All of lore.kernel.org
 help / color / mirror / Atom feed
From: Aleksandar Milivojevic <amilivojevic@pbl.ca>
To: Netfilter User Mailinglist <netfilter@lists.netfilter.org>
Subject: Re: again problem with alias / virtual interface
Date: Wed, 21 Jul 2004 12:09:08 -0500	[thread overview]
Message-ID: <40FEA334.2030108@pbl.ca> (raw)
In-Reply-To: <b5f12e7f0973881174d3ec37f189a737@82.186.92.90>

Batstru wrote:
> [root@maya root]# tcpdump -i eth1 | grep
> host91-92.pool82186.interbusiness.it
> tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
> listening on eth1, link-type EN10MB (Ethernet), capture size 96 bytes
> 11:31:41.895811 IP bella.dei.unipd.it.52242 >
> host91-92.pool82186.interbusiness.it.smtp: S 
> 891791967:891791967(0) win 24820 <nop,nop,sackOK,mss 1460>
> 11:31:45.257887 IP bella.dei.unipd.it.52242 >
> host91-92.pool82186.interbusiness.it.smtp: S 
> 891791967:891791967(0) win 24820 <nop,nop,sackOK,mss 1460>
> 11:31:52.006557 IP bella.dei.unipd.it.52242 >
> host91-92.pool82186.interbusiness.it.smtp: S 
> 891791967:891791967(0) win 24820 <nop,nop,sackOK,mss 1460>

OK, let's to a little test.  Instead of trying to make it work all at 
once, let start building rules from the beginning, and get simple stuff 
working first.  Flush all firewall rules you have, and do something 
simple as this:

# Flush all old stuff
iptables -F
iptables -X
chains=`cat /proc/net/ip_tables_names 2>/dev/null`
for i in $chains; do iptables -t $i -F; done
for i in $chains; do iptables -t $i -X; done

After doing this, do "iptables -L" and make sure that all chains in nat 
and mangle tables have default policy set to ACCEPT (it wouldn't be good 
if for example your POSTROUTING chain in nat table is set to drop 
packets by default).

# Simple config for testing
iptables -P INPUT DROP
iptables -P OUTPUT DROP
iptables -P FORWARD DROP
iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
iptables -A OUTPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
iptables -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT
iptables -A INPUT -i eth1 -p icmp --icmp-type ping -m state --state NEW 
-j ACCEPT
iptables -A INPUT -i eth1 -p tcp -d 82.186.92.92 --dport 25 -m state 
--state NEW -j ACCEPT

After this, iptables -L should show that all chains in filter table are 
set to DROP packets by default, and all chains in nat and mangle tables 
are set to ACCEPT packets by default.  It should also show only above 5 
rules in filter table (3 in INPUT chain, and 1 rule in OUTPUT and 
FORWARD chains), and no rules in nat and mangle tables.

Make sure that output of iptables -L matches what is described above. 
If it doesn't match, you have remains of old configuration still loaded, 
and you need to get rid of it somehow.  You may also use iptables-save 
and check that its output matches exactly the commands you typed above, 
and that only chains in filter table have default policy set to DROP.

 From another machine, try to ping 82.186.92.92 and to ssh into it.  If 
it works, you had an error somewhere in your rules.

If it doesn't work, try adding this three logging rules *after* the 
above set of rules:

iptables -A INPUT -j LOG --log-prefix="INPUT "
iptables -A OUTPUT -j LOG --log-prefix="OUTPUT "
iptables -A FORWARD -j LOG --log-prefix="FORWARD "

This should log all dropped packets (since you will be adding this rules 
at the end, just before packets are dropped).  The log will contain all 
information about the dropped packets (interface they were dropped from, 
in which chain, and all other interesting data).

Thinking of all this, another thing come to my mind.  Your network 
configuration.  If you have more than one interface connected to the 
same "wire" (say eth0 and eth1 connected to the same hub), Linux kernel 
does not need to send response packets that arrive to address configured 
on eth1 back to eth1.  It might as well just use eth0.  Been burned by 
that once (although in different context).

-- 
Aleksandar Milivojevic <amilivojevic@pbl.ca>    Pollard Banknote Limited
Systems Administrator                           1499 Buffalo Place
Tel: (204) 474-2323 ext 276                     Winnipeg, MB  R3T 1L7


  reply	other threads:[~2004-07-21 17:09 UTC|newest]

Thread overview: 20+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2004-07-21 10:31 again problem with alias / virtual interface Batstru
2004-07-21 17:09 ` Aleksandar Milivojevic [this message]
  -- strict thread matches above, loose matches on Subject: below --
2004-07-19 18:55 Batstru
2004-07-19 19:10 ` George Alexandru Dragoi
2004-07-19 16:17   ` Marco Strullato
2004-07-19 19:14 ` Antony Stone
2004-07-19 19:35 ` Aleksandar Milivojevic
2004-07-19 16:30   ` Marco Strullato
2004-07-20 19:09     ` Antony Stone
2004-07-20 19:12     ` Aleksandar Milivojevic
2004-07-20 19:22       ` Aleksandar Milivojevic
2004-07-21 15:34     ` Marco Colombo
2004-07-21 16:48       ` Michael Sconzo
2004-07-21 17:13         ` Aleksandar Milivojevic
2004-07-22  2:27           ` Michael Sconzo
2004-07-22 16:58             ` Aleksandar Milivojevic
2004-07-22  8:53           ` Marco Colombo
2004-07-22 16:05             ` Michael Sconzo
2004-07-19 19:46 ` Jamie Pratt
2004-07-19 19:58   ` Antony Stone

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=40FEA334.2030108@pbl.ca \
    --to=amilivojevic@pbl.ca \
    --cc=netfilter@lists.netfilter.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.