Testing port 6881....NAT Error - error in Azureus
hi im trying to get azureus set up and when i test the port it is set to by default to use i get this message
Testing port 6881....NAT Error i think i need to open port 6881. I believe i enabled the firewall when i installed fc3 but im not sure how to manipulate it. Im not asking how to do it specifically i just need some direction. Im not sure if i have to look into selinux or iptables? any replies would be appreciated. thanks in advance. |
i don't know about selinux, but as far as iptables is concerned just do a:
Code:
iptables -I INPUT -p TCP --dport 6881:6999 -m state --state NEW -j ACCEPT if you are filtering outgoing packets you'd need to add a similar rule to the OUTPUT chain... http://dessent.net/btfaq/#ports |
for the longest time the command worked like a charm. However now when i do it i still get a nat error from azureus. So im not positive what it could be.
|
please post the output of (when you get the error):
Code:
iptables -L Code:
iptables -L -t nat Code:
tail -f /var/log/syslog |
i have no syslog with that absolute path. this is what i get when i search for it.
Code:
[root@localhost jeff]# find / -name syslog Code:
[root@localhost jeff]# /sbin/iptables -L Code:
[root@localhost jeff]# /sbin/iptables -L -t nat |
as for the syslog file, make sure you are indeed running the syslog daemon:
Code:
ps aux | grep syslogd i'm not sure what's going on with your Azureus... have you tried disabling selinux to see if it helps?? |
yeah the syslog daemon is running. I'll have to look up a tutorial on iptables so i understand it more so that i can use it to allow Azureus to run without disabling selinux. I am not sure how to disable selinux but i'd rather try to find a better solution then that. i can still download using azureus with the nat error but my smiley icons for azureus are never green when i have the nat error.
|
Quote:
Quote:
http://www.google.com/search?q=disable+selinux |
Quote:
|
Actually the last rule in the RH-Firewall-1-INPUT chain is usually a clean-up rule with a REJECT target so all packets that make it to that point get rejected before they get to the default input chain policy. I don't see the rule you added in the output of iptables -L, so I'd take a guess that your system rebooted at some point and the firewall reset to the original Fedora Core default. Try re-running the rule posted above (iptables -I INPUT -p TCP --dport 6881:6999 -m state --state NEW -j ACCEPT) and see if azureus works. If so, then do "service iptables save" so that the change will be persistant over reboots.
|
thanks for the heads-up Capt_Caveman... i overlooked the REJECT rule at the end of the RH chain... having said that, the 6881:6999/tcp rules does show-up:
Quote:
|
Quote:
May also want to verify that your ISP hasn't started filtering those ports. Try using a free online security scanner to verify that they are indeed open. There are a number of scanners available, including ones at grc.com and sygate SOS. |
yeah it works fine when i do /sbin/service iptables stop but after exiting it and starting iptables back up it gets the nat error message again. i haven't scanned any ports yet tho. i don't understand the 6999 in the command i know the first number is the port but why is the 6999 there? is it declaring a range of ports? I would change the port but then i wouldn't know what i needed to do to change the iptables command. To be honest i had this post bookmarked and would just copy and paste the command when i used azureus so i didn't completely understand it. Recently i'd use ctrl+r to do a reverse lookup of the command in the shell to get it back up to enter it again. And thought about putting it in a shell script to execute when i started azureus or have it execute with the startup scripts. My basic understanding is that it opens up the port to allow for communication. Thanks for the help so far.
|
Ok, that would indicate it's a firewall issue then. Looking over the Azureus user guide, it appears that it only uses port 6881 now and uses both tcp and udp protocols. Try adding these rules:
iptables -I INPUT -p tcp --dport 6881 -j ACCEPT iptables -I INPUT -p udp --dport 6881 -j ACCEPT |
yeah i think you are right, Capt_Caveman... i actually had no idea that bittorret used udp packets, i thought it was all tcp... but now i read through this azureus faq: http://azureus.aelitis.com/wiki/inde...PortForwarding and yeah it says it will use both tcp and udp on the same port (it also says azureus only needs one port)... that would explain why an error would be obtained even though things seemed to still be working fine i think... like, it was just complaining about the udp packets not getting through and stuff... i think...
|
All times are GMT -5. The time now is 07:37 AM. |