It seems I may have found my problem:
On looking at my own last post there I noticed the line,
# Network interface.
INTERFACE="eth0"
I only have wireless here so changed it to:
# Network interface.
INTERFACE="wlan0"
And on reboot the transmission port test now reads open with the default rule set, I shall test it further tomorrow with some torrents.
It looks like the original problem was a very simple mistake on my part by not having the correct interface selected.
Thanks for all the suggestions and help anyway!
So it looks like I still have a problem with a "big hole in the firewall" that I could maybe tighten up.
Here is the firewall.conf as it is now with the transmission port test showing open (it's just the default rules enabled and the correct interface selected now):
# /etc/firewall.conf: SliTaz firewall configuration.
# Config file used by: /etc/init.d/firewall.sh
#
# Network interface.
INTERFACE="wlan0"
# Enable/disable kernel security.
KERNEL_SECURITY="yes"
# Enable/disable iptables rules (iptables package must be installed).
IPTABLES_RULES="yes"
# Netfilter/iptables rules.
# This shell function is included in /etc/init.d/firewall.sh
# to start iptables rules.
#
iptables_rules()
{
# Drop all input connections.
iptables -P INPUT DROP
# Drop all output connections.
iptables -P OUTPUT DROP
# Drop all forward connections.
iptables -P FORWARD DROP
# Accept input on localhost (127.0.0.1).
iptables -A INPUT -i lo -j ACCEPT
# Accept input on the local network (192.168.0.0/24).
iptables -A INPUT -s 192.168.0.0/24 -j ACCEPT
# Accept near all output trafic.
iptables -A OUTPUT -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT
# Accept input trafic only for connections initialized by user.
iptables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
# If you manage a HTTP/SSH/FTP/IRC server you can accept input for non-established connections an some ports.
# else you can disable the lines below for more secured setup
# Accept input on port 80 for the HTTP server.
iptables -A INPUT -i $INTERFACE -p tcp --source-port 80 -j ACCEPT
# Accept input on port 22 for SSH.
iptables -A INPUT -i $INTERFACE -p tcp --destination-port 22 -j ACCEPT
# Accept port 21 and, 1024 to 60310 for FTP.
iptables -A INPUT -i $INTERFACE -p tcp --destination-port 21 -j ACCEPT
iptables -A INPUT -i $INTERFACE -p tcp --destination-port 1024:60310 -j ACCEPT
# Accept port 6667 for IRC chat.
iptables -A INPUT -i $INTERFACE -p tcp --source-port 6667 -j ACCEPT
# Accept unprivileged ports.
iptables -A INPUT -i $INTERFACE -p udp --destination-port 1024:65535 -j ACCEPT
# Accept ping.
iptables -A INPUT -i $INTERFACE -p icmp -j ACCEPT
}
Any suggestions now for tightening up the firewall while still allowing transmission to work properly?