A Broadband and ADSL forum. BroadbanterBanter

Welcome to BroadbanterBanter.

You are currently viewing as a guest which gives you limited access to view most discussions and other FREE features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload your own photos and access many other special features. Registration is fast, simple and absolutely free so please, join our community today.

Go Back   Home » BroadbanterBanter forum » Newsgroup Discussions » uk.telecom.broadband (UK broadband)
Site Map Home Register Authors List Search Today's Posts Mark Forums Read Web Partners

uk.telecom.broadband (UK broadband) (uk.telecom.broadband) Discussion of broadband services, technology and equipment as provided in the UK. Discussions of specific services based on ADSL, cable modems or other broadband technology are also on-topic. Advertising is not allowed.

Netgear - Block Sites



 
 
Thread Tools Display Modes
  #1  
Old May 31st 13, 04:40 PM posted to uk.telecom.broadband
Harry Bloomfield
external usenet poster
 
Posts: 250
Default Netgear - Block Sites

I'm just trying to figure out the Block Sites setting and I cannot get
it to work. I have set up as a keyword caravantalk and 'Always',
clicked Apply - yet I can still browse as normal
http://www.caravantalk.co.uk/.

caravantalk is in the list of blocked sites and none of my internal LAN
IP's are set up as Trusted IP's.

Its a Netgear DG8354G

--
Regards,
Harry (M1BYT) (L)
http://www.ukradioamateur.co.uk


  #2  
Old May 31st 13, 07:41 PM posted to uk.telecom.broadband
Andrew Benham
external usenet poster
 
Posts: 291
Default Netgear - Block Sites

On Fri, 31 May 2013 15:40:40 +0100, Harry Bloomfield wrote:

I'm just trying to figure out the Block Sites setting and I cannot get
it to work. I have set up as a keyword caravantalk and 'Always', clicked
Apply - yet I can still browse as normal http://www.caravantalk.co.uk/.

caravantalk is in the list of blocked sites and none of my internal LAN
IP's are set up as Trusted IP's.

Its a Netgear DG8354G


I've never tried it before this evening, but it works for me (with
caravantalk) on my DG834GT.

If you can telnet to the router, with the Blocked Sites disabled if you
do "iptables -nvL" you should see empty rules labelled CFILTER and HTTP.
If you then enable Block Sites, and add a domain/keyword or two, the
output of "iptables -nvL" should show 3 rules under CFILTER and one rule
per domain/keyword under HTTP.
With Block Sites enabled, the packet and byte counts for CFILTER should
increase when you visit web sites (actually tcp port 80, so https:// URLs
can't be blocked), and the packet and byte counts for the appropriate
HTTP rule should increase when you attempt to visit a blocked site.
  #3  
Old May 31st 13, 08:26 PM posted to uk.telecom.broadband
Harry Bloomfield
external usenet poster
 
Posts: 250
Default Netgear - Block Sites

Andrew Benham brought next idea :
If you can telnet to the router, with the Blocked Sites disabled if you
do "iptables -nvL" you should see empty rules labelled CFILTER and HTTP.
If you then enable Block Sites, and add a domain/keyword or two, the
output of "iptables -nvL" should show 3 rules under CFILTER and one rule
per domain/keyword under HTTP.


Thanks, but...

I telneted in - it supports the iptables command, but not the -nvl :-?

--
Regards,
Harry (M1BYT) (L)
http://www.ukradioamateur.co.uk


  #4  
Old June 1st 13, 12:17 AM posted to uk.telecom.broadband
Andrew Benham
external usenet poster
 
Posts: 291
Default Netgear - Block Sites

On Fri, 31 May 2013 19:26:37 +0100, Harry Bloomfield wrote:

Andrew Benham brought next idea :
If you can telnet to the router, with the Blocked Sites disabled if you
do "iptables -nvL" you should see empty rules labelled CFILTER and
HTTP.
If you then enable Block Sites, and add a domain/keyword or two, the
output of "iptables -nvL" should show 3 rules under CFILTER and one
rule per domain/keyword under HTTP.


Thanks, but...

I telneted in - it supports the iptables command, but not the -nvl :-?


Really ? The -L option (in UPPERCASE) is to list the rules, the -v to
be verbose, and the -n to show things numerically. I guess you could
drop the -n, and maybe the -v too (but you lose the packet/byte counts).

"iptables -h" will show the supported options, just in case you have a
really early version or one that's been compiled in an odd way.
  #5  
Old June 1st 13, 12:34 AM posted to uk.telecom.broadband
Harry Bloomfield
external usenet poster
 
Posts: 250
Default Netgear - Block Sites

Andrew Benham submitted this idea :
On Fri, 31 May 2013 19:26:37 +0100, Harry Bloomfield wrote:

Andrew Benham brought next idea :
If you can telnet to the router, with the Blocked Sites disabled if you
do "iptables -nvL" you should see empty rules labelled CFILTER and
HTTP.
If you then enable Block Sites, and add a domain/keyword or two, the
output of "iptables -nvL" should show 3 rules under CFILTER and one
rule per domain/keyword under HTTP.


Thanks, but...

I telneted in - it supports the iptables command, but not the -nvl :-?


Really ? The -L option (in UPPERCASE) is to list the rules, the -v to
be verbose, and the -n to show things numerically. I guess you could
drop the -n, and maybe the -v too (but you lose the packet/byte counts).

"iptables -h" will show the supported options, just in case you have a
really early version or one that's been compiled in an odd way.


Got it now, I had typed in a lower case L.

--
Regards,
Harry (M1BYT) (L)
http://www.ukradioamateur.co.uk


  #6  
Old June 1st 13, 01:49 PM posted to uk.telecom.broadband
Harry Bloomfield
external usenet poster
 
Posts: 250
Default Netgear - Block Sites

Harry Bloomfield brought next idea :
Andrew Benham submitted this idea :
On Fri, 31 May 2013 19:26:37 +0100, Harry Bloomfield wrote:

Andrew Benham brought next idea :
If you can telnet to the router, with the Blocked Sites disabled if you
do "iptables -nvL" you should see empty rules labelled CFILTER and
HTTP.
If you then enable Block Sites, and add a domain/keyword or two, the
output of "iptables -nvL" should show 3 rules under CFILTER and one
rule per domain/keyword under HTTP.

Thanks, but...

I telneted in - it supports the iptables command, but not the -nvl :-?


Really ? The -L option (in UPPERCASE) is to list the rules, the -v to be
verbose, and the -n to show things numerically. I guess you could drop the
-n, and maybe the -v too (but you lose the packet/byte counts).

"iptables -h" will show the supported options, just in case you have a
really early version or one that's been compiled in an odd way.


Got it now, I had typed in a lower case L.


Sorry, but I cannot make head nor tale of it, but here is the Putty.log

First section is where the router was set to Never block, the second
section with it set to always block 'caravantalk'. Before and in
between the two log sections, I logged into and used caravantalk.

=~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2013.06.01 12:24:05
=~=~=~=~=~=~=~=~=~=~=~=
Login: admin
Password:


BusyBox v1.01 (2008.12.07-19:38+0000) Built-in shell (ash)
Enter 'help' for a list of built-in commands.

# IP iptables -nvL
Chain INPUT (policy DROP 14056 packets, 1302K bytes)
pkts bytes target prot opt in out source
destination
0 0 DROP tcp -- !ppp0 * 0.0.0.0/0
0.0.0.0/0 state NEW tcp flags:!0x16/0x02
57066 4162K ACCEPT all -- br0 * 0.0.0.0/0
0.0.0.0/0
25789 4364K ACCEPT all -- lo * 0.0.0.0/0
0.0.0.0/0
0 0 ACCEPT all -- ipsec0 * 0.0.0.0/0
0.0.0.0/0
51697 5545K ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
117 28118 INPUT_UDP udp -- ppp0 * 0.0.0.0/0
0.0.0.0/0
13920 1277K INPUT_TCP tcp -- ppp0 * 0.0.0.0/0
0.0.0.0/0
22 1212 DOS_POD icmp -- ppp0 * 0.0.0.0/0
0.0.0.0/0 icmp type 8
14056 1302K LOCAL_SERVICE all -- * * 0.0.0.0/0
0.0.0.0/0
0 0 ACCEPT all -- !ppp0 * 0.0.0.0/0
0.0.0.0/0 state NEW

Chain FORWARD (policy DROP 3 packets, 216 bytes)
pkts bytes target prot opt in out source
destination
24851 17M CFILTER all -- * * 0.0.0.0/0
0.0.0.0/0
2634 387K FORWARD_UDP udp -- ppp0 * 0.0.0.0/0
0.0.0.0/0
1474K 849M FORWARD_TCP tcp -- ppp0 * 0.0.0.0/0
0.0.0.0/0
0 0 DOS_POD icmp -- ppp0 * 0.0.0.0/0
0.0.0.0/0 icmp type 8
15M 13G OUT_FILTER all -- * * 0.0.0.0/0
0.0.0.0/0
15M 13G FW_BASIC all -- * * 0.0.0.0/0
0.0.0.0/0
8 364 IN_FILTER all -- * * 0.0.0.0/0
0.0.0.0/0
0 0 ACCEPT all -- !ppp0 * 0.0.0.0/0
0.0.0.0/0 state NEW
0 0 ACCEPT all -- br0 br0 0.0.0.0/0
0.0.0.0/0

Chain OUTPUT (policy ACCEPT 254K packets, 31M bytes)
pkts bytes target prot opt in out source
destination
394 227K ACCEPT icmp -- * br0 0.0.0.0/0
0.0.0.0/0
2 221 DROP icmp -- * * 0.0.0.0/0
0.0.0.0/0 state INVALID

Chain ALGS (14 references)
pkts bytes target prot opt in out source
destination
406K 519M ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0

Chain BLOCK (0 references)
pkts bytes target prot opt in out source
destination
0 0 LOG all -- * * 0.0.0.0/0
0.0.0.0/0 LOG flags 0 level 4 prefix `[BLOCK]'
0 0 REJECT tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:80 reject-with http-block

Chain CFILTER (1 references)
pkts bytes target prot opt in out source
destination
461 263K HTTP tcp -- br0 * 0.0.0.0/0
0.0.0.0/0 STRING match GET tcp dpt:80 flags:0x3F/0x18
63 23850 HTTP tcp -- br0 * 0.0.0.0/0
0.0.0.0/0 STRING match POST tcp dpt:80 flags:0x3F/0x18
8 2580 HTTP tcp -- br0 * 0.0.0.0/0
0.0.0.0/0 STRING match HEAD tcp dpt:80 flags:0x3F/0x18

Chain DOS_POD (2 references)
pkts bytes target prot opt in out source
destination
22 1212 RETURN icmp -- * * 0.0.0.0/0
0.0.0.0/0 icmp type 8 limit: avg 5/sec burst 60
0 0 LOG all -- * * 0.0.0.0/0
0.0.0.0/0 limit: avg 10/sec burst 5 LOG flags 0 level 4 prefix
`[DOS]'
0 0 DROP all -- * * 0.0.0.0/0
0.0.0.0/0

Chain DOS_SCAN (2 references)
pkts bytes target prot opt in out source
destination
5 2166 LOG all -- * * 0.0.0.0/0
0.0.0.0/0 limit: avg 10/sec burst 5 LOG flags 0 level 4 prefix
`[PORT SCAN]'
10 4334 DROP all -- * * 0.0.0.0/0
0.0.0.0/0

Chain DOS_SYN (2 references)
pkts bytes target prot opt in out source
destination
697 33704 RETURN tcp -- * * 0.0.0.0/0
0.0.0.0/0 limit: avg 50/sec burst 80 tcp flags:0x16/0x02
0 0 LOG all -- * * 0.0.0.0/0
0.0.0.0/0 limit: avg 10/sec burst 5 LOG flags 0 level 4 prefix
`[DOS]'
0 0 DROP all -- * * 0.0.0.0/0
0.0.0.0/0

Chain DOS_UDP (2 references)
pkts bytes target prot opt in out source
destination
2741 411K RETURN udp -- * * 0.0.0.0/0
0.0.0.0/0 limit: avg 60/sec burst 100
0 0 LOG all -- * * 0.0.0.0/0
0.0.0.0/0 limit: avg 10/sec burst 5 LOG flags 0 level 4 prefix
`[DOS]'
0 0 DROP all -- * * 0.0.0.0/0
0.0.0.0/0

Chain FORWARD_TCP (1 references)
pkts bytes target prot opt in out source
destination
0 0 ALGS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp spt:1731
0 0 ALGS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp spt:1720
0 0 ALGS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp spt:1503
0 0 ALGS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp spt:522
0 0 ALGS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp spt:389
0 0 ALGS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp spt:6701
406K 519M ALGS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp spt:80
0 0 ALGS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp spt:7001
0 0 ALGS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp spt:1503
0 0 ALGS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp spt:6891
0 0 ALGS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp spt:1863
0 0 ALGS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp spt:6901
15 712 DOS_SYN tcp -- ppp0 * 0.0.0.0/0
0.0.0.0/0 state INVALID,NEW tcp flags:0x16/0x02
1067K 330M RETURN tcp -- * * 0.0.0.0/0
0.0.0.0/0

Chain FORWARD_UDP (1 references)
pkts bytes target prot opt in out source
destination
0 0 ALGS udp -- * * 0.0.0.0/0
0.0.0.0/0 udp spt:5060
0 0 ALGS udp -- * * 0.0.0.0/0
0.0.0.0/0 udp spt:6901
2634 387K DOS_UDP udp -- ppp0 * 0.0.0.0/0
0.0.0.0/0
2634 387K RETURN udp -- * * 0.0.0.0/0
0.0.0.0/0

Chain FW_BASIC (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- lo * 0.0.0.0/0
0.0.0.0/0
0 0 ACCEPT all -- ipsec0 * 0.0.0.0/0
0.0.0.0/0
196K 11M TCPMSS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU
15M 13G ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
8 392 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 MARK match 0x2511
81555 4632K ACCEPT all -- br0 * 0.0.0.0/0
0.0.0.0/0

Chain FW_UPNP (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT tcp -- * * 0.0.0.0/0
192.0.97.195 tcp dpt:80

Chain HTTP (3 references)
pkts bytes target prot opt in out source
destination
532 289K RETURN all -- * * 0.0.0.0/0
0.0.0.0/0 condition !schedule

Chain INPUT_TCP (1 references)
pkts bytes target prot opt in out source
destination
0 0 DOS_SCAN all -- ppp0 * 0.0.0.0/0
0.0.0.0/0 psd weight-threshold: 21 delay-threshold: 300
lo-ports-weight: 3 hi-ports-weight: 1
682 32992 DOS_SYN tcp -- ppp0 * 0.0.0.0/0
0.0.0.0/0 state INVALID,NEW tcp flags:0x16/0x02
13920 1277K RETURN tcp -- * * 0.0.0.0/0
0.0.0.0/0

Chain INPUT_UDP (1 references)
pkts bytes target prot opt in out source
destination
10 4334 DOS_SCAN all -- ppp0 * 0.0.0.0/0
0.0.0.0/0 psd weight-threshold: 21 delay-threshold: 300
lo-ports-weight: 3 hi-ports-weight: 1
107 23784 DOS_UDP udp -- ppp0 * 0.0.0.0/0
0.0.0.0/0
107 23784 RETURN udp -- * * 0.0.0.0/0
0.0.0.0/0

Chain IN_FILTER (1 references)
pkts bytes target prot opt in out source
destination
0 0 RETURN all -- !ppp0 * 0.0.0.0/0
0.0.0.0/0
0 0 ACCEPT tcp -- * * 0.0.0.0/0
192.0.97.185 tcp dpts:6346:6347
0 0 ACCEPT udp -- * * 0.0.0.0/0
192.0.97.185 udp dpts:6346:6347
8 364 ACCEPT tcp -- * * 0.0.0.0/0
192.0.97.195 tcp dpts:80:81
0 0 ACCEPT udp -- * * 0.0.0.0/0
192.0.97.195 udp dpts:80:81
0 0 ACCEPT tcp -- * * 0.0.0.0/0
192.0.97.177 tcp dpts:33370:33389
0 0 ACCEPT tcp -- * * 0.0.0.0/0
192.0.97.177 tcp dpt:6499
0 0 ACCEPT udp -- * * 0.0.0.0/0
192.0.97.177 udp dpt:6499
0 0 ACCEPT udp -- * * 0.0.0.0/0
192.0.97.180 udp dpts:5198:5199
0 0 ACCEPT tcp -- * * 0.0.0.0/0
192.0.97.180 tcp dpt:6499
0 0 ACCEPT udp -- * * 0.0.0.0/0
192.0.97.180 udp dpt:6499
0 0 ACCEPT tcp -- * * 0.0.0.0/0
192.0.97.180 tcp dpt:5200
0 0 ACCEPT tcp -- * * 0.0.0.0/0
192.0.97.180 tcp dpt:1863
0 0 ACCEPT tcp -- * * 0.0.0.0/0
192.0.97.180 tcp dpts:6891:6900
0 0 ACCEPT tcp -- * * 0.0.0.0/0
192.0.97.180 tcp dpts:27950:27965
0 0 ACCEPT udp -- * * 0.0.0.0/0
192.0.97.180 udp dpts:27950:27965
0 0 FW_UPNP all -- * * 0.0.0.0/0
0.0.0.0/0

Chain LOCAL_SERVICE (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 MARK match 0x2511

Chain OUT_FILTER (1 references)
pkts bytes target prot opt in out source
destination
1070K 331M RETURN all -- !br0 * 0.0.0.0/0
0.0.0.0/0
5166K 235M LOG tcp -- * * !192.0.97.195
0.0.0.0/0 tcp dpts:80:81 LOG flags 0 level 4 prefix `[IP
Camera rule not match]'
8264 631K LOG tcp -- * * 192.0.97.195
0.0.0.0/0 tcp dpts:80:81 LOG flags 0 level 4 prefix `[IP
Camera rule match]'
8264 631K ACCEPT tcp -- * * 192.0.97.195
0.0.0.0/0 tcp dpts:80:81
0 0 LOG udp -- * * !192.0.97.195
0.0.0.0/0 udp dpts:80:81 LOG flags 0 level 4 prefix `[IP
Camera rule not match]'
0 0 LOG udp -- * * 192.0.97.195
0.0.0.0/0 udp dpts:80:81 LOG flags 0 level 4 prefix `[IP
Camera rule match]'
0 0 ACCEPT udp -- * * 192.0.97.195
0.0.0.0/0 udp dpts:80:81
0 0 LOG tcp -- * * !0.0.0.0/0
0.0.0.0/0 tcp dpts:33370:33389 LOG flags 0 level 4 prefix
`[Bit torrent rule not match]'
12 624 LOG tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpts:33370:33389 LOG flags 0 level 4 prefix
`[Bit torrent rule match]'
12 624 DROP tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpts:33370:33389
0 0 LOG udp -- * * !0.0.0.0/0
0.0.0.0/0 udp dpts:5198:5199 LOG flags 0 level 4 prefix
`[EcholinkUDP rule not match]'
0 0 LOG udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpts:5198:5199 LOG flags 0 level 4 prefix
`[EcholinkUDP rule match]'
0 0 ACCEPT udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpts:5198:5199
0 0 LOG tcp -- * * !0.0.0.0/0
0.0.0.0/0 tcp dpt:5200 LOG flags 0 level 4 prefix
`[EcholinkTCP rule not match]'
0 0 LOG tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:5200 LOG flags 0 level 4 prefix
`[EcholinkTCP rule match]'
0 0 ACCEPT tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:5200
0 0 ACCEPT tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:6499
0 0 ACCEPT udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpt:6499
0 0 LOG tcp -- * * !0.0.0.0/0
0.0.0.0/0 tcp dpt:1863 LOG flags 0 level 4 prefix `[Messenger1
rule not match]'
6 2584 LOG tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:1863 LOG flags 0 level 4 prefix `[Messenger1
rule match]'
6 2584 ACCEPT tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:1863
0 0 LOG tcp -- * * !0.0.0.0/0
0.0.0.0/0 tcp dpts:6891:6900 LOG flags 0 level 4 prefix
`[Messenger2 rule not match]'
0 0 LOG tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpts:6891:6900 LOG flags 0 level 4 prefix
`[Messenger2 rule match]'
0 0 ACCEPT tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpts:6891:6900
622 799K ACCEPT tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpts:27950:27965
0 0 ACCEPT udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpts:27950:27965
#
# iptables -nvL
Chain INPUT (policy DROP 14056 packets, 1302K bytes)
pkts bytes target prot opt in out source
destination
0 0 DROP tcp -- !ppp0 * 0.0.0.0/0
0.0.0.0/0 state NEW tcp flags:!0x16/0x02
57249 4186K ACCEPT all -- br0 * 0.0.0.0/0
0.0.0.0/0
25940 4429K ACCEPT all -- lo * 0.0.0.0/0
0.0.0.0/0
0 0 ACCEPT all -- ipsec0 * 0.0.0.0/0
0.0.0.0/0
51697 5545K ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
117 28118 INPUT_UDP udp -- ppp0 * 0.0.0.0/0
0.0.0.0/0
13920 1277K INPUT_TCP tcp -- ppp0 * 0.0.0.0/0
0.0.0.0/0
22 1212 DOS_POD icmp -- ppp0 * 0.0.0.0/0
0.0.0.0/0 icmp type 8
14056 1302K LOCAL_SERVICE all -- * * 0.0.0.0/0
0.0.0.0/0
0 0 ACCEPT all -- !ppp0 * 0.0.0.0/0
0.0.0.0/0 state NEW

Chain FORWARD (policy DROP 3 packets, 216 bytes)
pkts bytes target prot opt in out source
destination
2645 389K FORWARD_UDP udp -- ppp0 * 0.0.0.0/0
0.0.0.0/0
1474K 850M FORWARD_TCP tcp -- ppp0 * 0.0.0.0/0
0.0.0.0/0
0 0 DOS_POD icmp -- ppp0 * 0.0.0.0/0
0.0.0.0/0 icmp type 8
15M 13G OUT_FILTER all -- * * 0.0.0.0/0
0.0.0.0/0
15M 13G FW_BASIC all -- * * 0.0.0.0/0
0.0.0.0/0
8 364 IN_FILTER all -- * * 0.0.0.0/0
0.0.0.0/0
0 0 ACCEPT all -- !ppp0 * 0.0.0.0/0
0.0.0.0/0 state NEW
0 0 ACCEPT all -- br0 br0 0.0.0.0/0
0.0.0.0/0

Chain OUTPUT (policy ACCEPT 255K packets, 31M bytes)
pkts bytes target prot opt in out source
destination
401 231K ACCEPT icmp -- * br0 0.0.0.0/0
0.0.0.0/0
2 221 DROP icmp -- * * 0.0.0.0/0
0.0.0.0/0 state INVALID

Chain ALGS (14 references)
pkts bytes target prot opt in out source
destination
407K 519M ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0

Chain DOS_POD (2 references)
pkts bytes target prot opt in out source
destination
22 1212 RETURN icmp -- * * 0.0.0.0/0
0.0.0.0/0 icmp type 8 limit: avg 5/sec burst 60
0 0 LOG all -- * * 0.0.0.0/0
0.0.0.0/0 limit: avg 10/sec burst 5 LOG flags 0 level 4 prefix
`[DOS]'
0 0 DROP all -- * * 0.0.0.0/0
0.0.0.0/0

Chain DOS_SCAN (2 references)
pkts bytes target prot opt in out source
destination
5 2166 LOG all -- * * 0.0.0.0/0
0.0.0.0/0 limit: avg 10/sec burst 5 LOG flags 0 level 4 prefix
`[PORT SCAN]'
10 4334 DROP all -- * * 0.0.0.0/0
0.0.0.0/0

Chain DOS_SYN (2 references)
pkts bytes target prot opt in out source
destination
697 33704 RETURN tcp -- * * 0.0.0.0/0
0.0.0.0/0 limit: avg 50/sec burst 80 tcp flags:0x16/0x02
0 0 LOG all -- * * 0.0.0.0/0
0.0.0.0/0 limit: avg 10/sec burst 5 LOG flags 0 level 4 prefix
`[DOS]'
0 0 DROP all -- * * 0.0.0.0/0
0.0.0.0/0

Chain DOS_UDP (2 references)
pkts bytes target prot opt in out source
destination
2752 413K RETURN udp -- * * 0.0.0.0/0
0.0.0.0/0 limit: avg 60/sec burst 100
0 0 LOG all -- * * 0.0.0.0/0
0.0.0.0/0 limit: avg 10/sec burst 5 LOG flags 0 level 4 prefix
`[DOS]'
0 0 DROP all -- * * 0.0.0.0/0
0.0.0.0/0

Chain FORWARD_TCP (1 references)
pkts bytes target prot opt in out source
destination
0 0 ALGS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp spt:1731
0 0 ALGS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp spt:1720
0 0 ALGS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp spt:1503
0 0 ALGS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp spt:522
0 0 ALGS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp spt:389
0 0 ALGS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp spt:6701
407K 519M ALGS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp spt:80
0 0 ALGS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp spt:7001
0 0 ALGS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp spt:1503
0 0 ALGS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp spt:6891
0 0 ALGS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp spt:1863
0 0 ALGS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp spt:6901
15 712 DOS_SYN tcp -- ppp0 * 0.0.0.0/0
0.0.0.0/0 state INVALID,NEW tcp flags:0x16/0x02
1067K 330M RETURN tcp -- * * 0.0.0.0/0
0.0.0.0/0

Chain FORWARD_UDP (1 references)
pkts bytes target prot opt in out source
destination
0 0 ALGS udp -- * * 0.0.0.0/0
0.0.0.0/0 udp spt:5060
0 0 ALGS udp -- * * 0.0.0.0/0
0.0.0.0/0 udp spt:6901
2645 389K DOS_UDP udp -- ppp0 * 0.0.0.0/0
0.0.0.0/0
2645 389K RETURN udp -- * * 0.0.0.0/0
0.0.0.0/0

Chain FW_BASIC (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- lo * 0.0.0.0/0
0.0.0.0/0
0 0 ACCEPT all -- ipsec0 * 0.0.0.0/0
0.0.0.0/0
196K 11M TCPMSS tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU
15M 13G ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
8 392 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 MARK match 0x2511
81605 4635K ACCEPT all -- br0 * 0.0.0.0/0
0.0.0.0/0

Chain FW_UPNP (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT tcp -- * * 0.0.0.0/0
192.0.97.195 tcp dpt:80

Chain INPUT_TCP (1 references)
pkts bytes target prot opt in out source
destination
0 0 DOS_SCAN all -- ppp0 * 0.0.0.0/0
0.0.0.0/0 psd weight-threshold: 21 delay-threshold: 300
lo-ports-weight: 3 hi-ports-weight: 1
682 32992 DOS_SYN tcp -- ppp0 * 0.0.0.0/0
0.0.0.0/0 state INVALID,NEW tcp flags:0x16/0x02
13920 1277K RETURN tcp -- * * 0.0.0.0/0
0.0.0.0/0

Chain INPUT_UDP (1 references)
pkts bytes target prot opt in out source
destination
10 4334 DOS_SCAN all -- ppp0 * 0.0.0.0/0
0.0.0.0/0 psd weight-threshold: 21 delay-threshold: 300
lo-ports-weight: 3 hi-ports-weight: 1
107 23784 DOS_UDP udp -- ppp0 * 0.0.0.0/0
0.0.0.0/0
107 23784 RETURN udp -- * * 0.0.0.0/0
0.0.0.0/0

Chain IN_FILTER (1 references)
pkts bytes target prot opt in out source
destination
0 0 RETURN all -- !ppp0 * 0.0.0.0/0
0.0.0.0/0
0 0 ACCEPT tcp -- * * 0.0.0.0/0
192.0.97.185 tcp dpts:6346:6347
0 0 ACCEPT udp -- * * 0.0.0.0/0
192.0.97.185 udp dpts:6346:6347
8 364 ACCEPT tcp -- * * 0.0.0.0/0
192.0.97.195 tcp dpts:80:81
0 0 ACCEPT udp -- * * 0.0.0.0/0
192.0.97.195 udp dpts:80:81
0 0 ACCEPT tcp -- * * 0.0.0.0/0
192.0.97.177 tcp dpts:33370:33389
0 0 ACCEPT tcp -- * * 0.0.0.0/0
192.0.97.177 tcp dpt:6499
0 0 ACCEPT udp -- * * 0.0.0.0/0
192.0.97.177 udp dpt:6499
0 0 ACCEPT udp -- * * 0.0.0.0/0
192.0.97.180 udp dpts:5198:5199
0 0 ACCEPT tcp -- * * 0.0.0.0/0
192.0.97.180 tcp dpt:6499
0 0 ACCEPT udp -- * * 0.0.0.0/0
192.0.97.180 udp dpt:6499
0 0 ACCEPT tcp -- * * 0.0.0.0/0
192.0.97.180 tcp dpt:5200
0 0 ACCEPT tcp -- * * 0.0.0.0/0
192.0.97.180 tcp dpt:1863
0 0 ACCEPT tcp -- * * 0.0.0.0/0
192.0.97.180 tcp dpts:6891:6900
0 0 ACCEPT tcp -- * * 0.0.0.0/0
192.0.97.180 tcp dpts:27950:27965
0 0 ACCEPT udp -- * * 0.0.0.0/0
192.0.97.180 udp dpts:27950:27965
0 0 FW_UPNP all -- * * 0.0.0.0/0
0.0.0.0/0

Chain LOCAL_SERVICE (1 references)
pkts bytes target prot opt in out source
destination
0 0 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 MARK match 0x2511

Chain OUT_FILTER (1 references)
pkts bytes target prot opt in out source
destination
1070K 331M RETURN all -- !br0 * 0.0.0.0/0
0.0.0.0/0
5166K 236M LOG tcp -- * * !192.0.97.195
0.0.0.0/0 tcp dpts:80:81 LOG flags 0 level 4 prefix `[IP
Camera rule not match]'
8264 631K LOG tcp -- * * 192.0.97.195
0.0.0.0/0 tcp dpts:80:81 LOG flags 0 level 4 prefix `[IP
Camera rule match]'
8264 631K ACCEPT tcp -- * * 192.0.97.195
0.0.0.0/0 tcp dpts:80:81
0 0 LOG udp -- * * !192.0.97.195
0.0.0.0/0 udp dpts:80:81 LOG flags 0 level 4 prefix `[IP
Camera rule not match]'
0 0 LOG udp -- * * 192.0.97.195
0.0.0.0/0 udp dpts:80:81 LOG flags 0 level 4 prefix `[IP
Camera rule match]'
0 0 ACCEPT udp -- * * 192.0.97.195
0.0.0.0/0 udp dpts:80:81
0 0 LOG tcp -- * * !0.0.0.0/0
0.0.0.0/0 tcp dpts:33370:33389 LOG flags 0 level 4 prefix
`[Bit torrent rule not match]'
12 624 LOG tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpts:33370:33389 LOG flags 0 level 4 prefix
`[Bit torrent rule match]'
12 624 DROP tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpts:33370:33389
0 0 LOG udp -- * * !0.0.0.0/0
0.0.0.0/0 udp dpts:5198:5199 LOG flags 0 level 4 prefix
`[EcholinkUDP rule not match]'
0 0 LOG udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpts:5198:5199 LOG flags 0 level 4 prefix
`[EcholinkUDP rule match]'
0 0 ACCEPT udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpts:5198:5199
0 0 LOG tcp -- * * !0.0.0.0/0
0.0.0.0/0 tcp dpt:5200 LOG flags 0 level 4 prefix
`[EcholinkTCP rule not match]'
0 0 LOG tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:5200 LOG flags 0 level 4 prefix
`[EcholinkTCP rule match]'
0 0 ACCEPT tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:5200
0 0 ACCEPT tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:6499
0 0 ACCEPT udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpt:6499
0 0 LOG tcp -- * * !0.0.0.0/0
0.0.0.0/0 tcp dpt:1863 LOG flags 0 level 4 prefix `[Messenger1
rule not match]'
6 2584 LOG tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:1863 LOG flags 0 level 4 prefix `[Messenger1
rule match]'
6 2584 ACCEPT tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpt:1863
0 0 LOG tcp -- * * !0.0.0.0/0
0.0.0.0/0 tcp dpts:6891:6900 LOG flags 0 level 4 prefix
`[Messenger2 rule not match]'
0 0 LOG tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpts:6891:6900 LOG flags 0 level 4 prefix
`[Messenger2 rule match]'
0 0 ACCEPT tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpts:6891:6900
622 799K ACCEPT tcp -- * * 0.0.0.0/0
0.0.0.0/0 tcp dpts:27950:27965
0 0 ACCEPT udp -- * * 0.0.0.0/0
0.0.0.0/0 udp dpts:27950:27965
# exit
#

--
Regards,
Harry (M1BYT) (L)
http://www.ukradioamateur.co.uk


  #7  
Old June 1st 13, 01:53 PM posted to uk.telecom.broadband
Harry Bloomfield
external usenet poster
 
Posts: 250
Default Netgear - Block Sites

Harry Bloomfield has brought this to us :
Sorry, but I cannot make head nor tale of it, but here is the Putty.log

First section is where the router was set to Never block, the second section
with it set to always block 'caravantalk'. Before and in between the two log
sections, I logged into and used caravantalk.


176 is the routers IP, 177 my PC's IP. 195 is an IP Camera. 185 was the
IP I originally set the IP Camera on, but now 195.

--
Regards,
Harry (M1BYT) (L)
http://www.ukradioamateur.co.uk


  #8  
Old June 2nd 13, 06:53 PM posted to uk.telecom.broadband
Andrew Benham
external usenet poster
 
Posts: 291
Default Netgear - Block Sites

On Sat, 01 Jun 2013 12:49:52 +0100, Harry Bloomfield wrote:

Harry Bloomfield brought next idea :
Andrew Benham submitted this idea :
On Fri, 31 May 2013 19:26:37 +0100, Harry Bloomfield wrote:

Andrew Benham brought next idea :
If you can telnet to the router, with the Blocked Sites disabled if
you do "iptables -nvL" you should see empty rules labelled CFILTER
and HTTP.
If you then enable Block Sites, and add a domain/keyword or two, the
output of "iptables -nvL" should show 3 rules under CFILTER and one
rule per domain/keyword under HTTP.

Thanks, but...

I telneted in - it supports the iptables command, but not the -nvl
:-?

Really ? The -L option (in UPPERCASE) is to list the rules, the -v
to be verbose, and the -n to show things numerically. I guess you
could drop the -n, and maybe the -v too (but you lose the packet/byte
counts).

"iptables -h" will show the supported options, just in case you have a
really early version or one that's been compiled in an odd way.


Got it now, I had typed in a lower case L.


Sorry, but I cannot make head nor tale of it, but here is the Putty.log

First section is where the router was set to Never block, the second
section with it set to always block 'caravantalk'. Before and in between
the two log sections, I logged into and used caravantalk.


Hmmm, you have lots of rules - let's make it easier to see.

Do "iptables -nvL CFILTER" and then "iptables -nvL HTTP".

  #9  
Old June 2nd 13, 07:24 PM posted to uk.telecom.broadband
Harry Bloomfield
external usenet poster
 
Posts: 250
Default Netgear - Block Sites

Andrew Benham was thinking very hard :
On Sat, 01 Jun 2013 12:49:52 +0100, Harry Bloomfield wrote:

Harry Bloomfield brought next idea :
Andrew Benham submitted this idea :
On Fri, 31 May 2013 19:26:37 +0100, Harry Bloomfield wrote:

Andrew Benham brought next idea :
If you can telnet to the router, with the Blocked Sites disabled if
you do "iptables -nvL" you should see empty rules labelled CFILTER
and HTTP.
If you then enable Block Sites, and add a domain/keyword or two, the
output of "iptables -nvL" should show 3 rules under CFILTER and one
rule per domain/keyword under HTTP.

Thanks, but...

I telneted in - it supports the iptables command, but not the -nvl
:-?

Really ? The -L option (in UPPERCASE) is to list the rules, the -v
to be verbose, and the -n to show things numerically. I guess you
could drop the -n, and maybe the -v too (but you lose the packet/byte
counts).

"iptables -h" will show the supported options, just in case you have a
really early version or one that's been compiled in an odd way.

Got it now, I had typed in a lower case L.


Sorry, but I cannot make head nor tale of it, but here is the Putty.log

First section is where the router was set to Never block, the second
section with it set to always block 'caravantalk'. Before and in between
the two log sections, I logged into and used caravantalk.


Hmmm, you have lots of rules - let's make it easier to see.

Do "iptables -nvL CFILTER" and then "iptables -nvL HTTP".


Login: admin
Password:


BusyBox v1.01 (2008.12.07-19:38+0000) Built-in shell (ash)
Enter 'help' for a list of built-in commands.


----Set to Never Block----
# iptables -nvL CFILTER
Chain CFILTER (1 references)
pkts bytes target prot opt in out source
destination
6418 4424K HTTP tcp -- br0 * 0.0.0.0/0
0.0.0.0/0 STRING match GET tcp dpt:80 flags:0x3F/0x18
163 106K HTTP tcp -- br0 * 0.0.0.0/0
0.0.0.0/0 STRING match POST tcp dpt:80 flags:0x3F/0x18
26 12625 HTTP tcp -- br0 * 0.0.0.0/0
0.0.0.0/0 STRING match HEAD tcp dpt:80 flags:0x3F/0x18
#
# iptables -nvL CFILTER HTTP
Chain HTTP (3 references)
pkts bytes target prot opt in out source
destination
6650 4584K RETURN all -- * * 0.0.0.0/0
0.0.0.0/0 condition !schedule

__________________________________________________ ____
----Now set to Always Block----

# iptables -nvL CFILTER
Chain CFILTER (1 references)
pkts bytes target prot opt in out source
destination
6628 4628K HTTP tcp -- br0 * 0.0.0.0/0
0.0.0.0/0 STRING match GET tcp dpt:80 flags:0x3F/0x18
163 106K HTTP tcp -- br0 * 0.0.0.0/0
0.0.0.0/0 STRING match POST tcp dpt:80 flags:0x3F/0x18
26 12625 HTTP tcp -- br0 * 0.0.0.0/0
0.0.0.0/0 STRING match HEAD tcp dpt:80 flags:0x3F/0x18

# iptables -nvL HTTP
Chain HTTP (3 references)
pkts bytes target prot opt in out source
destination
6834 4764K RETURN all -- * * 0.0.0.0/0
0.0.0.0/0 condition !schedule
# end
/bin/sh: end: not found
# exit

--
Regards,
Harry (M1BYT) (L)
http://www.ukradioamateur.co.uk


  #10  
Old June 2nd 13, 11:53 PM posted to uk.telecom.broadband
Andrew Benham
external usenet poster
 
Posts: 291
Default Netgear - Block Sites

On Sun, 02 Jun 2013 18:24:59 +0100, Harry Bloomfield wrote:

Andrew Benham was thinking very hard :
On Sat, 01 Jun 2013 12:49:52 +0100, Harry Bloomfield wrote:

Harry Bloomfield brought next idea :
Andrew Benham submitted this idea :
On Fri, 31 May 2013 19:26:37 +0100, Harry Bloomfield wrote:

Andrew Benham brought next idea :
If you can telnet to the router, with the Blocked Sites disabled
if you do "iptables -nvL" you should see empty rules labelled
CFILTER and HTTP.
If you then enable Block Sites, and add a domain/keyword or two,
the output of "iptables -nvL" should show 3 rules under CFILTER
and one rule per domain/keyword under HTTP.

Thanks, but...

I telneted in - it supports the iptables command, but not the -nvl
:-?

Really ? The -L option (in UPPERCASE) is to list the rules, the -v
to be verbose, and the -n to show things numerically. I guess you
could drop the -n, and maybe the -v too (but you lose the
packet/byte counts).

"iptables -h" will show the supported options, just in case you have
a really early version or one that's been compiled in an odd way.

Got it now, I had typed in a lower case L.

Sorry, but I cannot make head nor tale of it, but here is the
Putty.log

First section is where the router was set to Never block, the second
section with it set to always block 'caravantalk'. Before and in
between the two log sections, I logged into and used caravantalk.


Hmmm, you have lots of rules - let's make it easier to see.

Do "iptables -nvL CFILTER" and then "iptables -nvL HTTP".


Login: admin Password:


BusyBox v1.01 (2008.12.07-19:38+0000) Built-in shell (ash) Enter 'help'
for a list of built-in commands.


----Set to Never Block----
# iptables -nvL CFILTER Chain CFILTER (1 references)
pkts bytes target prot opt in out source
destination
6418 4424K HTTP tcp -- br0 * 0.0.0.0/0
0.0.0.0/0 STRING match GET tcp dpt:80 flags:0x3F/0x18
163 106K HTTP tcp -- br0 * 0.0.0.0/0
0.0.0.0/0 STRING match POST tcp dpt:80 flags:0x3F/0x18
26 12625 HTTP tcp -- br0 * 0.0.0.0/0
0.0.0.0/0 STRING match HEAD tcp dpt:80 flags:0x3F/0x18 #
# iptables -nvL CFILTER HTTP Chain HTTP (3 references)
pkts bytes target prot opt in out source
destination
6650 4584K RETURN all -- * * 0.0.0.0/0
0.0.0.0/0 condition !schedule

__________________________________________________ ____
----Now set to Always Block----

# iptables -nvL CFILTER Chain CFILTER (1 references)
pkts bytes target prot opt in out source
destination
6628 4628K HTTP tcp -- br0 * 0.0.0.0/0
0.0.0.0/0 STRING match GET tcp dpt:80 flags:0x3F/0x18
163 106K HTTP tcp -- br0 * 0.0.0.0/0
0.0.0.0/0 STRING match POST tcp dpt:80 flags:0x3F/0x18
26 12625 HTTP tcp -- br0 * 0.0.0.0/0
0.0.0.0/0 STRING match HEAD tcp dpt:80 flags:0x3F/0x18

# iptables -nvL HTTP Chain HTTP (3 references)
pkts bytes target prot opt in out source
destination
6834 4764K RETURN all -- * * 0.0.0.0/0
0.0.0.0/0 condition !schedule


I don't see any difference in those two outputs. Assuming you're driving the web interface
correctly, it looks like buggy firmware - seems it's always running as "Blocking enabled
during the times set in the schedule", but without any blocking keyword/domain.

On my DG834GT:

Blocking "Never":

# iptables -nvL CFILTER
Chain CFILTER (1 references)
pkts bytes target prot opt in out source destination
# iptables -nvL HTTP
Chain HTTP (0 references)
pkts bytes target prot opt in out source destination

Blocking "Always", one keyword/domain:

# iptables -nvL CFILTER
Chain CFILTER (1 references)
pkts bytes target prot opt in out source destination
0 0 HTTP tcp -- br0 * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 flags:0x3F/0x18 STRING match GET
0 0 HTTP tcp -- br0 * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 flags:0x3F/0x18 STRING match POST
0 0 HTTP tcp -- br0 * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 flags:0x3F/0x18 STRING match HEAD
# iptables -nvL HTTP
Chain HTTP (3 references)
pkts bytes target prot opt in out source destination
0 0 BLOCK all -- * * 0.0.0.0/0 0.0.0.0/0 STRING match caravantalk

 




Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
 
Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
How do I Block MSN... Steve uk.comp.home-networking (UK home networking) 10 June 11th 10 11:01 AM
Block Windows Live Messanger using Netgear DG834M Jon uk.comp.home-networking (UK home networking) 19 November 20th 08 11:38 PM
Block: Zen - IP 82.69.55.44 Spin Dryer uk.telecom.broadband (UK broadband) 65 January 1st 06 11:01 PM
Block: Tiscali - IP 88.105.229.198 Spin Dryer uk.telecom.broadband (UK broadband) 18 December 21st 05 02:54 AM
Netgear router wont block websites [email protected] uk.telecom.broadband (UK broadband) 19 January 29th 05 10:35 AM


All times are GMT +1. The time now is 09:01 AM.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2019, Jelsoft Enterprises Ltd.Content Relevant URLs by vBSEO 2.4.0
Copyright 2004-2019 BroadbanterBanter.
The comments are property of their posters.