbei. Ich nehme, wegen den
tcpdumps an, dass er schon verschlüsselt kommuniziert.
Vielen Dank für die Hilfe Tom
To Unsubscribe: send mail to majordomo(at)de.FreeBSD.org
with "unsubscribe de-bsd-questions" in the body of the message
Received on Tue 30 Nov 2004 - 17:48:08 CET