SUSE / openSUSE This Forum is for the discussion of Suse Linux.
Notices
Welcome to
LinuxQuestions.org , a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free.
Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
Are you new to LinuxQuestions.org? Visit the following links:
Site Howto |
Site FAQ |
Sitemap |
Register Now
If you have any problems with the registration process or your account login, please
contact us . If you need to reset your password,
click here .
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a
virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month.
Click here for more info.
08-07-2006, 11:50 AM
#1
Member
Registered: Jul 2006
Posts: 34
Rep:
my dmesg output looks really weird
I'm new, but this still looks weird to me. I'm trying to look at my dmesg output to see what's going on with my usb phone, and I get this(below). I've only posted a section because it goes on a bit, but there's nothing else other than more of this sort of thing.
Is it anything to do with my internet connection starting at boot?
Thanks!
Xenny
Code:
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=88.105.204.50 DST=88.105.3.101 LEN=48 TOS=0x00 PREC=0x40 TTL=126 ID=52948 DF PROTO=TCP SPT=1492 DPT=445 WINDOW=16384 RES=0x00 SYN URGP=0 OPT (020405B401010402)
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=88.105.100.193 DST=88.105.3.101 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=55788 DF PROTO=TCP SPT=3587 DPT=139 WINDOW=16384 RES=0x00 SYN URGP=0 OPT (020405B401010402)
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=88.105.100.193 DST=88.105.3.101 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=56018 DF PROTO=TCP SPT=3587 DPT=139 WINDOW=16384 RES=0x00 SYN URGP=0 OPT (020405B401010402)
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=88.105.132.206 DST=88.105.3.101 LEN=64 TOS=0x00 PREC=0x40 TTL=46 ID=55237 DF PROTO=TCP SPT=1129 DPT=135 WINDOW=53760 RES=0x00 SYN URGP=0 OPT (020405B4010303030101080A000000000000000001010402)
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=88.105.132.206 DST=88.105.3.101 LEN=64 TOS=0x00 PREC=0x40 TTL=46 ID=56197 DF PROTO=TCP SPT=1129 DPT=135 WINDOW=53760 RES=0x00 SYN URGP=0 OPT (020405B4010303030101080A000000000000000001010402)
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=88.105.185.13 DST=88.105.3.101 LEN=48 TOS=0x00 PREC=0x40 TTL=126 ID=18401 DF PROTO=TCP SPT=3792 DPT=445 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (0204058C01010402)
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=88.105.185.13 DST=88.105.3.101 LEN=48 TOS=0x00 PREC=0x40 TTL=126 ID=19152 DF PROTO=TCP SPT=3792 DPT=445 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (0204058C01010402)
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=88.105.98.7 DST=88.105.3.101 LEN=64 TOS=0x00 PREC=0x40 TTL=47 ID=58566 DF PROTO=TCP SPT=1174 DPT=135 WINDOW=53760 RES=0x00 SYN URGP=0 OPT (020405B4010303030101080A000000000000000001010402)
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=88.105.168.95 DST=88.105.3.101 LEN=48 TOS=0x00 PREC=0x40 TTL=126 ID=45661 DF PROTO=TCP SPT=4695 DPT=135 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (0204058C01010402)
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=128.111.3.175 DST=88.105.3.101 LEN=471 TOS=0x00 PREC=0x20 TTL=52 ID=8486 PROTO=UDP SPT=45604 DPT=1026 LEN=451
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=128.111.3.175 DST=88.105.3.101 LEN=471 TOS=0x00 PREC=0x20 TTL=52 ID=8485 PROTO=UDP SPT=45604 DPT=1025 LEN=451
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=128.111.3.175 DST=88.105.3.101 LEN=471 TOS=0x00 PREC=0x20 TTL=52 ID=8487 PROTO=UDP SPT=45604 DPT=1027 LEN=451
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=128.111.3.175 DST=88.105.3.101 LEN=471 TOS=0x00 PREC=0x20 TTL=52 ID=8489 PROTO=UDP SPT=45604 DPT=1029 LEN=451
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=128.111.3.175 DST=88.105.3.101 LEN=471 TOS=0x00 PREC=0x20 TTL=52 ID=8488 PROTO=UDP SPT=45604 DPT=1028 LEN=451
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=88.105.124.145 DST=88.105.3.101 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=2507 DF PROTO=TCP SPT=3131 DPT=135 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (0204058C01010402)
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=88.105.128.46 DST=88.105.3.101 LEN=48 TOS=0x00 PREC=0x00 TTL=126 ID=40708 DF PROTO=TCP SPT=3171 DPT=445 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (0204058C01010402)
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=88.105.128.46 DST=88.105.3.101 LEN=48 TOS=0x00 PREC=0x00 TTL=126 ID=41260 DF PROTO=TCP SPT=3171 DPT=445 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (0204058C01010402)
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=88.105.92.93 DST=88.105.3.101 LEN=48 TOS=0x00 PREC=0x40 TTL=127 ID=31523 DF PROTO=TCP SPT=3887 DPT=139 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (0204058C01010402)
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=88.108.29.192 DST=88.105.3.101 LEN=48 TOS=0x00 PREC=0x40 TTL=126 ID=30720 DF PROTO=TCP SPT=4653 DPT=135 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (0204058C01010402)
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=88.105.138.128 DST=88.105.3.101 LEN=48 TOS=0x00 PREC=0x40 TTL=126 ID=46302 DF PROTO=TCP SPT=2417 DPT=139 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (0204058C01010402)
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=88.105.53.59 DST=88.105.3.101 LEN=64 TOS=0x00 PREC=0x40 TTL=47 ID=2180 DF PROTO=TCP SPT=1967 DPT=135 WINDOW=53760 RES=0x00 SYN URGP=0 OPT (0204058C010303030101080A000000000000000001010402)
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=88.105.185.13 DST=88.105.3.101 LEN=48 TOS=0x00 PREC=0x40 TTL=126 ID=53829 DF PROTO=TCP SPT=4760 DPT=445 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (0204058C01010402)
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=88.105.197.59 DST=88.105.3.101 LEN=48 TOS=0x00 PREC=0x40 TTL=126 ID=29799 DF PROTO=TCP SPT=3011 DPT=139 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (0204058C01010402)
SFW2-INext-DROP-DEFLT IN=ppp0 OUT= MAC= SRC=88.105.185.13 DST=88.105.3.101 LEN=48 TOS=0x00 PREC=0x40 TTL=126 ID=11338 DF PROTO=TCP SPT=3595 DPT=135 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (0204058C01010402)
08-07-2006, 12:52 PM
#2
LQ 5k Club
Registered: Aug 2005
Distribution: OpenSuse, Fedora, Redhat, Debian
Posts: 5,399
These are from your iptables firewall. There is one or more LOG targets in your firewall setup. To see them, type '/sbin/iptables -L' (as root).
--- rod.
08-07-2006, 01:41 PM
#3
Member
Registered: Jul 2006
Posts: 34
Original Poster
Rep:
Heya
Thanks. I didn't know what iptables was so I've just had a quick read on Wikipedia, but will need to know more before really getting the relevance of the logs (below). I didn't get anything from /sbin/iptables -l, but did from just iptables -l.
What has happened to all the other dmesg stuff? How do I see it?! I feel I have to keep apologising as I know I'm probably asking pretty dumb questions at the moment! Sorry.
Thanks again
Code:
Xenny:/ # iptables -L
Chain INPUT (policy DROP)
target prot opt source destination
ACCEPT all -- anywhere anywhere
ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED
input_ext all -- anywhere anywhere
LOG all -- anywhere anywhere limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-IN-ILL-TARGET '
DROP all -- anywhere anywhere
Chain FORWARD (policy DROP)
target prot opt source destination
LOG all -- anywhere anywhere limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-FWD-ILL-ROUTING '
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
ACCEPT all -- anywhere anywhere
ACCEPT all -- anywhere anywhere state NEW,RELATED,ESTABLISHED
LOG all -- anywhere anywhere limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-OUT-ERROR '
Chain forward_ext (0 references)
target prot opt source destination
Chain input_ext (1 references)
target prot opt source destination
DROP all -- anywhere anywhere PKTTYPE = broadcast
ACCEPT icmp -- anywhere anywhere icmp source-quench
ACCEPT icmp -- anywhere anywhere icmp echo-request
ACCEPT icmp -- anywhere anywhere state RELATED,ESTABLISHED icmp echo-reply
ACCEPT icmp -- anywhere anywhere state RELATED,ESTABLISHED icmp destination-unreachable
ACCEPT icmp -- anywhere anywhere state RELATED,ESTABLISHED icmp time-exceeded
ACCEPT icmp -- anywhere anywhere state RELATED,ESTABLISHED icmp parameter-problem
ACCEPT icmp -- anywhere anywhere state RELATED,ESTABLISHED icmp timestamp-reply
ACCEPT icmp -- anywhere anywhere state RELATED,ESTABLISHED icmp address-mask-reply
ACCEPT icmp -- anywhere anywhere state RELATED,ESTABLISHED icmp protocol-unreachable
ACCEPT icmp -- anywhere anywhere state RELATED,ESTABLISHED icmp redirect
reject_func tcp -- anywhere anywhere tcp dpt:ident state NEW
LOG all -- anywhere anywhere limit: avg 3/min burst 5 PKTTYPE = multicast LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP-DEFLT '
DROP all -- anywhere anywhere PKTTYPE = multicast
LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp flags:FIN,SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP-DEFLT '
LOG icmp -- anywhere anywhere limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP-DEFLT '
LOG udp -- anywhere anywhere limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP-DEFLT '
LOG all -- anywhere anywhere limit: avg 3/min burst 5 state INVALID LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP-DEFLT-INV '
DROP all -- anywhere anywhere
Chain reject_func (1 references)
target prot opt source destination
REJECT tcp -- anywhere anywhere reject-with tcp-reset
REJECT udp -- anywhere anywhere reject-with icmp-port-unreachable
REJECT all -- anywhere anywhere reject-with icmp-proto-unreachable
08-07-2006, 01:48 PM
#4
LQ 5k Club
Registered: Aug 2005
Distribution: OpenSuse, Fedora, Redhat, Debian
Posts: 5,399
The other stuff is still there, you just have to sift through it all to find it. Grep may be helpfull if you know something about what you are looking for.
--- rod.
08-07-2006, 02:51 PM
#5
Member
Registered: Jul 2006
Posts: 34
Original Poster
Rep:
I did try "dmesg | grep -i usb" and I got nothing. I've got usb devices working fine, and can see them all in lsusb.
08-08-2006, 01:07 PM
#6
LQ 5k Club
Registered: Aug 2005
Distribution: OpenSuse, Fedora, Redhat, Debian
Posts: 5,399
The log file may be getting truncated, and the messages of interest are lost before you are getting a chance to see them. I assume the messages of interest are being generated at boot time. Perhaps you can reboot, and re-generate the messages you are interested in. Are you sure the messages of interest contain the string 'usb'?
I am loath to suggest modifying your iptables setup, lest it put your system in jeopardy somehow. If you elect to do this, you should to it with caution.
--- rod.
08-09-2006, 02:12 AM
#7
Senior Member
Registered: Mar 2004
Location: Munich
Distribution: Ubuntu
Posts: 3,517
Rep:
You could try inverse match (select non-matching strings):
dmesg | grep -v SFW2
08-10-2006, 06:35 AM
#8
Member
Registered: Jul 2006
Posts: 34
Original Poster
Rep:
Rod and abisko
Cheers I've got it sorted - Rod I rebooted and it was fine afterwards.
Thanks for the inverse match suggestion - much better and it prompted me to have a proper look at grep
All times are GMT -5. The time now is 02:21 PM .
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know .
Latest Threads
LQ News