View Single Post
Old 08-01-2013, 11:12 AM   #56
knc1
Going Viral
knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.
 
knc1's Avatar
 
Posts: 17,212
Karma: 18210809
Join Date: Feb 2012
Location: Central Texas
Device: No K1, PW2, KV, KOA
Somethings broke (the review)

The Kindle tried to output 28 packets:
Code:
Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination
   28  1805 wlan-out   all  --  *      wlan0   0.0.0.0/0            0.0.0.0/0
Which where sent to the Wifi output filter chain:
Code:
Chain wlan-out (1 references)
 pkts bytes target     prot opt in     out     source               destination
   18  1080 DROP       all  --  *      *       0.0.0.0/0            207.171.160.0/19    
   10   725 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0
Those 28 where split into two groups, the 18 to amazon dropped and the other 10 went out on the air.
(See the spoiler below.)

Coming in, off the air, there where 25 packets:
Code:
Chain INPUT (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination         
   25  2534 wlan-in    all  --  wlan0  *       0.0.0.0/0            0.0.0.0/0
Which where sent to the Wifi input filter chain:
Code:
Chain wlan-in (1 references)
 pkts bytes target     prot opt in     out     source               destination         
    0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED 
    0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           
   10  1890 ACCEPT     udp  --  *      *       0.0.0.0/0            0.0.0.0/0           state ESTABLISHED 
    5   360 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0           
   10   284 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0
Of those 25, 10 udp packets where related to the 10 udp packets that where sent and allowed in.

The 5 udp packets that where dropped, where not detected as related to the ones that where sent.

The other 10 packets (which had to be 'non-echo request' icmp) where originated by something 'on the air' because the Kindle firewall protects against all link control messages other than "echo request" (such as funky re-directs).
So the firewall did its thing and dropped them on the floor.

Grumble, grumble, grumble.
Phooey!

What "access type setting" is this Wifi connection using?
It might be an access protocal that I did not allow for.

PS: This Linux firewall can also (with a couple non-Amazon modules added) write PCAP files. I just hope it does not come to that.

Spoiler:

Code:
NetRange:       207.171.160.0 - 207.171.191.255
CIDR:           207.171.160.0/19
OriginAS:       AS16509
NetName:        AMAZON-01
NetHandle:      NET-207-171-160-0-1
Parent:         NET-207-0-0-0-0
NetType:        Direct Assignment
RegDate:        1999-09-23
Updated:        2012-03-02
Ref:            http://whois.arin.net/rest/net/NET-207-171-160-0-1

OrgName:        Amazon.com, Inc.
OrgId:          AMAZON-4
Address:        1918 8th Ave
City:           SEATTLE
StateProv:      WA
PostalCode:     98101-1244
Country:        US
RegDate:        1995-01-23
Updated:        2013-06-25
Ref:            http://whois.arin.net/rest/org/AMAZON-4

Last edited by knc1; 08-01-2013 at 11:41 AM.
knc1 is offline   Reply With Quote