Bon il était un peu trop tard pour ma patience… reprenons 
[code]debian:/home/jean-louis# iptables -L
Chain INPUT (policy DROP)
target prot opt source destination
ACCEPT tcp – 192.168.1.1 anywhere tcp flags:!FIN,SYN,RST,ACK/SYN
ACCEPT udp – 192.168.1.1 anywhere
ACCEPT tcp – 192.168.1.1 anywhere tcp flags:!FIN,SYN,RST,ACK/SYN
ACCEPT udp – 192.168.1.1 anywhere
ACCEPT all – anywhere anywhere
ACCEPT udp – anywhere anywhere udp dpt:33434
ACCEPT icmp – anywhere anywhere icmp destination-unreachable
ACCEPT icmp – anywhere anywhere icmp host-unreachable
ACCEPT icmp – anywhere anywhere icmp timestamp-request
ACCEPT icmp – anywhere anywhere icmp timestamp-reply
ACCEPT icmp – anywhere anywhere icmp address-mask-request
ACCEPT icmp – anywhere anywhere icmp address-mask-reply
ACCEPT icmp – anywhere anywhere icmp redirect limit: avg 2/sec burst 5
ACCEPT icmp – anywhere anywhere icmp source-quench limit: avg 2/sec burst 5
LSI icmp – anywhere anywhere
DROP all – anywhere 255.255.255.255
DROP all – 224.0.0.0/8 anywhere
DROP all – anywhere 224.0.0.0/8
DROP all – 255.255.255.255 anywhere
DROP all – anywhere default
DROP all – anywhere anywhere state INVALID
LSI all -f anywhere anywhere limit: avg 10/min burst 5
INBOUND all – anywhere anywhere
LOG_FILTER all – anywhere anywhere
LOG all – anywhere anywhere LOG level info prefix `Unknown Input’
Chain FORWARD (policy DROP)
target prot opt source destination
ACCEPT udp – anywhere anywhere udp dpt:33434
ACCEPT icmp – anywhere anywhere icmp destination-unreachable
ACCEPT icmp – anywhere anywhere icmp host-unreachable
ACCEPT icmp – anywhere anywhere icmp address-mask-request
ACCEPT icmp – anywhere anywhere icmp address-mask-reply
ACCEPT icmp – anywhere anywhere icmp redirect limit: avg 2/sec burst 5
ACCEPT icmp – anywhere anywhere icmp source-quench limit: avg 2/sec burst 5
LSI icmp – anywhere anywhere
LOG_FILTER all – anywhere anywhere
LOG all – anywhere anywhere LOG level info prefix `Unknown Forward’
Chain OUTPUT (policy DROP)
target prot opt source destination
ACCEPT all – anywhere anywhere
DROP all – 224.0.0.0/8 anywhere
DROP all – anywhere 224.0.0.0/8
DROP all – 255.255.255.255 anywhere
DROP all – anywhere default
DROP all – anywhere anywhere state INVALID
OUTBOUND all – anywhere anywhere
LOG_FILTER all – anywhere anywhere
LOG all – anywhere anywhere LOG level info prefix `Unknown Output’
Chain INBOUND (1 references)
target prot opt source destination
ACCEPT tcp – anywhere anywhere state RELATED,ESTABLISHED
ACCEPT udp – anywhere anywhere state RELATED,ESTABLISHED
ACCEPT tcp – anywhere anywhere tcp dpt:msnp
ACCEPT udp – anywhere anywhere udp dpt:msnp
ACCEPT tcp – anywhere anywhere tcp dpt:6891
ACCEPT udp – anywhere anywhere udp dpt:6891
LSI all – anywhere anywhere
Chain LOG_FILTER (5 references)
target prot opt source destination
DROP tcp – anywhere anywhere tcp dpt:14013
DROP udp – anywhere anywhere udp dpt:14013
Chain LSI (4 references)
target prot opt source destination
LOG_FILTER all – anywhere anywhere
LOG tcp – anywhere anywhere tcp flags:FIN,SYN,RST,ACK/SYN limit: avg 1/sec burst 5 LOG level info prefix Inbound ' DROP tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,ACK/SYN LOG tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,ACK/RST limit: avg 1/sec burst 5 LOG level info prefix
Inbound '
DROP tcp – anywhere anywhere tcp flags:FIN,SYN,RST,ACK/RST
LOG icmp – anywhere anywhere icmp echo-request limit: avg 1/sec burst 5 LOG level info prefix Inbound ' DROP icmp -- anywhere anywhere icmp echo-request LOG all -- anywhere anywhere limit: avg 5/sec burst 5 LOG level info prefix
Inbound '
DROP all – anywhere anywhere
Chain LSO (0 references)
target prot opt source destination
LOG_FILTER all – anywhere anywhere
LOG all – anywhere anywhere limit: avg 5/sec burst 5 LOG level info prefix `Outbound '
REJECT all – anywhere anywhere reject-with icmp-port-unreachable
Chain OUTBOUND (1 references)
target prot opt source destination
ACCEPT icmp – anywhere anywhere
ACCEPT tcp – anywhere anywhere state RELATED,ESTABLISHED
ACCEPT udp – anywhere anywhere state RELATED,ESTABLISHED
ACCEPT all – anywhere anywhere
debian:/home/jean-louis# [/code]
Ça c’est avec le pare feu parce que comme dit :
[quote]Juste une remarque, des sites comme ShieldsUP regardent les ports ouverts sur ta box, pas ceux de ton PC. Normal, vu que c’est ta box qui fait le pont entre ton réseau local et le réseau internet.
Comme Desintegr, je pense à un problème de configuration.[/quote]
Et comme en Allemagne on avait aussi un routeur/box …
Normalement il doit y avoir le filtrage normal moins deux port ouvert via firestarter pour amsn
[quote]debian:/home/jean-louis# iptables -L
Chain INPUT (policy ACCEPT)
target prot opt source destination
Chain FORWARD (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
debian:/home/jean-louis# [/quote]
ça c’est sans.
toujours sans :
[code]debian:/home/jean-louis# iptables -t nat -L
Chain PREROUTING (policy ACCEPT)
target prot opt source destination
Chain POSTROUTING (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
debian:/home/jean-louis#[/code]
et iptables save me renvoit un pas content !
debian:/home/jean-louis# iptables save
Bad argument `save'
Try `iptables -h' or 'iptables --help' for more information.
Et franchement les gars merci beaucoup !!!