port wrote:
me parece curioso que sólo aparezca tráfico web, aunque puede ser debido al momento en que has consultado las reglas.
Gracias por el interés
port
Te añado el resultado ejecutando amule e intentando conectar a un servidor con los puertos abiertos a
TCP 60033
UDP 60013 y 60036
- Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
16 800 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:465
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:995
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:993
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:220
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:60013
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:60036
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:53
59 7481 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:53
3870 4899K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:20 state ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:21 state ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:22 state ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:25 state ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:80 state ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:110 state ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:143 state ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:443 state ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:465 state ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:995 state ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:220 state ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:993 state ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:60033 state ESTABLISHED
2 72 LOG_DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
84 5152 LOG_DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy DROP 391 packets, 31623 bytes)
pkts bytes target prot opt in out source destination
16 800 ACCEPT all -- * lo 0.0.0.0/0 0.0.0.0/0
59 3733 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:53
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:53
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:20 state NEW,ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:21 state NEW,ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 state NEW,ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:25 state NEW,ESTABLISHED
127 13423 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 state NEW,ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:110 state NEW,ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:143 state NEW,ESTABLISHED
2652 289K ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:443 state NEW,ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:465 state NEW,ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:995 state NEW,ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:220 state NEW,ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:993 state NEW,ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:60033 state NEW,ESTABLISHED
Chain LOG_DROP (2 references)
pkts bytes target prot opt in out source destination
86 5224 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Los errores que me aparecen en amule con el Firewall en on
2016-11-26 21:45:02: Intento de conexión con GrupoTS Server (46.105.126.71:4661) tiempo agotado.
2016-11-26 21:45:02: Error al conectar a todos los servidores.
2016-11-26 21:45:03: Fallo al conectar a todo los servidores ofuscados listados. Intentándolo de nuevo sin ofuscación.
2016-11-26 21:45:04: Conectando a GrupoTS Server (46.105.126.71 - 46.105.126.71:4661)
2016-11-26 21:45:14: WARNING! Client UDP-Socket: Packet to 151.31.12.145:48206 discarded due to error (2) while sending.
2016-11-26 21:45:30: WARNING! Client UDP-Socket: Packet to 93.1.138.44:6795 discarded due to error (2) while sending.
2016-11-26 21:45:30: Intento de conexión con GrupoTS Server (46.105.126.71:4661) tiempo agotado.
2016-11-26 21:45:30: Error al conectar a todos los servidores.
2016-11-26 21:45:31: Fallo al conectar a todo los servidores ofuscados listados. Intentándolo de nuevo sin ofuscación.
2016-11-26 21:45:32: Conectando a GrupoTS Server (46.105.126.71 - 46.105.126.71:4661)
2016-11-26 21:45:44: WARNING! Client UDP-Socket: Packet to 213.221.138.43:4672 discarded due to error (2) while sending.
2016-11-26 21:45:57: Intento de conexión con GrupoTS Server (46.105.126.71:4661) tiempo agotado.
2016-11-26 21:45:57: Error al conectar a todos los servidores.
2016-11-26 21:45:58: Fallo al conectar a todo los servidores ofuscados listados. Intentándolo de nuevo sin ofuscación.
2016-11-26 21:45:58: WARNING! Client UDP-Socket: Packet to 188.85.181.36:55880 discarded due to error (2) while sending.
2016-11-26 21:45:59: Conectando a GrupoTS Server (46.105.126.71 - 46.105.126.71:4661)
2016-11-26 21:45:59: WARNING! Client UDP-Socket: Packet to 32.217.23.68:4672 discarded due to error (2) while sending.
2016-11-26 21:45:59: WARNING! Client UDP-Socket: Packet to 189.69.19.134:10418 discarded due to error (2) while sending.
2016-11-26 21:46:03: WARNING! Client UDP-Socket: Packet to 188.217.48.215:55918 discarded due to error (2) while sending.
2016-11-26 21:46:03: WARNING! Client UDP-Socket: Packet to 188.77.54.107:60300 discarded due to error (2) while sending.
2016-11-26 21:46:03: WARNING! Client UDP-Socket: Packet to 58.248.14.20:19068 discarded due to error (2) while sending.
2016-11-26 21:46:03: WARNING! Client UDP-Socket: Packet to 145.133.158.200:37246 discarded due to error (2) while sending.
2016-11-26 21:46:04: WARNING! Client UDP-Socket: Packet to 79.40.115.168:38064 discarded due to error (2) while sending.
2016-11-26 21:46:04: WARNING! Client UDP-Socket: Packet to 222.75.42.60:14760 discarded due to error (2) while sending.
2016-11-26 21:46:04: WARNING! Client UDP-Socket: Packet to 83.173.167.7:4672 discarded due to error (2) while sending.
2016-11-26 21:46:05: WARNING! Client UDP-Socket: Packet to 118.160.152.217:14536 discarded due to error (2) while sending.
2016-11-26 21:46:07: WARNING! Client UDP-Socket: Packet to 2.234.35.80:4672 discarded due to error (2) while sending.
2016-11-26 21:46:07: WARNING! Client UDP-Socket: Packet to 88.179.11.5:38084 discarded due to error (2) while sending.
2016-11-26 21:46:09: WARNING! Client UDP-Socket: Packet to 89.230.79.68:5902 discarded due to error (2) while sending.
2016-11-26 21:46:10: WARNING! Client UDP-Socket: Packet to 84.123.131.123:4672 discarded due to error (2) while sending.
2016-11-26 21:46:10: WARNING! Client UDP-Socket: Packet to 86.247.202.233:4672 discarded due to error (2) while sending.
2016-11-26 21:46:12: WARNING! Client UDP-Socket: Packet to 80.181.196.232:9233 discarded due to error (2) while sending.
2016-11-26 21:46:12: WARNING! Client UDP-Socket: Packet to 123.119.250.121:32399 discarded due to error (2) while sending.
2016-11-26 21:46:13: WARNING! Client UDP-Socket: Packet to 94.103.209.36:4672 discarded due to error (2) while sending.
2016-11-26 21:46:13: WARNING! Client UDP-Socket: Packet to 86.247.202.233:4672 discarded due to error (2) while sending.
2016-11-26 21:46:13: WARNING! Client UDP-Socket: Packet to 91.152.156.197:4672 discarded due to error (2) while sending.
Esto me lleva a pensar que el problema no es el firewall sino otra cosa, yo miraría tu configuración del router isp y de las aplicaciones.
El resultado de iptables desconectando el firewall y conectando solo amule muestra tráfico, no da información de los puertos
- Chain INPUT (policy ACCEPT 104K packets, 146M bytes)
pkts bytes target prot opt in out source destination
Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 59101 packets, 3357K bytes)
pkts bytes target prot opt in out source destination
y el log de amule muestra conexion ed2k y kad. Me dice que abra los puertos en el router para dar idalta (yo tengo abiertos otros), pero sin el filtro del firewall conecta,con idbaja, pero conecta
Si abro 4662 y 4672 que es los que tengo en el router, da la idalta
Te muestro el iptables con estos dos puertos abiertos tb en el firewall y amule mostrando los mismos errores cuando el firewall está en on
- Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
24 1200 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:465
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:995
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:993
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:220
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:4665
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:4672
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:60013
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:60036
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:53
50 6032 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:53
3937 4999K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:20 state ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:21 state ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:22 state ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:25 state ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:80 state ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:110 state ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:143 state ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:443 state ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:465 state ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:995 state ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:220 state ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:993 state ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:4662 state ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:60033 state ESTABLISHED
2 72 LOG_DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 LOG_DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy DROP 286 packets, 24519 bytes)
pkts bytes target prot opt in out source destination
24 1200 ACCEPT all -- * lo 0.0.0.0/0 0.0.0.0/0
50 3174 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:53
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:53
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:20 state NEW,ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:21 state NEW,ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 state NEW,ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:25 state NEW,ESTABLISHED
70 8821 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 state NEW,ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:110 state NEW,ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:143 state NEW,ESTABLISHED
2742 311K ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:443 state NEW,ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:465 state NEW,ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:995 state NEW,ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:220 state NEW,ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:993 state NEW,ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:4662 state NEW,ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:60033 state NEW,ESTABLISHED
Chain LOG_DROP (2 references)
pkts bytes target prot opt in out source destination
2 72 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
No sé que es lo que puede pasar, como dices aparentemente están abiertos, pero el caso es que si el firewall está en on, no se establece la conexión
Esto me pasaba tb con trojitá (ya no lo uso

) y con java (a este no le he abierto puerto

)
En cualquier caso, no te preocupes
port que yo me apaño igual y te agradezco enormemente el interés que le has puesto
