All of lore.kernel.org
 help / color / mirror / Atom feed
* Bridge
@ 2017-02-08 16:36 Mario Leone
  2017-02-09 10:24 ` R: Bridge Mario Leone
  2017-02-09 14:12 ` Bridge Alfredo Rezinovsky
  0 siblings, 2 replies; 5+ messages in thread
From: Mario Leone @ 2017-02-08 16:36 UTC (permalink / raw)
  To: netfilter

Dear users,

I have a GPON fiber home connection that consists in 2 apparatus: 

- Optical network terminal ( Huawei HG8010H)
- My ISP custom firmware router 

The router connects to ONT via WAN port and the traffic is basically ipv4
incapsulated in pppoe session incapsulated in 2 vlan trunk, one for http(s)
one for voip

I want so see the traffic that flows between router and ont so i built a
linux box with 2 ports configurated ad bridge with no ip

ONT ------ eth1[BOX]eth0 ------- Router

The tipical packet that flows had source mac address and destination mac
address of ont and router(depending on the direction) and the rest inside.
I could just put wireshark listening on br0 but I can see only unencrypted
traffic, so I want to do something a little more complicated.

I would intercept traffic on both directions and redirect  it to localhost
proxy with 3 stages:

1) setup ebtables to recognize traffic on http vlan(so all traffic) and
bring it to layer3
2) setup iptables to NAT packet on some ports to be intercepted by my ssl
proxy and leave untouched all other traffic
3) nat traffic back to original destination like it was sent by the router
or vice versa from the server

I failed any attempt to redirect traffic or even log it passing trough the
bridge.
Any help? 

Thanks




^ permalink raw reply	[flat|nested] 5+ messages in thread

* R: Bridge
  2017-02-08 16:36 Bridge Mario Leone
@ 2017-02-09 10:24 ` Mario Leone
  2017-02-09 10:57   ` Pablo Neira Ayuso
  2017-02-09 14:12 ` Bridge Alfredo Rezinovsky
  1 sibling, 1 reply; 5+ messages in thread
From: Mario Leone @ 2017-02-09 10:24 UTC (permalink / raw)
  To: 'Mario Leone'; +Cc: netfilter

As said here: http://ebtables.netfilter.org/documentation/bridge-nf.html

bridge-nf-call-arptables
bridge-nf-call-iptables
bridge-nf-call-ip6tables

are enabled by default

echo 1 > bridge-nf-filter-vlan-tagged
does nothing

echo 1> bridge-nf-filter-pppoe-tagged
drops the connection

thanks


^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: R: Bridge
  2017-02-09 10:24 ` R: Bridge Mario Leone
@ 2017-02-09 10:57   ` Pablo Neira Ayuso
  2017-02-09 11:28     ` Mario Leone
  0 siblings, 1 reply; 5+ messages in thread
From: Pablo Neira Ayuso @ 2017-02-09 10:57 UTC (permalink / raw)
  To: Mario Leone; +Cc: netfilter

On Thu, Feb 09, 2017 at 11:24:49AM +0100, Mario Leone wrote:
> As said here: http://ebtables.netfilter.org/documentation/bridge-nf.html
> 
> bridge-nf-call-arptables
> bridge-nf-call-iptables
> bridge-nf-call-ip6tables
> 
> are enabled by default
> 
> echo 1 > bridge-nf-filter-vlan-tagged
> does nothing
> 
> echo 1> bridge-nf-filter-pppoe-tagged
> drops the connection

What kernel and userspace tooling versions are you using?

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: R: Bridge
  2017-02-09 10:57   ` Pablo Neira Ayuso
@ 2017-02-09 11:28     ` Mario Leone
  0 siblings, 0 replies; 5+ messages in thread
From: Mario Leone @ 2017-02-09 11:28 UTC (permalink / raw)
  To: pablo; +Cc: netfilter

> On Thu, Feb 09, 2017 at 11:24:49AM +0100, Mario Leone wrote:
> > As said here: http://ebtables.netfilter.org/documentation/bridge-nf.html
> > 
> > bridge-nf-call-arptables
> > bridge-nf-call-iptables
> > bridge-nf-call-ip6tables
> > 
> > are enabled by default
> > 
> > echo 1 > bridge-nf-filter-vlan-tagged
> > does nothing
> > 
> > echo 1> bridge-nf-filter-pppoe-tagged
> > drops the connection
> 
> What kernel and userspace tooling versions are you using?

root@zotac:~# uname -r
4.9.0-kali1-amd64
root@zotac:~# ebtables -V
ebtables v2.0.10-4 (December 2011)
root@zotac:~# iptables -V
iptables v1.6.0


tail -n +1 /proc/sys/net/bridge/bridge-nf-*
==> /proc/sys/net/bridge/bridge-nf-call-arptables <==
1

==> /proc/sys/net/bridge/bridge-nf-call-ip6tables <==
1

==> /proc/sys/net/bridge/bridge-nf-call-iptables <==
1

==> /proc/sys/net/bridge/bridge-nf-filter-pppoe-tagged <==
0

==> /proc/sys/net/bridge/bridge-nf-filter-vlan-tagged <==
1

==> /proc/sys/net/bridge/bridge-nf-pass-vlan-input-dev <==
0


> --
> To unsubscribe from this list: send the line "unsubscribe netfilter" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
> 




^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: Bridge
  2017-02-08 16:36 Bridge Mario Leone
  2017-02-09 10:24 ` R: Bridge Mario Leone
@ 2017-02-09 14:12 ` Alfredo Rezinovsky
  1 sibling, 0 replies; 5+ messages in thread
From: Alfredo Rezinovsky @ 2017-02-09 14:12 UTC (permalink / raw)
  To: Mario Leone, netfilter



On 08/02/17 13:36, Mario Leone wrote:
> Dear users,
>
> I have a GPON fiber home connection that consists in 2 apparatus:
>
> - Optical network terminal ( Huawei HG8010H)
> - My ISP custom firmware router
>
> The router connects to ONT via WAN port and the traffic is basically ipv4
> incapsulated in pppoe session incapsulated in 2 vlan trunk, one for http(s)
> one for voip
>
> I want so see the traffic that flows between router and ont so i built a
> linux box with 2 ports configurated ad bridge with no ip
>
> ONT ------ eth1[BOX]eth0 ------- Router
>
> The tipical packet that flows had source mac address and destination mac
> address of ont and router(depending on the direction) and the rest inside.
> I could just put wireshark listening on br0 but I can see only unencrypted
> traffic, so I want to do something a little more complicated.
>
> I would intercept traffic on both directions and redirect  it to localhost
> proxy with 3 stages:
>
> 1) setup ebtables to recognize traffic on http vlan(so all traffic) and
> bring it to layer3
> 2) setup iptables to NAT packet on some ports to be intercepted by my ssl
> proxy and leave untouched all other traffic
> 3) nat traffic back to original destination like it was sent by the router
> or vice versa from the server
>
> I failed any attempt to redirect traffic or even log it passing trough the
> bridge.
> Any help?
>
> Thanks
>
>
# First rule is only an optimization.
ebtables -t broute -A BROUTING -d ${my_bridge_mac} -p ipv4 -j redirect 
--redirect-target DROP

#Those are the rules to bring http traffic to layer 3
ebtables -t broute -A BROUTING -p ipv4 --ip-proto tcp --ip-dport 80 -j 
redirect --redirect-target DROP
ebtables -t broute -A BROUTING -p ipv4 --ip-proto tcp --ip-sport 80 -j 
redirect --redirect-target DROP

# Some more may be needed because your vlan configuration.

When in layer 3. the Router must have routes to reach ONT, the Router 
and the IPs behind Router. The router needs an IP to ask for ARP in both 
sides.
The proxy (unless in tproxy mode) needs to have an IP to use al source 
for its packets. Even in tproxy, the proxy needs a source IP to ask NS 
queries.



^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2017-02-09 14:12 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2017-02-08 16:36 Bridge Mario Leone
2017-02-09 10:24 ` R: Bridge Mario Leone
2017-02-09 10:57   ` Pablo Neira Ayuso
2017-02-09 11:28     ` Mario Leone
2017-02-09 14:12 ` Bridge Alfredo Rezinovsky

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.