* Bridge
@ 2017-02-08 16:36 Mario Leone
2017-02-09 10:24 ` R: Bridge Mario Leone
2017-02-09 14:12 ` Bridge Alfredo Rezinovsky
0 siblings, 2 replies; 5+ messages in thread
From: Mario Leone @ 2017-02-08 16:36 UTC (permalink / raw)
To: netfilter
Dear users,
I have a GPON fiber home connection that consists in 2 apparatus:
- Optical network terminal ( Huawei HG8010H)
- My ISP custom firmware router
The router connects to ONT via WAN port and the traffic is basically ipv4
incapsulated in pppoe session incapsulated in 2 vlan trunk, one for http(s)
one for voip
I want so see the traffic that flows between router and ont so i built a
linux box with 2 ports configurated ad bridge with no ip
ONT ------ eth1[BOX]eth0 ------- Router
The tipical packet that flows had source mac address and destination mac
address of ont and router(depending on the direction) and the rest inside.
I could just put wireshark listening on br0 but I can see only unencrypted
traffic, so I want to do something a little more complicated.
I would intercept traffic on both directions and redirect it to localhost
proxy with 3 stages:
1) setup ebtables to recognize traffic on http vlan(so all traffic) and
bring it to layer3
2) setup iptables to NAT packet on some ports to be intercepted by my ssl
proxy and leave untouched all other traffic
3) nat traffic back to original destination like it was sent by the router
or vice versa from the server
I failed any attempt to redirect traffic or even log it passing trough the
bridge.
Any help?
Thanks
^ permalink raw reply [flat|nested] 5+ messages in thread
* R: Bridge
2017-02-08 16:36 Bridge Mario Leone
@ 2017-02-09 10:24 ` Mario Leone
2017-02-09 10:57 ` Pablo Neira Ayuso
2017-02-09 14:12 ` Bridge Alfredo Rezinovsky
1 sibling, 1 reply; 5+ messages in thread
From: Mario Leone @ 2017-02-09 10:24 UTC (permalink / raw)
To: 'Mario Leone'; +Cc: netfilter
As said here: http://ebtables.netfilter.org/documentation/bridge-nf.html
bridge-nf-call-arptables
bridge-nf-call-iptables
bridge-nf-call-ip6tables
are enabled by default
echo 1 > bridge-nf-filter-vlan-tagged
does nothing
echo 1> bridge-nf-filter-pppoe-tagged
drops the connection
thanks
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: R: Bridge
2017-02-09 10:24 ` R: Bridge Mario Leone
@ 2017-02-09 10:57 ` Pablo Neira Ayuso
2017-02-09 11:28 ` Mario Leone
0 siblings, 1 reply; 5+ messages in thread
From: Pablo Neira Ayuso @ 2017-02-09 10:57 UTC (permalink / raw)
To: Mario Leone; +Cc: netfilter
On Thu, Feb 09, 2017 at 11:24:49AM +0100, Mario Leone wrote:
> As said here: http://ebtables.netfilter.org/documentation/bridge-nf.html
>
> bridge-nf-call-arptables
> bridge-nf-call-iptables
> bridge-nf-call-ip6tables
>
> are enabled by default
>
> echo 1 > bridge-nf-filter-vlan-tagged
> does nothing
>
> echo 1> bridge-nf-filter-pppoe-tagged
> drops the connection
What kernel and userspace tooling versions are you using?
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: R: Bridge
2017-02-09 10:57 ` Pablo Neira Ayuso
@ 2017-02-09 11:28 ` Mario Leone
0 siblings, 0 replies; 5+ messages in thread
From: Mario Leone @ 2017-02-09 11:28 UTC (permalink / raw)
To: pablo; +Cc: netfilter
> On Thu, Feb 09, 2017 at 11:24:49AM +0100, Mario Leone wrote:
> > As said here: http://ebtables.netfilter.org/documentation/bridge-nf.html
> >
> > bridge-nf-call-arptables
> > bridge-nf-call-iptables
> > bridge-nf-call-ip6tables
> >
> > are enabled by default
> >
> > echo 1 > bridge-nf-filter-vlan-tagged
> > does nothing
> >
> > echo 1> bridge-nf-filter-pppoe-tagged
> > drops the connection
>
> What kernel and userspace tooling versions are you using?
root@zotac:~# uname -r
4.9.0-kali1-amd64
root@zotac:~# ebtables -V
ebtables v2.0.10-4 (December 2011)
root@zotac:~# iptables -V
iptables v1.6.0
tail -n +1 /proc/sys/net/bridge/bridge-nf-*
==> /proc/sys/net/bridge/bridge-nf-call-arptables <==
1
==> /proc/sys/net/bridge/bridge-nf-call-ip6tables <==
1
==> /proc/sys/net/bridge/bridge-nf-call-iptables <==
1
==> /proc/sys/net/bridge/bridge-nf-filter-pppoe-tagged <==
0
==> /proc/sys/net/bridge/bridge-nf-filter-vlan-tagged <==
1
==> /proc/sys/net/bridge/bridge-nf-pass-vlan-input-dev <==
0
> --
> To unsubscribe from this list: send the line "unsubscribe netfilter" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at http://vger.kernel.org/majordomo-info.html
>
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: Bridge
2017-02-08 16:36 Bridge Mario Leone
2017-02-09 10:24 ` R: Bridge Mario Leone
@ 2017-02-09 14:12 ` Alfredo Rezinovsky
1 sibling, 0 replies; 5+ messages in thread
From: Alfredo Rezinovsky @ 2017-02-09 14:12 UTC (permalink / raw)
To: Mario Leone, netfilter
On 08/02/17 13:36, Mario Leone wrote:
> Dear users,
>
> I have a GPON fiber home connection that consists in 2 apparatus:
>
> - Optical network terminal ( Huawei HG8010H)
> - My ISP custom firmware router
>
> The router connects to ONT via WAN port and the traffic is basically ipv4
> incapsulated in pppoe session incapsulated in 2 vlan trunk, one for http(s)
> one for voip
>
> I want so see the traffic that flows between router and ont so i built a
> linux box with 2 ports configurated ad bridge with no ip
>
> ONT ------ eth1[BOX]eth0 ------- Router
>
> The tipical packet that flows had source mac address and destination mac
> address of ont and router(depending on the direction) and the rest inside.
> I could just put wireshark listening on br0 but I can see only unencrypted
> traffic, so I want to do something a little more complicated.
>
> I would intercept traffic on both directions and redirect it to localhost
> proxy with 3 stages:
>
> 1) setup ebtables to recognize traffic on http vlan(so all traffic) and
> bring it to layer3
> 2) setup iptables to NAT packet on some ports to be intercepted by my ssl
> proxy and leave untouched all other traffic
> 3) nat traffic back to original destination like it was sent by the router
> or vice versa from the server
>
> I failed any attempt to redirect traffic or even log it passing trough the
> bridge.
> Any help?
>
> Thanks
>
>
# First rule is only an optimization.
ebtables -t broute -A BROUTING -d ${my_bridge_mac} -p ipv4 -j redirect
--redirect-target DROP
#Those are the rules to bring http traffic to layer 3
ebtables -t broute -A BROUTING -p ipv4 --ip-proto tcp --ip-dport 80 -j
redirect --redirect-target DROP
ebtables -t broute -A BROUTING -p ipv4 --ip-proto tcp --ip-sport 80 -j
redirect --redirect-target DROP
# Some more may be needed because your vlan configuration.
When in layer 3. the Router must have routes to reach ONT, the Router
and the IPs behind Router. The router needs an IP to ask for ARP in both
sides.
The proxy (unless in tproxy mode) needs to have an IP to use al source
for its packets. Even in tproxy, the proxy needs a source IP to ask NS
queries.
^ permalink raw reply [flat|nested] 5+ messages in thread
end of thread, other threads:[~2017-02-09 14:12 UTC | newest]
Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2017-02-08 16:36 Bridge Mario Leone
2017-02-09 10:24 ` R: Bridge Mario Leone
2017-02-09 10:57 ` Pablo Neira Ayuso
2017-02-09 11:28 ` Mario Leone
2017-02-09 14:12 ` Bridge Alfredo Rezinovsky
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.