After some 'forward' rules for certain sites and ports that I want to allow, I have a 'drop' rule that blocks incoming packets from everywhere else. The trouble is that when I try to connect to a website, this 'drop' rule blocks the communication and I can't receive the web page.
I understand that this is not meant to happen because the firewall should be 'stateful' and allow incoming packets that are part of a 'conversation' initiated by my machine. But this firewall seems to drop any incoming packets regardless of state.
I am definitely connected to the internet, and DNS is working fine, so that isn't the problem. If I type 'host http://www.google.com' from the command line, then it returns a list of IP addresses as it should ('host' being the Linux way of asking for DNS). And if I delete the drop rule, then the problem goes away, and I can browse the internet without any problem.
If I add logging to the drop rule, then when I try to access a webpage I get entries like this:
Code: Select all
May 04 02:51:15 home user.info kernel: PacketFilter: Drop TCP packet from [ppp_0_0_38_1] 74.125.132.94:80 to 192.168.0.50:33424
May 04 02:51:19 home user.info kernel: PacketFilter: Drop TCP packet from [ppp_0_0_38_1] 74.125.132.94:80 to 192.168.0.50:33424
May 04 02:51:19 home user.info kernel: PacketFilter: Drop TCP packet from [ppp_0_0_38_1] 74.125.132.94:80 to 192.168.0.50:33424
May 04 02:51:21 home user.info kernel: PacketFilter: Drop TCP packet from [ppp_0_0_38_1] 173.194.34.128:443 to 192.168.0.50:41476
Thanks in advance for any help.