Ok... I deleted all blocking rules from Skynet, but have it active:
Code:
Router Model; RT-AC88U
Skynet Version; v6.0.4 (23/03/2018)
iptables v1.4.14 - (eth0 @ 192.168.1.1)
ipset v6.32, protocol version: 6
FW Version; 380.69_0 (Dec 11 2017) (2.6.36.4brcmarm)
Install Dir; /tmp/mnt/ASUS/skynet (13.3G / 14.4G Space Available)
SWAP File; /tmp/mnt/ASUS/myswap.swp (256.3M)
Boot Args; /jffs/scripts/firewall start skynetloc=/tmp/mnt/ASUS/skynet
0 IPs / 0 Ranges Banned. 0 New IPs / 0 New Ranges Banned. 0 Inbound / 0 Outbound Connections Blocked!
Next, I did an iptables -Z to zero counters.
Then I reproduced the problem several times, running "iptables -nvL" (per John's tip) to see what counters (if any) were incrementing. Finally, I ran "iptables --line -t -raw -vnL" per Adamm's instruction.
The "iptables -nvL" identifies some entries entries added to the "logdrop" chain by skynet being incremented each time the problem occurs:
Code:
Chain logdrop (8 references)
pkts bytes target prot opt in out source destination
33 5640 ACCEPT all -- eth0 * 0.0.0.0/0 0.0.0.0/0 match-set Skynet-Whitelist src
3 124 DROP tcp -- eth0 * 0.0.0.0/0 0.0.0.0/0 multiport sports 80,443,143,993,110,995,25,465 state INVALID
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmptype 11
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmptype 3
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcpflags: 0x3F/0x19
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcpflags: 0x3F/0x11
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcpflags: 0x3F/0x04
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcpflags: 0x3F/0x14
3 124 all -- eth0 * 0.0.0.0/0 0.0.0.0/0 recent: SET name: TRACKINVALID side: source
0 0 LOG all -- eth0 * 0.0.0.0/0 0.0.0.0/0 state INVALID recent: UPDATE seconds: 300 hit_count: 2 name: TRACKINVALID side: source LOG flags 7 level 4 prefix "[BLOCKED - NEW BAN] "
0 0 SET all -- eth0 * 0.0.0.0/0 0.0.0.0/0 state INVALID recent: UPDATE seconds: 300 hit_count: 2 name: TRACKINVALID side: source add-set Skynet-Master src
3 124 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
The output from "iptables --line -t -raw -vnL" after all that was:
Code:
admin@ASUS88U:/tmp/mnt/ASUS# iptables --line -t raw -vnL
Chain PREROUTING (policy ACCEPT 64696 packets, 80M bytes)
num pkts bytes target prot opt in out source destination
1 0 0 LOG all -- br0 * 0.0.0.0/0 0.0.0.0/0 ! match-set Skynet-Whitelist dst match-set Skynet-Master dst LOG flags 7 level 4 prefix "[BLOCKED - OUTBOUND] "
2 0 0 DROP all -- br0 * 0.0.0.0/0 0.0.0.0/0 ! match-set Skynet-Whitelist dst match-set Skynet-Master dst
3 0 0 LOG all -- eth0 * 0.0.0.0/0 0.0.0.0/0 ! match-set Skynet-Whitelist src match-set Skynet-Master src LOG flags 7 level 4 prefix "[BLOCKED - INBOUND] "
4 0 0 DROP all -- eth0 * 0.0.0.0/0 0.0.0.0/0 ! match-set Skynet-Whitelist src match-set Skynet-Master src
All way beyond my understanding of iptables.... All help appreciated!