Warhawk911
New Around Here
Hi Guys,
AC66U Firmware Version:3.0.0.4.382_52287
So one of the thumbnailing server for a Newsgroup service is not reachable, I tested access from my PC directly on Cable Modem and on my cell phone LTE and its loading. Also working on the router when i use a VPN connection. But when I am directly connected to the router or by wifi, the site does not load.
The website is th.easynews.com , without credential it should return a 403 Forbidden, and this is ok. But when connected to the router, it returns This site can’t be reached ( ERR_CONNECTION_ABORTED ).
When I telnet to the router and run "wget" I get the good status
Connecting to th.easynews.com|69.16.190.82|:80... connected.
HTTP request sent, awaiting response... 403 Forbidden
2020-09-10 15:04:41 ERROR 403: Forbidden.
But when i used a connected device to the router i get:
--2020-09-10 15:06:55-- (try: 7) http://th.easynews.com/
Connecting to th.easynews.com (th.easynews.com)|69.16.190.82|:80... connected.
HTTP request sent, awaiting response... No data received.
I decided to Factory reset the router and it is still not working.
I notice that after the reset, my ports forwarding are not showing in the Asus WebConfiguration as expected but they are still in the iptable firewall... ?
Do you guys have any clues or any files I should check for ghost config?
Thank you
admin@RT-AC66U:/tmp/home/root# iptables --list
Chain INPUT (policy ACCEPT)
target prot opt source destination
DROP icmp -- anywhere anywhere icmp echo-request
ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED
DROP all -- anywhere anywhere state INVALID
PTCSRVWAN all -- anywhere anywhere
PTCSRVLAN all -- anywhere anywhere
ACCEPT all -- anywhere anywhere state NEW
ACCEPT all -- anywhere anywhere state NEW
ACCEPT udp -- anywhere anywhere udp spt:bootps dpt:bootpc
INPUT_ICMP icmp -- anywhere anywhere
DROP all -- anywhere anywhere
Chain FORWARD (policy ACCEPT)
target prot opt source destination
ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED
DROP all -- anywhere anywhere
DROP all -- anywhere anywhere state INVALID
ACCEPT all -- anywhere anywhere
ACCEPT all -- anywhere anywhere ctstate DNAT
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
OUTPUT_DNS udp -- anywhere anywhere udp dpt:domain u32 0x0>>0x16&0x3c@0x8>>0xf&0x1=0x0
OUTPUT_DNS tcp -- anywhere anywhere tcp dpt:domain u32 0x0>>0x16&0x3c@0xc>>0x1a&0x3c@0x8>>0xf&0x1=0x0
OUTPUT_IP all -- anywhere anywhere
Chain ACCESS_RESTRICTION (0 references)
target prot opt source destination
Chain FUPNP (0 references)
target prot opt source destination
ACCEPT udp -- anywhere 192.168.1.212 udp dpt:47999
ACCEPT udp -- anywhere 192.168.1.212 udp dpt:48010
ACCEPT udp -- anywhere 192.168.1.212 udp dpt:47998
ACCEPT udp -- anywhere 192.168.1.212 udp dpt:48000
ACCEPT udp -- anywhere 192.168.1.212 udp dpt:48002
ACCEPT tcp -- anywhere 192.168.1.2 tcp dpt:32400
Chain INPUT_ICMP (1 references)
target prot opt source destination
RETURN icmp -- anywhere anywhere icmp echo-request
RETURN icmp -- anywhere anywhere icmp timestamp-request
ACCEPT icmp -- anywhere anywhere
Chain OUTPUT_DNS (2 references)
target prot opt source destination
logdrop_dns all -- anywhere anywhere STRING match "|10706f697579747975696f706b6a666e6603636f6d00|" ALGO name bm TO 65535 ICASE
logdrop_dns all -- anywhere anywhere STRING match "|0d72666a656a6e666a6e65666a6503636f6d00|" ALGO name bm TO 65535 ICASE
logdrop_dns all -- anywhere anywhere STRING match "|1131306166646d617361787373736171726b03636f6d00|" ALGO name bm TO 65535 ICASE
logdrop_dns all -- anywhere anywhere STRING match "|0f376d667364666173646d6b676d726b03636f6d00|" ALGO name bm TO 65535 ICASE
logdrop_dns all -- anywhere anywhere STRING match "|0d386d617361787373736171726b03636f6d00|" ALGO name bm TO 65535 ICASE
logdrop_dns all -- anywhere anywhere STRING match "|0f3966646d617361787373736171726b03636f6d00|" ALGO name bm TO 65535 ICASE
logdrop_dns all -- anywhere anywhere STRING match "|1265666274686d6f6975796b6d6b6a6b6a677403636f6d00|" ALGO name bm TO 65535 ICASE
logdrop_dns all -- anywhere anywhere STRING match "|086861636b7563647403636f6d00|" ALGO name bm TO 65535 ICASE
logdrop_dns all -- anywhere anywhere STRING match "|076c696e77756469056633333232036e657400|" ALGO name bm TO 65535 ICASE
logdrop_dns all -- anywhere anywhere STRING match "|0f6c6b6a68676664736174727975696f03636f6d00|" ALGO name bm TO 65535 ICASE
logdrop_dns all -- anywhere anywhere STRING match "|0b6d6e627663787a7a7a313203636f6d00|" ALGO name bm TO 65535 ICASE
logdrop_dns all -- anywhere anywhere STRING match "|077131313133333303746f7000|" ALGO name bm TO 65535 ICASE
logdrop_dns all -- anywhere anywhere STRING match "|057371353230056633333232036e657400|" ALGO name bm TO 65535 ICASE
logdrop_dns all -- anywhere anywhere STRING match "|077563746b6f6e6503636f6d00|" ALGO name bm TO 65535 ICASE
logdrop_dns all -- anywhere anywhere STRING match "|0e7a786376626d6e6e666a6a66777103636f6d00|" ALGO name bm TO 65535 ICASE
logdrop_dns all -- anywhere anywhere STRING match "|0a65756d6d6167766e627003636f6d00|" ALGO name bm TO 65535 ICASE
Chain OUTPUT_IP (1 references)
target prot opt source destination
logdrop_ip all -- anywhere 193.201.224.0/24
Chain PControls (0 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere
Chain PTCSRVLAN (1 references)
target prot opt source destination
Chain PTCSRVWAN (1 references)
target prot opt source destination
Chain SECURITY (0 references)
target prot opt source destination
RETURN tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,ACK/SYN limit: avg 1/sec burst 5
DROP tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,ACK/SYN
RETURN tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,ACK/RST limit: avg 1/sec burst 5
DROP tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,ACK/RST
RETURN icmp -- anywhere anywhere icmp echo-request limit: avg 1/sec burst 5
DROP icmp -- anywhere anywhere icmp echo-request
RETURN all -- anywhere anywhere
Chain default_block (0 references)
target prot opt source destination
Chain logaccept (0 references)
target prot opt source destination
LOG all -- anywhere anywhere state NEW LOG level warning tcp-sequence tcp-options ip-options prefix `ACCEPT '
ACCEPT all -- anywhere anywhere
Chain logdrop (0 references)
target prot opt source destination
LOG all -- anywhere anywhere state NEW LOG level warning tcp-sequence tcp-options ip-options prefix `DROP '
DROP all -- anywhere anywhere
Chain logdrop_dns (16 references)
target prot opt source destination
LOG all -- anywhere anywhere LOG level warning tcp-sequence tcp-options ip-options prefix `DROP_DNS '
DROP all -- anywhere anywhere
Chain logdrop_ip (1 references)
target prot opt source destination
LOG all -- anywhere anywhere LOG level warning tcp-sequence tcp-options ip-options prefix `DROP_IP '
DROP all -- anywhere anywhere
AC66U Firmware Version:3.0.0.4.382_52287
So one of the thumbnailing server for a Newsgroup service is not reachable, I tested access from my PC directly on Cable Modem and on my cell phone LTE and its loading. Also working on the router when i use a VPN connection. But when I am directly connected to the router or by wifi, the site does not load.
The website is th.easynews.com , without credential it should return a 403 Forbidden, and this is ok. But when connected to the router, it returns This site can’t be reached ( ERR_CONNECTION_ABORTED ).
When I telnet to the router and run "wget" I get the good status
Connecting to th.easynews.com|69.16.190.82|:80... connected.
HTTP request sent, awaiting response... 403 Forbidden
2020-09-10 15:04:41 ERROR 403: Forbidden.
But when i used a connected device to the router i get:
--2020-09-10 15:06:55-- (try: 7) http://th.easynews.com/
Connecting to th.easynews.com (th.easynews.com)|69.16.190.82|:80... connected.
HTTP request sent, awaiting response... No data received.
I decided to Factory reset the router and it is still not working.
I notice that after the reset, my ports forwarding are not showing in the Asus WebConfiguration as expected but they are still in the iptable firewall... ?
Do you guys have any clues or any files I should check for ghost config?
Thank you
admin@RT-AC66U:/tmp/home/root# iptables --list
Chain INPUT (policy ACCEPT)
target prot opt source destination
DROP icmp -- anywhere anywhere icmp echo-request
ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED
DROP all -- anywhere anywhere state INVALID
PTCSRVWAN all -- anywhere anywhere
PTCSRVLAN all -- anywhere anywhere
ACCEPT all -- anywhere anywhere state NEW
ACCEPT all -- anywhere anywhere state NEW
ACCEPT udp -- anywhere anywhere udp spt:bootps dpt:bootpc
INPUT_ICMP icmp -- anywhere anywhere
DROP all -- anywhere anywhere
Chain FORWARD (policy ACCEPT)
target prot opt source destination
ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED
DROP all -- anywhere anywhere
DROP all -- anywhere anywhere state INVALID
ACCEPT all -- anywhere anywhere
ACCEPT all -- anywhere anywhere ctstate DNAT
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
OUTPUT_DNS udp -- anywhere anywhere udp dpt:domain u32 0x0>>0x16&0x3c@0x8>>0xf&0x1=0x0
OUTPUT_DNS tcp -- anywhere anywhere tcp dpt:domain u32 0x0>>0x16&0x3c@0xc>>0x1a&0x3c@0x8>>0xf&0x1=0x0
OUTPUT_IP all -- anywhere anywhere
Chain ACCESS_RESTRICTION (0 references)
target prot opt source destination
Chain FUPNP (0 references)
target prot opt source destination
ACCEPT udp -- anywhere 192.168.1.212 udp dpt:47999
ACCEPT udp -- anywhere 192.168.1.212 udp dpt:48010
ACCEPT udp -- anywhere 192.168.1.212 udp dpt:47998
ACCEPT udp -- anywhere 192.168.1.212 udp dpt:48000
ACCEPT udp -- anywhere 192.168.1.212 udp dpt:48002
ACCEPT tcp -- anywhere 192.168.1.2 tcp dpt:32400
Chain INPUT_ICMP (1 references)
target prot opt source destination
RETURN icmp -- anywhere anywhere icmp echo-request
RETURN icmp -- anywhere anywhere icmp timestamp-request
ACCEPT icmp -- anywhere anywhere
Chain OUTPUT_DNS (2 references)
target prot opt source destination
logdrop_dns all -- anywhere anywhere STRING match "|10706f697579747975696f706b6a666e6603636f6d00|" ALGO name bm TO 65535 ICASE
logdrop_dns all -- anywhere anywhere STRING match "|0d72666a656a6e666a6e65666a6503636f6d00|" ALGO name bm TO 65535 ICASE
logdrop_dns all -- anywhere anywhere STRING match "|1131306166646d617361787373736171726b03636f6d00|" ALGO name bm TO 65535 ICASE
logdrop_dns all -- anywhere anywhere STRING match "|0f376d667364666173646d6b676d726b03636f6d00|" ALGO name bm TO 65535 ICASE
logdrop_dns all -- anywhere anywhere STRING match "|0d386d617361787373736171726b03636f6d00|" ALGO name bm TO 65535 ICASE
logdrop_dns all -- anywhere anywhere STRING match "|0f3966646d617361787373736171726b03636f6d00|" ALGO name bm TO 65535 ICASE
logdrop_dns all -- anywhere anywhere STRING match "|1265666274686d6f6975796b6d6b6a6b6a677403636f6d00|" ALGO name bm TO 65535 ICASE
logdrop_dns all -- anywhere anywhere STRING match "|086861636b7563647403636f6d00|" ALGO name bm TO 65535 ICASE
logdrop_dns all -- anywhere anywhere STRING match "|076c696e77756469056633333232036e657400|" ALGO name bm TO 65535 ICASE
logdrop_dns all -- anywhere anywhere STRING match "|0f6c6b6a68676664736174727975696f03636f6d00|" ALGO name bm TO 65535 ICASE
logdrop_dns all -- anywhere anywhere STRING match "|0b6d6e627663787a7a7a313203636f6d00|" ALGO name bm TO 65535 ICASE
logdrop_dns all -- anywhere anywhere STRING match "|077131313133333303746f7000|" ALGO name bm TO 65535 ICASE
logdrop_dns all -- anywhere anywhere STRING match "|057371353230056633333232036e657400|" ALGO name bm TO 65535 ICASE
logdrop_dns all -- anywhere anywhere STRING match "|077563746b6f6e6503636f6d00|" ALGO name bm TO 65535 ICASE
logdrop_dns all -- anywhere anywhere STRING match "|0e7a786376626d6e6e666a6a66777103636f6d00|" ALGO name bm TO 65535 ICASE
logdrop_dns all -- anywhere anywhere STRING match "|0a65756d6d6167766e627003636f6d00|" ALGO name bm TO 65535 ICASE
Chain OUTPUT_IP (1 references)
target prot opt source destination
logdrop_ip all -- anywhere 193.201.224.0/24
Chain PControls (0 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere
Chain PTCSRVLAN (1 references)
target prot opt source destination
Chain PTCSRVWAN (1 references)
target prot opt source destination
Chain SECURITY (0 references)
target prot opt source destination
RETURN tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,ACK/SYN limit: avg 1/sec burst 5
DROP tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,ACK/SYN
RETURN tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,ACK/RST limit: avg 1/sec burst 5
DROP tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,ACK/RST
RETURN icmp -- anywhere anywhere icmp echo-request limit: avg 1/sec burst 5
DROP icmp -- anywhere anywhere icmp echo-request
RETURN all -- anywhere anywhere
Chain default_block (0 references)
target prot opt source destination
Chain logaccept (0 references)
target prot opt source destination
LOG all -- anywhere anywhere state NEW LOG level warning tcp-sequence tcp-options ip-options prefix `ACCEPT '
ACCEPT all -- anywhere anywhere
Chain logdrop (0 references)
target prot opt source destination
LOG all -- anywhere anywhere state NEW LOG level warning tcp-sequence tcp-options ip-options prefix `DROP '
DROP all -- anywhere anywhere
Chain logdrop_dns (16 references)
target prot opt source destination
LOG all -- anywhere anywhere LOG level warning tcp-sequence tcp-options ip-options prefix `DROP_DNS '
DROP all -- anywhere anywhere
Chain logdrop_ip (1 references)
target prot opt source destination
LOG all -- anywhere anywhere LOG level warning tcp-sequence tcp-options ip-options prefix `DROP_IP '
DROP all -- anywhere anywhere
Last edited: