What's new

ASUS N66U Merlin 380.66_4 ICMP Check YES BUG

  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

lqh280

New Around Here
ASUS N66U Merlin 380.66_4
Advanced Settings>Firewall, after i check "Respond ICMP Echo (ping) Request from WAN" YES Option, I can not access the Internet, Check NO, I can access the Internet. I think it is a bug, need to fix. thanks.
 
Works normally for me. Can you describe your WAN configuration (what connection type, whether you use Dual WAN or not, etc...)

Also, see if running the following command over SSH generates any error message after Respond to ping is enabled:

Code:
iptables-restore --verbose /tmp/filter_rules
 
Works normally for me. Can you describe your WAN configuration (what connection type, whether you use Dual WAN or not, etc...)

Also, see if running the following command over SSH generates any error message after Respond to ping is enabled:

Code:
iptables-restore --verbose /tmp/filter_rules

I used Dual WAN mode. WAN and WAN1 (via lan1) used PPPoE Connect to ISP.
Just test again, and compared the file /tmp/filter_rules, the difference is as follows(MARK RED COLOR):
Option NO

*filter
:INPUT ACCEPT [0:0]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [0:0]
:FUPNP - [0:0]
:SECURITY - [0:0]
:pControls - [0:0]
:NSFW - [0:0]
:logaccept - [0:0]
:logdrop - [0:0]
:SECURITY_PROTECT - [0:0]
-A INPUT -i ppp1 -p icmp --icmp-type 8 -j DROP
-A INPUT -p tcp -m multiport --dport 22 -j SECURITY_PROTECT
-A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -m state --state INVALID -j DROP
-A INPUT -i br0 -m state --state NEW -j ACCEPT
-A INPUT -i lo -m state --state NEW -j ACCEPT
-A INPUT -p udp --sport 67 --dport 68 -j ACCEPT
-A INPUT -m conntrack --ctstate DNAT -p tcp -m tcp -d 192.168.100.1 --dport 8443 -j ACCEPT
-A INPUT -m conntrack --ctstate DNAT -p tcp -m tcp -d 192.168.100.1 --dport 80 -j ACCEPT
-A INPUT -i ppp1 -p tcp --dport 22 -j ACCEPT
-A INPUT -p icmp ! --icmp-type 8 -j ACCEPT

........The following is the same as omitted........

Option YES

*filter
:INPUT ACCEPT [0:0]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [0:0]
:FUPNP - [0:0]
:SECURITY - [0:0]
:pControls - [0:0]
:NSFW - [0:0]
:logaccept - [0:0]
:logdrop - [0:0]
:SECURITY_PROTECT - [0:0]
-A INPUT -p tcp -m multiport --dport 22 -j SECURITY_PROTECT
-A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -m state --state INVALID -j DROP
-A INPUT -i br0 -m state --state NEW -j ACCEPT
-A INPUT -i lo -m state --state NEW -j ACCEPT
-A INPUT -p udp --sport 67 --dport 68 -j ACCEPT
-A INPUT -m conntrack --ctstate DNAT -p tcp -m tcp -d 192.168.100.1 --dport 8443 -j ACCEPT
-A INPUT -m conntrack --ctstate DNAT -p tcp -m tcp -d 192.168.100.1 --dport 80 -j ACCEPT
-A INPUT -i test 5. cmd2=%s.
-p tcp --dport 22 -j ACCEPT
-A INPUT -p icmp -j ACCEPT

........The following is the same as omitted........
 
I used Dual WAN mode. WAN and WAN1 (via lan1) used PPPoE Connect to ISP.

Thanks. The issue might be specific to either ppp or Dual WAN.

I do see a garbled rule in your filter, sounds like a corrupted buffer in the code. I'll try to track it down. The weird thing is this specific string comes from the USB handling code, not the firewall code.
 
Found it. The bug isn't actually with the ICMP firewall code, but with the SSHD brute force protection code, and only happens in Dual WAN mode.
 
Found it. The bug isn't actually with the ICMP firewall code, but with the SSHD brute force protection code, and only happens in Dual WAN mode.
Thanks for your hard work, hope to be able to repair in the next version.
 
Thank you, and How should I fix it? or wait for 380.66_5 Update?

380.67 release. 380.66_ only gets updates for major issues, such as security fixes.

In the meantime, disabling SSH Brute Force Protection will prevent the issue.
 

Similar threads

Latest threads

Support SNBForums w/ Amazon

If you'd like to support SNBForums, just use this link and buy anything on Amazon. Thanks!

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Top