From mboxrd@z Thu Jan 1 00:00:00 1970 From: Patrick McHardy Subject: Re: How to test netfilter SYNPROXY target properly? Date: Fri, 3 Jan 2014 13:19:08 +0000 Message-ID: <20140103131908.GA26268@macbook.localnet> References: Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: "netdev@vger.kernel.org" , netfilter-devel@vger.kernel.org To: Vincent Li Return-path: Received: from stinky.trash.net ([213.144.137.162]:56975 "EHLO stinky.trash.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751085AbaACNTM (ORCPT ); Fri, 3 Jan 2014 08:19:12 -0500 Content-Disposition: inline In-Reply-To: Sender: netfilter-devel-owner@vger.kernel.org List-ID: On Thu, Jan 02, 2014 at 03:30:21PM -0800, Vincent Li wrote: > Hi Patrick > > I should have put this question in user list instead of dev list, but > I couldn't find any user based documentation on how to test the > SYNPROXY target other than the message in the SYNPROXY patch series. > so here is my setup: > > ---packet flow > > client 10.1.72.99 (vlan 1101) <->Linux with SYNPROXY rule - 10.1.72.9 > (vlan 1101) 10.2.72.139 (vlan 1102) <->server 10.2.72.99 > ... > /usr/local/sbin/iptables -A INPUT -i $EXTIF -p tcp --dport 80 -m state > --state UNTRACKED,INVALID -j SYNPROXY --sack-perm --timestamp --mss > 1460 --wscale 5 > 00000000 00000000 > > I think I might miss something and not testing the SYNPROXY properly, any clue? I guess you need to put the SYNPROXY rule in FORWARD instead of INPUT.