* Policy match with a bridge
@ 2004-08-15 0:32 Tom Eastep
2004-08-15 12:55 ` Patrick McHardy
0 siblings, 1 reply; 15+ messages in thread
From: Tom Eastep @ 2004-08-15 0:32 UTC (permalink / raw)
To: netfilter-devel
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
I'm seeing odd behavior of policy match when used with a bridge.
wookie:/backup # iptables -L -n -v
Chain INPUT (policy ACCEPT 12M packets, 1412M bytes)
~ pkts bytes target prot opt in out source
destination
Chain FORWARD (policy ACCEPT 57181 packets, 12M bytes)
~ pkts bytes target prot opt in out source
destination
Chain OUTPUT (policy ACCEPT 16M packets, 21G bytes)
~ pkts bytes target prot opt in out source
destination
wookie:/backup # iptables -A OUTPUT -m policy --pol ipsec --dir out -j LOG
wookie:/backup # ping tipper
PING tipper.shorewall.net (192.168.1.8) 56(84) bytes of data.
64 bytes from tipper.shorewall.net (192.168.1.8): icmp_seq=1 ttl=64
time=4.45 ms
64 bytes from tipper.shorewall.net (192.168.1.8): icmp_seq=2 ttl=64
time=3.81 ms
64 bytes from tipper.shorewall.net (192.168.1.8): icmp_seq=3 ttl=64
time=3.48 ms
64 bytes from tipper.shorewall.net (192.168.1.8): icmp_seq=4 ttl=64
time=3.56 ms
64 bytes from tipper.shorewall.net (192.168.1.8): icmp_seq=5 ttl=64
time=4.16 ms
64 bytes from tipper.shorewall.net (192.168.1.8): icmp_seq=6 ttl=64
time=3.71 ms
- --- tipper.shorewall.net ping statistics ---
6 packets transmitted, 6 received, 0% packet loss, time 5010ms
rtt min/avg/max/mdev = 3.483/3.863/4.452/0.340 ms
wookie:/backup # setkey -D
192.168.1.3 192.168.1
~ esp mode=transport spi=170223379(0x0a256713) reqid=0(0x00000000)
~ E: 3des-cbc 7ebd7b0f a852467c ada833a2 3b5744fc 4ab0d47d b347e694
~ A: hmac-sha1 64872be1 24233626 6429e838 8dcb7a15 159bfb12
~ seq=0x00000000 replay=4 flags=0x00000000 state=mature
~ created: Aug 14 11:04:49 2004 current: Aug 14 17:19:23 2004
~ diff: 22474(s) hard: 43200(s) soft: 34560(s)
~ last: Aug 14 11:04:49 2004 hard: 0(s) soft: 0(s)
~ current: 2416880(bytes) hard: 0(bytes) soft: 0(bytes)
~ allocated: 8941 hard: 0 soft: 0
~ sadb_seq=1 pid=30723 refcnt=0
192.168.1.8 192.168.1.3
~ esp mode=transport spi=233099158(0x0de4cf96) reqid=0(0x00000000)
~ E: 3des-cbc ce5a582a f621e4e5 84597866 ef941902 f4140957 01ada36d
~ A: hmac-sha1 3a9394f7 439b0f4e 4fed679a 74710c67 c658146e
~ seq=0x00000000 replay=4 flags=0x00000000 state=mature
~ created: Aug 14 11:04:49 2004 current: Aug 14 17:19:23 2004
~ diff: 22474(s) hard: 43200(s) soft: 34560(s)
~ last: Aug 14 11:04:49 2004 hard: 0(s) soft: 0(s)
~ current: 1208740(bytes) hard: 0(bytes) soft: 0(bytes)
~ allocated: 12222 hard: 0 soft: 0
~ sadb_seq=0 pid=30723 refcnt=0
wookie: /backup # iptables -L OUTPUT -n -v
Chain OUTPUT (policy ACCEPT 16M packets, 21G bytes)
~ pkts bytes target prot opt in out source
destination
~ 0 0 LOG all -- * * 0.0.0.0/0
0.0.0.0/0 policy match dir out pol ipsec
LOG flags 0 level 4
wookie:/backup # brctl show
bridge name bridge id STP enabled interfaces
br0 8000.0040d0073a1b no eth1
~ eth0
~ eth2
wookie:/backup # ip addr ls br0
6: br0: <BROADCAST,MULTICAST,NOTRAILERS,UP> mtu 1500 qdisc noqueue
~ link/ether 00:40:d0:07:3a:1b brd ff:ff:ff:ff:ff:ff
~ inet 192.168.1.3/24 brd 192.168.1.255 scope global br0
~ inet6 fe80::240:d0ff:fe07:3a1b/64 scope link
~ valid_lft forever preferred_lft forever
wookie:/backup # uname -a
Linux wookie 2.6.5-7.104-default #1 Wed Jul 28 16:42:13 UTC 2004 i586
i586 i386 GNU/Linux
wookie:/backup #
- -Tom
- --
Tom Eastep \ Nothing is foolproof to a sufficiently talented fool
Shoreline, \ http://shorewall.net
Washington USA \ teastep@shorewall.net
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFBHq8IO/MAbZfjDLIRAvKSAJ94NFMjdEYBOFzZeh0Cg2LpCpLYZgCdHl/7
NTIe5dxB4jbSMfvSEu0Am7s=
=q4Ie
-----END PGP SIGNATURE-----
^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: Policy match with a bridge
2004-08-15 0:32 Policy match with a bridge Tom Eastep
@ 2004-08-15 12:55 ` Patrick McHardy
2004-08-15 15:04 ` Tom Eastep
0 siblings, 1 reply; 15+ messages in thread
From: Patrick McHardy @ 2004-08-15 12:55 UTC (permalink / raw)
To: Tom Eastep; +Cc: netfilter-devel
Tom Eastep wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> I'm seeing odd behavior of policy match when used with a bridge.
>
> wookie:/backup # uname -a
> Linux wookie 2.6.5-7.104-default #1 Wed Jul 28 16:42:13 UTC 2004 i586
> i586 i386 GNU/Linux
Have you applied the ipsec+netfilter patches ? Without them, packets are
only seen encrypted in the OUTPUT chain.
Regards
Patrick
^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: Policy match with a bridge
2004-08-15 12:55 ` Patrick McHardy
@ 2004-08-15 15:04 ` Tom Eastep
2004-08-16 1:31 ` Patrick McHardy
0 siblings, 1 reply; 15+ messages in thread
From: Tom Eastep @ 2004-08-15 15:04 UTC (permalink / raw)
To: Patrick McHardy; +Cc: netfilter-devel
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Patrick McHardy wrote:
| Tom Eastep wrote:
|
|> -----BEGIN PGP SIGNED MESSAGE-----
|> Hash: SHA1
|>
|> I'm seeing odd behavior of policy match when used with a bridge.
|>
|> wookie:/backup # uname -a
|> Linux wookie 2.6.5-7.104-default #1 Wed Jul 28 16:42:13 UTC 2004 i586
|> i586 i386 GNU/Linux
|
|
| Have you applied the ipsec+netfilter patches ? Without them, packets are
| only seen encrypted in the OUTPUT chain.
|
Yes -- the ipsec+netfilter patches are applied. Here is the same test
with the bridge removed and the local ip address transfered to one of
the network cards:
wookie:~ # iptables -L -n -v
Chain INPUT (policy ACCEPT 137 packets, 18014 bytes)
~ pkts bytes target prot opt in out source
destination
Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
~ pkts bytes target prot opt in out source
destination
Chain OUTPUT (policy ACCEPT 100 packets, 14110 bytes)
~ pkts bytes target prot opt in out source
destination
wookie:~ # iptables -A OUTPUT -m policy --pol ipsec --dir out -j ACCEPT
wookie:~ # ping tipper
PING tipper.shorewall.net (192.168.1.8) 56(84) bytes of data.
64 bytes from tipper.shorewall.net (192.168.1.8): icmp_seq=1 ttl=64
time=4.19 ms
64 bytes from tipper.shorewall.net (192.168.1.8): icmp_seq=2 ttl=64
time=3.45 ms
64 bytes from tipper.shorewall.net (192.168.1.8): icmp_seq=3 ttl=64
time=3.49 ms
64 bytes from tipper.shorewall.net (192.168.1.8): icmp_seq=4 ttl=64
time=3.32 ms
- --- tipper.shorewall.net ping statistics ---
4 packets transmitted, 4 received, 0% packet loss, time 3002ms
rtt min/avg/max/mdev = 3.327/3.617/4.195/0.339 ms
wookie:~ # iptables -L -n -v
Chain INPUT (policy ACCEPT 482 packets, 50100 bytes)
~ pkts bytes target prot opt in out source
destination
Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
~ pkts bytes target prot opt in out source
destination
Chain OUTPUT (policy ACCEPT 269 packets, 36010 bytes)
~ pkts bytes target prot opt in out source
destination
~ 28 3376 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 policy match dir out pol ipsec
wookie:~ #
- -Tom
- --
Tom Eastep \ Nothing is foolproof to a sufficiently talented fool
Shoreline, \ http://shorewall.net
Washington USA \ teastep@shorewall.net
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFBH3uHO/MAbZfjDLIRAvIhAJ4x6l+LJ7pSp/vnrqHlSeOidn0oAACgrZv6
Xrm70xeiqgHYKOle8YSce14=
=ZChs
-----END PGP SIGNATURE-----
^ permalink raw reply [flat|nested] 15+ messages in thread
* [Bridge] Re: Policy match with a bridge
2004-08-15 15:04 ` Tom Eastep
@ 2004-08-16 1:31 ` Patrick McHardy
0 siblings, 0 replies; 15+ messages in thread
From: Patrick McHardy @ 2004-08-16 1:31 UTC (permalink / raw)
To: Tom Eastep; +Cc: netfilter-devel, bridge
Tom Eastep wrote:
> | Have you applied the ipsec+netfilter patches ? Without them, packets
> are
> | only seen encrypted in the OUTPUT chain.
> |
> Yes -- the ipsec+netfilter patches are applied. Here is the same test
> with the bridge removed and the local ip address transfered to one of
> the network cards:
The problem is ipv4_sabotage_out in the briding code. It prevents the
packet from hitting the LOCAL_OUT hook while it is still unencrypted.
When it hits the bridging code and its LOCAL_OUT hook it's too late.
Not sure how to handle it yet.
Regards
Patrick
^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: Policy match with a bridge
@ 2004-08-16 1:31 ` Patrick McHardy
0 siblings, 0 replies; 15+ messages in thread
From: Patrick McHardy @ 2004-08-16 1:31 UTC (permalink / raw)
To: Tom Eastep; +Cc: netfilter-devel, bridge
Tom Eastep wrote:
> | Have you applied the ipsec+netfilter patches ? Without them, packets
> are
> | only seen encrypted in the OUTPUT chain.
> |
> Yes -- the ipsec+netfilter patches are applied. Here is the same test
> with the bridge removed and the local ip address transfered to one of
> the network cards:
The problem is ipv4_sabotage_out in the briding code. It prevents the
packet from hitting the LOCAL_OUT hook while it is still unencrypted.
When it hits the bridging code and its LOCAL_OUT hook it's too late.
Not sure how to handle it yet.
Regards
Patrick
^ permalink raw reply [flat|nested] 15+ messages in thread
* [Bridge] Re: Policy match with a bridge
2004-08-16 1:31 ` Patrick McHardy
@ 2004-08-16 1:43 ` Tom Eastep
-1 siblings, 0 replies; 15+ messages in thread
From: Tom Eastep @ 2004-08-16 1:43 UTC (permalink / raw)
To: Patrick McHardy; +Cc: netfilter-devel, bridge
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Patrick McHardy wrote:
| Tom Eastep wrote:
|
|> | Have you applied the ipsec+netfilter patches ? Without them, packets
|> are
|> | only seen encrypted in the OUTPUT chain.
|> |
|> Yes -- the ipsec+netfilter patches are applied. Here is the same test
|> with the bridge removed and the local ip address transfered to one of
|> the network cards:
|
|
| The problem is ipv4_sabotage_out in the briding code. It prevents the
| packet from hitting the LOCAL_OUT hook while it is still unencrypted.
| When it hits the bridging code and its LOCAL_OUT hook it's too late.
| Not sure how to handle it yet.
|
Thanks for the update.
- -Tom
- --
Tom Eastep \ Nothing is foolproof to a sufficiently talented fool
Shoreline, \ http://shorewall.net
Washington USA \ teastep@shorewall.net
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFBIBFOO/MAbZfjDLIRAvS4AJ9eGQhcxVi09h8gmLZ/CpauSYlw1wCePgBQ
trHWmX/wZV/DyIjSz05IGyQ=
=mL/B
-----END PGP SIGNATURE-----
^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: Policy match with a bridge
@ 2004-08-16 1:43 ` Tom Eastep
0 siblings, 0 replies; 15+ messages in thread
From: Tom Eastep @ 2004-08-16 1:43 UTC (permalink / raw)
To: Patrick McHardy; +Cc: netfilter-devel, bridge
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Patrick McHardy wrote:
| Tom Eastep wrote:
|
|> | Have you applied the ipsec+netfilter patches ? Without them, packets
|> are
|> | only seen encrypted in the OUTPUT chain.
|> |
|> Yes -- the ipsec+netfilter patches are applied. Here is the same test
|> with the bridge removed and the local ip address transfered to one of
|> the network cards:
|
|
| The problem is ipv4_sabotage_out in the briding code. It prevents the
| packet from hitting the LOCAL_OUT hook while it is still unencrypted.
| When it hits the bridging code and its LOCAL_OUT hook it's too late.
| Not sure how to handle it yet.
|
Thanks for the update.
- -Tom
- --
Tom Eastep \ Nothing is foolproof to a sufficiently talented fool
Shoreline, \ http://shorewall.net
Washington USA \ teastep@shorewall.net
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFBIBFOO/MAbZfjDLIRAvS4AJ9eGQhcxVi09h8gmLZ/CpauSYlw1wCePgBQ
trHWmX/wZV/DyIjSz05IGyQ=
=mL/B
-----END PGP SIGNATURE-----
^ permalink raw reply [flat|nested] 15+ messages in thread
* [Bridge] Re: Policy match with a bridge
2004-08-16 1:31 ` Patrick McHardy
@ 2004-08-19 18:10 ` Bart De Schuymer
-1 siblings, 0 replies; 15+ messages in thread
From: Bart De Schuymer @ 2004-08-19 18:10 UTC (permalink / raw)
To: Patrick McHardy, Tom Eastep; +Cc: netfilter-devel, bridge
On Monday 16 August 2004 03:31, Patrick McHardy wrote:
> The problem is ipv4_sabotage_out in the briding code. It prevents the
> packet from hitting the LOCAL_OUT hook while it is still unencrypted.
> When it hits the bridging code and its LOCAL_OUT hook it's too late.
> Not sure how to handle it yet.
I'll have a look at that after I'm finished with the IPv6 bridge firewalling
stuff.
cheers,
Bart
^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: Policy match with a bridge
@ 2004-08-19 18:10 ` Bart De Schuymer
0 siblings, 0 replies; 15+ messages in thread
From: Bart De Schuymer @ 2004-08-19 18:10 UTC (permalink / raw)
To: Patrick McHardy, Tom Eastep; +Cc: netfilter-devel, bridge
On Monday 16 August 2004 03:31, Patrick McHardy wrote:
> The problem is ipv4_sabotage_out in the briding code. It prevents the
> packet from hitting the LOCAL_OUT hook while it is still unencrypted.
> When it hits the bridging code and its LOCAL_OUT hook it's too late.
> Not sure how to handle it yet.
I'll have a look at that after I'm finished with the IPv6 bridge firewalling
stuff.
cheers,
Bart
^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: Policy match with a bridge
2004-08-19 18:10 ` Bart De Schuymer
@ 2004-10-14 0:23 ` Tom Eastep
-1 siblings, 0 replies; 15+ messages in thread
From: Tom Eastep @ 2004-10-14 0:23 UTC (permalink / raw)
To: Bart De Schuymer; +Cc: netfilter-devel, bridge, Patrick McHardy
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Bart De Schuymer wrote:
> On Monday 16 August 2004 03:31, Patrick McHardy wrote:
>
>>The problem is ipv4_sabotage_out in the briding code. It prevents the
>>packet from hitting the LOCAL_OUT hook while it is still unencrypted.
>>When it hits the bridging code and its LOCAL_OUT hook it's too late.
>>Not sure how to handle it yet.
>
>
> I'll have a look at that after I'm finished with the IPv6 bridge
firewalling
> stuff.
>
Any progress on this?
Thanks,
- -Tom
- --
Tom Eastep \ Nothing is foolproof to a sufficiently talented fool
Shoreline, \ http://shorewall.net
Washington USA \ teastep@shorewall.net
PGP Public Key \ https://lists.shorewall.net/teastep.pgp.key
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFBbcbvO/MAbZfjDLIRAmBsAJsFlFdf6+c5tzT8Z5OGG/nnxoL//wCghS8L
hX2rkQdtF2v7YIwRyfRDLIY=
=6sB9
-----END PGP SIGNATURE-----
^ permalink raw reply [flat|nested] 15+ messages in thread
* [Bridge] Re: Policy match with a bridge
@ 2004-10-14 0:23 ` Tom Eastep
0 siblings, 0 replies; 15+ messages in thread
From: Tom Eastep @ 2004-10-14 0:23 UTC (permalink / raw)
To: Bart De Schuymer; +Cc: netfilter-devel, bridge
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Bart De Schuymer wrote:
> On Monday 16 August 2004 03:31, Patrick McHardy wrote:
>
>>The problem is ipv4_sabotage_out in the briding code. It prevents the
>>packet from hitting the LOCAL_OUT hook while it is still unencrypted.
>>When it hits the bridging code and its LOCAL_OUT hook it's too late.
>>Not sure how to handle it yet.
>
>
> I'll have a look at that after I'm finished with the IPv6 bridge
firewalling
> stuff.
>
Any progress on this?
Thanks,
- -Tom
- --
Tom Eastep \ Nothing is foolproof to a sufficiently talented fool
Shoreline, \ http://shorewall.net
Washington USA \ teastep@shorewall.net
PGP Public Key \ https://lists.shorewall.net/teastep.pgp.key
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFBbcbvO/MAbZfjDLIRAmBsAJsFlFdf6+c5tzT8Z5OGG/nnxoL//wCghS8L
hX2rkQdtF2v7YIwRyfRDLIY=
=6sB9
-----END PGP SIGNATURE-----
^ permalink raw reply [flat|nested] 15+ messages in thread
* [Bridge] Re: Policy match with a bridge
2004-10-14 0:23 ` [Bridge] " Tom Eastep
@ 2004-10-14 6:24 ` Bart De Schuymer
-1 siblings, 0 replies; 15+ messages in thread
From: Bart De Schuymer @ 2004-10-14 6:24 UTC (permalink / raw)
To: Tom Eastep; +Cc: netfilter-devel, bridge
On Thursday 14 October 2004 02:23, Tom Eastep wrote:
> Bart De Schuymer wrote:
> > On Monday 16 August 2004 03:31, Patrick McHardy wrote:
> >>The problem is ipv4_sabotage_out in the briding code. It prevents the
> >>packet from hitting the LOCAL_OUT hook while it is still unencrypted.
> >>When it hits the bridging code and its LOCAL_OUT hook it's too late.
> >>Not sure how to handle it yet.
> >
> > I'll have a look at that after I'm finished with the IPv6 bridge
>
> firewalling
>
> > stuff.
>
> Any progress on this?
It's in the back of my mind, but I haven't had time yet to look into the ipsec
code. I'll try next weekend. It's probably non-trivial, as Patrick didn't see
a direct solution.
cheers,
Bart
^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: Policy match with a bridge
@ 2004-10-14 6:24 ` Bart De Schuymer
0 siblings, 0 replies; 15+ messages in thread
From: Bart De Schuymer @ 2004-10-14 6:24 UTC (permalink / raw)
To: Tom Eastep; +Cc: netfilter-devel, bridge, Patrick McHardy
On Thursday 14 October 2004 02:23, Tom Eastep wrote:
> Bart De Schuymer wrote:
> > On Monday 16 August 2004 03:31, Patrick McHardy wrote:
> >>The problem is ipv4_sabotage_out in the briding code. It prevents the
> >>packet from hitting the LOCAL_OUT hook while it is still unencrypted.
> >>When it hits the bridging code and its LOCAL_OUT hook it's too late.
> >>Not sure how to handle it yet.
> >
> > I'll have a look at that after I'm finished with the IPv6 bridge
>
> firewalling
>
> > stuff.
>
> Any progress on this?
It's in the back of my mind, but I haven't had time yet to look into the ipsec
code. I'll try next weekend. It's probably non-trivial, as Patrick didn't see
a direct solution.
cheers,
Bart
^ permalink raw reply [flat|nested] 15+ messages in thread
* [Bridge] Re: Policy match with a bridge
2004-10-14 0:23 ` [Bridge] " Tom Eastep
@ 2004-10-16 13:30 ` Bart De Schuymer
-1 siblings, 0 replies; 15+ messages in thread
From: Bart De Schuymer @ 2004-10-16 13:30 UTC (permalink / raw)
To: Tom Eastep; +Cc: netfilter-devel, bridge
On Thursday 14 October 2004 02:23, Tom Eastep wrote:
> Bart De Schuymer wrote:
> > On Monday 16 August 2004 03:31, Patrick McHardy wrote:
> >>The problem is ipv4_sabotage_out in the briding code. It prevents the
> >>packet from hitting the LOCAL_OUT hook while it is still unencrypted.
> >>When it hits the bridging code and its LOCAL_OUT hook it's too late.
> >>Not sure how to handle it yet.
> >
> > I'll have a look at that after I'm finished with the IPv6 bridge
>
> firewalling
>
> > stuff.
>
> Any progress on this?
You should be able to do what you want in the iptables mangle OUTPUT chain
instead of the one in the filter table.
Patrick, a hack solution would be to temporarily change out->hard_start_xmit
to something else than br_dev_xmit, that way you fool ipv4_sabotage_out.
cheers,
Bart
^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: Policy match with a bridge
@ 2004-10-16 13:30 ` Bart De Schuymer
0 siblings, 0 replies; 15+ messages in thread
From: Bart De Schuymer @ 2004-10-16 13:30 UTC (permalink / raw)
To: Tom Eastep; +Cc: netfilter-devel, bridge, Patrick McHardy
On Thursday 14 October 2004 02:23, Tom Eastep wrote:
> Bart De Schuymer wrote:
> > On Monday 16 August 2004 03:31, Patrick McHardy wrote:
> >>The problem is ipv4_sabotage_out in the briding code. It prevents the
> >>packet from hitting the LOCAL_OUT hook while it is still unencrypted.
> >>When it hits the bridging code and its LOCAL_OUT hook it's too late.
> >>Not sure how to handle it yet.
> >
> > I'll have a look at that after I'm finished with the IPv6 bridge
>
> firewalling
>
> > stuff.
>
> Any progress on this?
You should be able to do what you want in the iptables mangle OUTPUT chain
instead of the one in the filter table.
Patrick, a hack solution would be to temporarily change out->hard_start_xmit
to something else than br_dev_xmit, that way you fool ipv4_sabotage_out.
cheers,
Bart
^ permalink raw reply [flat|nested] 15+ messages in thread
end of thread, other threads:[~2004-10-16 13:30 UTC | newest]
Thread overview: 15+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2004-08-15 0:32 Policy match with a bridge Tom Eastep
2004-08-15 12:55 ` Patrick McHardy
2004-08-15 15:04 ` Tom Eastep
2004-08-16 1:31 ` [Bridge] " Patrick McHardy
2004-08-16 1:31 ` Patrick McHardy
2004-08-16 1:43 ` [Bridge] " Tom Eastep
2004-08-16 1:43 ` Tom Eastep
2004-08-19 18:10 ` [Bridge] " Bart De Schuymer
2004-08-19 18:10 ` Bart De Schuymer
2004-10-14 0:23 ` Tom Eastep
2004-10-14 0:23 ` [Bridge] " Tom Eastep
2004-10-14 6:24 ` Bart De Schuymer
2004-10-14 6:24 ` Bart De Schuymer
2004-10-16 13:30 ` [Bridge] " Bart De Schuymer
2004-10-16 13:30 ` Bart De Schuymer
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.