The facts:
I have lastest build of merlin working good so far. Was able to set up entware, aria2 and control it from outside, have also managed to install owncloud and use it with self-signed certificate, from anywhere (phone, computer client, web). Had the webcam working in https also, had the tomatoware build enviroment working in /opt/tomatoware.
Then I stumble upon the post for automatic ban of ips using ipset and iptables... tested, and realized it was not build with suppor for RT-N16, so I deleted the firewall.sh and firewall-start.sh that the post proposed and go back to the old firewall-start I had. Rebooted the router and... could not access anything from outside, with the exception of the routers web configuration using port 8443.
Tryed all, enabling and disabling ssh, ssh from wan, ssh login, ssh port forward, changed ports.. but I can't enter anymore to the shell from outside.
Created a VPN and then yes, I can access again the shell from outside using 192.168.1.1 as if I am home.
Finally, decided to apply factory settings... but still not work
Installed back aria2, lighttpd. Restored Owncloud directory on www...
I can only enter the webadmin (no shell, owncloud nor lighttpd)
The only news is that I can also control aria2 from webui again connecting to the dinamic IP.
Also, if I enable ping response, it works.
From the inside, I enabled logging of dropped packets and they appear (a lot of them, inlcuding my ssh requests)
But I don't know the reason. The iptables rules from the old firewall-start are in the chain.
The output from iptables -L is:
Any help would be highly apreciated.
PS: Also tryed unpluggin the usb hard drive (to unload entware) and still the ssh packets are dropped by kernel.
I have lastest build of merlin working good so far. Was able to set up entware, aria2 and control it from outside, have also managed to install owncloud and use it with self-signed certificate, from anywhere (phone, computer client, web). Had the webcam working in https also, had the tomatoware build enviroment working in /opt/tomatoware.
Then I stumble upon the post for automatic ban of ips using ipset and iptables... tested, and realized it was not build with suppor for RT-N16, so I deleted the firewall.sh and firewall-start.sh that the post proposed and go back to the old firewall-start I had. Rebooted the router and... could not access anything from outside, with the exception of the routers web configuration using port 8443.
Tryed all, enabling and disabling ssh, ssh from wan, ssh login, ssh port forward, changed ports.. but I can't enter anymore to the shell from outside.
Created a VPN and then yes, I can access again the shell from outside using 192.168.1.1 as if I am home.
Finally, decided to apply factory settings... but still not work
Installed back aria2, lighttpd. Restored Owncloud directory on www...
I can only enter the webadmin (no shell, owncloud nor lighttpd)
The only news is that I can also control aria2 from webui again connecting to the dinamic IP.
Also, if I enable ping response, it works.
From the inside, I enabled logging of dropped packets and they appear (a lot of them, inlcuding my ssh requests)
But I don't know the reason. The iptables rules from the old firewall-start are in the chain.
The output from iptables -L is:
Code:
Chain INPUT (policy ACCEPT)
target prot opt source destination
ACCEPT all -- anywhere anywhere
ACCEPT tcp -- anywhere anywhere tcp dpt:https
ACCEPT tcp -- anywhere anywhere tcp dpt:81
ACCEPT udp -- anywhere anywhere udp dpts:6881:6999
ACCEPT tcp -- anywhere anywhere tcp dpts:6881:6999
ACCEPT udp -- anywhere anywhere udp dpt:6800
ACCEPT tcp -- anywhere anywhere tcp dpt:6800
DROP all -- anywhere anywhere state INVALID
ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED
ACCEPT all -- anywhere anywhere state NEW
ACCEPT all -- anywhere anywhere state NEW
ACCEPT udp -- anywhere anywhere udp spt:bootps dpt:bootpc
ACCEPT tcp -- anywhere router.asus.com tcp dpt:www
ACCEPT tcp -- anywhere router.asus.com tcp dpt:8443
ACCEPT tcp -- anywhere anywhere tcp dpt:1723
ACCEPT gre -- anywhere anywhere
ACCEPT tcp -- anywhere anywhere tcp dpt:ssh
DROP all -- anywhere anywhere
Chain FORWARD (policy DROP)
target prot opt source destination
TCPMSS tcp -- anywhere anywhere tcp flags:SYN,RST/SYN TCPMSS clamp to PMTU
ACCEPT all -- anywhere anywhere
ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED
DROP all -- anywhere anywhere
DROP all -- anywhere anywhere state INVALID
ACCEPT all -- anywhere anywhere
DROP icmp -- anywhere anywhere
ACCEPT all -- anywhere anywhere ctstate DNAT
ACCEPT all -- anywhere anywhere
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Chain FUPNP (0 references)
target prot opt source destination
Chain PControls (0 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere
Chain logaccept (0 references)
target prot opt source destination
LOG all -- anywhere anywhere state NEW LOG level warning tcp-sequence tcp-options ip-options prefix `ACCEPT '
ACCEPT all -- anywhere anywhere
Chain logdrop (0 references)
target prot opt source destination
LOG all -- anywhere anywhere state NEW LOG level warning tcp-sequence tcp-options ip-options prefix `DROP '
DROP all -- anywhere anywhere
Any help would be highly apreciated.
PS: Also tryed unpluggin the usb hard drive (to unload entware) and still the ssh packets are dropped by kernel.