* Why does ipv6 enabled interfere with ipv4 SNAT?
@ 2008-03-25 1:28 Whit Blauvelt
2008-03-25 1:58 ` Jan Engelhardt
0 siblings, 1 reply; 14+ messages in thread
From: Whit Blauvelt @ 2008-03-25 1:28 UTC (permalink / raw)
To: netfilter
I've just been setting up a replacement for an old server happily running
Netfilter with SNAT for years. The new one - using Ubuntu Server 7.10 - was
refusing to SNAT or MASQ, despite running the same long-proven Netfilter
rules. After checking that everything was getting set right in
/proc/sys/net/ipv4/conf (it was), I for some reason took a look in
/proc/sys/net/ipv6/conf. (Ubuntu insists on running ipv6 by default.) There
was an anomoly: The new machine has 6 NICs, and while ipv4/conf had eth0
through eth5, ipv6/conf only had them through eth3 - just the first 4. As it
happens the Internet-facing NICs for this box are eth4 and eth5.
At first I looked for a way to populate the ipv6 proc area. But not finding
that, and really having no use for ipv6 anyway - stupid to leave stuff on on
a server when it's not being used right? - I finally went to
/etc/modprobe.d/arch/i386 and added a line, "alias net-pf-10 off", which on
rebooting blocks the ipv6 kernel module from loading. Now, with no other
change, SNAT works as well as ever.
But I'd still like to understand what the principle here is. Are there two
independent ipv6-related bugs - one that prevents its /proc space being
populated beyond 4 NICs, and a totally different one that breaks ipv4
Netfilter SNAT? Or was the first bug what broke SNAT? What is ipv4 Netfilter
doing being vulnerable to ipv6 problems anyway? I know there's Netfilter
stuff for ipv6; is it somehow required to invoke that somehow if ipv6 is
enabled in order for the ipv4 Netfilter code to work right with SNAT?
Finally, is the Ubuntu Server project being boneheaded to even have ipv6
enabled by default, if it's still this far from being ready for prime time?
Servers should be rock-solid at basic functions like SNAT out-of-the-box,
IMHO.
Thanks for any explanations. As I say, things work fine once I figure out
what to disable. But frankly it took me half the day to track down what the
problem was.
Regards,
Whit
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Why does ipv6 enabled interfere with ipv4 SNAT?
2008-03-25 1:28 Why does ipv6 enabled interfere with ipv4 SNAT? Whit Blauvelt
@ 2008-03-25 1:58 ` Jan Engelhardt
2008-03-25 2:44 ` Whit Blauvelt
0 siblings, 1 reply; 14+ messages in thread
From: Jan Engelhardt @ 2008-03-25 1:58 UTC (permalink / raw)
To: Whit Blauvelt; +Cc: netfilter
On Tuesday 2008-03-25 02:28, Whit Blauvelt wrote:
> I for some reason took a look in
> /proc/sys/net/ipv6/conf. (Ubuntu insists on running ipv6 by default.) There
> was an anomoly: The new machine has 6 NICs, and while ipv4/conf had eth0
> through eth5, ipv6/conf only had them through eth3 - just the first 4.
Just what _do_ you actually have in /proc/sys/net/ipv6/conf?
Just 4 entries seems a bit spartanic, since there are also
the "all" and "default" entries:
# ls /proc/sys/net/ipv6/conf/
all default lo rtl0 sis0 tun0 vmnet1
NAT-out device is sis0. Even if I add in a number of dummies,
all remains normal:
all dummy0 dummy2 dummy4 dummy6 dummy8 lo sis0 vmnet1
default dummy1 dummy3 dummy5 dummy7 dummy9 rtl0 tun0
It still works with opensuse plus 2.6.23. Well, I suggest you
try a stock kernel.
> Finally, is the Ubuntu Server project being boneheaded to even have ipv6
> enabled by default, if it's still this far from being ready for prime time?
I would not say IPv6 was not ready.
> Servers should be rock-solid at basic functions like SNAT out-of-the-box,
> IMHO.
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Why does ipv6 enabled interfere with ipv4 SNAT?
2008-03-25 1:58 ` Jan Engelhardt
@ 2008-03-25 2:44 ` Whit Blauvelt
2008-03-25 2:57 ` Jan Engelhardt
2008-03-25 11:03 ` Jozsef Kadlecsik
0 siblings, 2 replies; 14+ messages in thread
From: Whit Blauvelt @ 2008-03-25 2:44 UTC (permalink / raw)
To: Jan Engelhardt; +Cc: netfilter
On Tue, Mar 25, 2008 at 02:58:25AM +0100, Jan Engelhardt wrote:
> Just what _do_ you actually have in /proc/sys/net/ipv6/conf?
> Just 4 entries seems a bit spartanic, since there are also
> the "all" and "default" entries:
I was mentioning where the mismatch was. Yeah the other stuff's there.
/proc/sys/net/ipv6/conf ends up with only:
all default eth0 eth1 eth2 eth3 lo
while /proc/sys/net/ipv4/conf ends up (correctly) with:
all default eth0 eth1 eth2 eth3 eth4 eth5 lo
Now, I don't know just which process is (not) doing the populating there,
but that's consistently where it ends up with ipv6 enabled and 6 NICs in the
box.
> # ls /proc/sys/net/ipv6/conf/
> all default lo rtl0 sis0 tun0 vmnet1
>
> NAT-out device is sis0. Even if I add in a number of dummies,
> all remains normal:
>
> all dummy0 dummy2 dummy4 dummy6 dummy8 lo sis0 vmnet1
> default dummy1 dummy3 dummy5 dummy7 dummy9 rtl0 tun0
Not sure what you're thinking there. My problem wasn't with there being too
many devices, but with two of the devices I actually have not being
represented - and with Netfilter not doing _ipv4_ SNAT on account of
something with _ipv6_. Why should Netfilter ipv4 code even _care_ about
what's right or not with ipv6? Do you have any knowledge about
interdependency there?
> It still works with opensuse plus 2.6.23. Well, I suggest you
> try a stock kernel.
It is a stock kernel, if by that you mean a stock distro kernel -
Ubuntu's latest, 2.6.22-14-server.
> I would not say IPv6 was not ready.
I have no idea if the failure to fully populate the ipv6 proc eth? devices
was Debian-specific, Ubuntu-specific, a shortcoming of the ifupdown suite
both use, or a bug in the kernel itself. But it seems wrong on the face of
it for ipv4 Netfilter SNAT code to depend on ipv6 in any way. Yet something
about ipv6 on Ubuntu - possibly the failure to set NIC devices beyond eth3
up properly in the ipv6 /proc space - breaks Netfilter ipv4 snat. I'm still
hoping to understand why, in part because there's obviously a serious bug
_somewhere_, and it would be nice to report it to the right place.
Best,
Whit
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Why does ipv6 enabled interfere with ipv4 SNAT?
2008-03-25 2:44 ` Whit Blauvelt
@ 2008-03-25 2:57 ` Jan Engelhardt
2008-03-25 3:57 ` Whit Blauvelt
2008-03-25 11:03 ` Jozsef Kadlecsik
1 sibling, 1 reply; 14+ messages in thread
From: Jan Engelhardt @ 2008-03-25 2:57 UTC (permalink / raw)
To: Whit Blauvelt; +Cc: netfilter
On Tuesday 2008-03-25 03:44, Whit Blauvelt wrote:
>
> Not sure what you're thinking there. My problem wasn't with there being too
> many devices, but with two of the devices I actually have not being
> represented - and with Netfilter not doing _ipv4_ SNAT on account of
> something with _ipv6_.
How does it break? Do the counters increase in the nat table at all?
Do the chain and/or rule counters increase if you add the same rule
without action? (I.e.:
-t nat -A POSTROUTING -o eth4 -m whatever
-t nat -A POSTROUTING -o eth4 -m whatever -j SNAT --to xyz
>> It still works with opensuse plus 2.6.23. Well, I suggest you
>> try a stock kernel.
>
> It is a stock kernel, if by that you mean a stock distro kernel -
> Ubuntu's latest, 2.6.22-14-server.
Stock vanilla kernel.org kernel.
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Why does ipv6 enabled interfere with ipv4 SNAT?
2008-03-25 2:57 ` Jan Engelhardt
@ 2008-03-25 3:57 ` Whit Blauvelt
0 siblings, 0 replies; 14+ messages in thread
From: Whit Blauvelt @ 2008-03-25 3:57 UTC (permalink / raw)
To: Jan Engelhardt; +Cc: netfilter
On Tue, Mar 25, 2008 at 03:57:49AM +0100, Jan Engelhardt wrote:
> How does it break? Do the counters increase in the nat table at all?
> Do the chain and/or rule counters increase if you add the same rule
> without action? (I.e.:
>
> -t nat -A POSTROUTING -o eth4 -m whatever
> -t nat -A POSTROUTING -o eth4 -m whatever -j SNAT --to xyz
No the counters don't increase. Again, ipv4 Netfilter SNAT does not work if
ipv6 is enabled on the system. It works perfectly if ipv6 is disabled - no
other changes. Do you have any theory about that, at all? It may well be
downstream of the failure to handle /proc assignments correctly for > 4 NICs
on the ipv6 side - understandably most people aren't network admins on my
level running boxes with > 4 NICs so that wouldn't bite that often. That
wouldn't make it not a bug, though.
>> It is a stock kernel, if by that you mean a stock distro kernel -
>> Ubuntu's latest, 2.6.22-14-server.
> Stock vanilla kernel.org kernel.
Why would I want to do that? If you read my orginal post closely, I have no
need for ipv6. It's fine with me to run without it - which works perfectly.
But what I want to do is understand where the fine bug is ... perhaps to
report it to those responsible. Now, it looks pretty obviously like there's
a serious bug in Netfilter here, because how else could anything about the
state of the ipv6 configuration affect the success of ipv4 Netfilter SNAT?
Now, if you can explain, theoretically, why I'm wrong about that, why the
state of the ipv6 configuration should be critical to ipv4 Netfilter SNAT
operation, I'm quite curious. But if you have no idea why the ipv4 Netfilter
SNAT rule fails if-and-only-if ipv6 operation is also enabled on the system,
then please let's see if someone who knows the innards of this stuff better
than either of us can help illuminate the puzzle.
Whit
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Why does ipv6 enabled interfere with ipv4 SNAT?
2008-03-25 2:44 ` Whit Blauvelt
2008-03-25 2:57 ` Jan Engelhardt
@ 2008-03-25 11:03 ` Jozsef Kadlecsik
2008-03-25 14:25 ` Whit Blauvelt
2008-03-26 11:03 ` Pascal Hambourg
1 sibling, 2 replies; 14+ messages in thread
From: Jozsef Kadlecsik @ 2008-03-25 11:03 UTC (permalink / raw)
To: Whit Blauvelt; +Cc: Jan Engelhardt, netfilter
On Mon, 24 Mar 2008, Whit Blauvelt wrote:
> I was mentioning where the mismatch was. Yeah the other stuff's there.
>
> /proc/sys/net/ipv6/conf ends up with only:
>
> all default eth0 eth1 eth2 eth3 lo
>
> while /proc/sys/net/ipv4/conf ends up (correctly) with:
>
> all default eth0 eth1 eth2 eth3 eth4 eth5 lo
If you have got ethernet devices with MTU smaller than 1500, those won't
support IPv6 and therefore don't show up in /proc/sys/net/ipv6/conf.
> Not sure what you're thinking there. My problem wasn't with there being too
> many devices, but with two of the devices I actually have not being
> represented - and with Netfilter not doing _ipv4_ SNAT on account of
> something with _ipv6_. Why should Netfilter ipv4 code even _care_ about
> what's right or not with ipv6? Do you have any knowledge about
> interdependency there?
>
> > It still works with opensuse plus 2.6.23. Well, I suggest you
> > try a stock kernel.
>
> It is a stock kernel, if by that you mean a stock distro kernel -
> Ubuntu's latest, 2.6.22-14-server.
Please check which modules are loaded in. Probably IPv4 NAT related
modules are not auto-loaded. Also, is there any error message when you
issue 'iptables -t nat ...' commands?
Best regards,
Jozsef
-
E-mail : kadlec@blackhole.kfki.hu, kadlec@sunserv.kfki.hu
PGP key : http://www.kfki.hu/~kadlec/pgp_public_key.txt
Address : KFKI Research Institute for Particle and Nuclear Physics
H-1525 Budapest 114, POB. 49, Hungary
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Why does ipv6 enabled interfere with ipv4 SNAT?
2008-03-25 11:03 ` Jozsef Kadlecsik
@ 2008-03-25 14:25 ` Whit Blauvelt
2008-03-25 15:53 ` Patrick McHardy
2008-03-26 9:45 ` Jozsef Kadlecsik
2008-03-26 11:03 ` Pascal Hambourg
1 sibling, 2 replies; 14+ messages in thread
From: Whit Blauvelt @ 2008-03-25 14:25 UTC (permalink / raw)
To: Jozsef Kadlecsik; +Cc: Jan Engelhardt, netfilter
On Tue, Mar 25, 2008 at 12:03:58PM +0100, Jozsef Kadlecsik wrote:
> > /proc/sys/net/ipv6/conf ends up with only:
> >
> > all default eth0 eth1 eth2 eth3 lo
> >
> > while /proc/sys/net/ipv4/conf ends up (correctly) with:
> >
> > all default eth0 eth1 eth2 eth3 eth4 eth5 lo
>
> If you have got ethernet devices with MTU smaller than 1500, those won't
> support IPv6 and therefore don't show up in /proc/sys/net/ipv6/conf.
Interesting. But there is no difference between the MTU settings of eth2,
eth3, eth4 and eth5 - in fact all four ports are on the same physical card.
All the eth? devices are running at default of 1500. I've checked.
> Please check which modules are loaded in. Probably IPv4 NAT related
> modules are not auto-loaded. Also, is there any error message when you
> issue 'iptables -t nat ...' commands?
Josef, the set of iptables modules is precisely the same whether or not ipv6
is enabled on the system (yes, I've looked). The only difference is whether
the ipv6 module is loaded. Blocking the ipv6 module from loading at boot
both prevents (of course) the /proc/sys/net/ipv6 space from being populated.
It also fully restores SNAT functionality.
There are no error messages from "iptables -t nat" commands. The nat rules
show up precisely the same in the resulting tables - they just don't count
any packets traversing them if ipv6 is also enabled. I haven't done packet
inspection to see what's happening, but the problem remains:
With _everything else_ unchanged, simply letting the ipv6 module load at
boot results in:
1) eth4 and eth5 not showing up as they should for ipv6 in
/proc/sys/net/ipv6/conf
and (whether related or a separate bug)
2) ipv4 Netfilter SNAT (in POSTROUTING in this case) becoming a black hole
Boxes behind the firewall can still ping the firewall. The firewall can
still ping the world. But just with the ipv6 module loaded, the boxes behind
the firewall cannot ping the world. Clearly ipv6 is not properly
provisioning its space. But why should ipv6's failing have any effect at all
on ipv4 functionality?
For me, not loading the ipv6 module is a totally fine workaround. It's
useless cruft in my context anyway. But even though my problem is fixed for
now, it will be a problem for other people (maybe only those with > 4
ethernet devices?) when the ipv6 transition finally happens. I remember in
the early 90s when we were expecting it by about 1998.
So in the spirit of open source development, I'm looking for for someone
with better knowledge of the underlying theory to help identify where the
bug here is. Then the responsible developers can have a chance to fix it
before a lot of other sysadmins also end up wasting many hours because of
the non-obviousness of having to look at ipv6 stuff to find why ipv4 SNAT
becomes a black hole.
Regards,
Whit
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Why does ipv6 enabled interfere with ipv4 SNAT?
2008-03-25 14:25 ` Whit Blauvelt
@ 2008-03-25 15:53 ` Patrick McHardy
2008-03-27 14:10 ` Whit Blauvelt
2008-03-26 9:45 ` Jozsef Kadlecsik
1 sibling, 1 reply; 14+ messages in thread
From: Patrick McHardy @ 2008-03-25 15:53 UTC (permalink / raw)
To: Whit Blauvelt
Cc: Jozsef Kadlecsik, Jan Engelhardt, netfilter,
Netfilter Development Mailinglist
Whit Blauvelt wrote:
>
> Josef, the set of iptables modules is precisely the same whether or not ipv6
> is enabled on the system (yes, I've looked). The only difference is whether
> the ipv6 module is loaded. Blocking the ipv6 module from loading at boot
> both prevents (of course) the /proc/sys/net/ipv6 space from being populated.
> It also fully restores SNAT functionality.
>
> There are no error messages from "iptables -t nat" commands. The nat rules
> show up precisely the same in the resulting tables - they just don't count
> any packets traversing them if ipv6 is also enabled. I haven't done packet
> inspection to see what's happening, but the problem remains:
>
> With _everything else_ unchanged, simply letting the ipv6 module load at
> boot results in:
>
> 1) eth4 and eth5 not showing up as they should for ipv6 in
> /proc/sys/net/ipv6/conf
>
> and (whether related or a separate bug)
>
> 2) ipv4 Netfilter SNAT (in POSTROUTING in this case) becoming a black hole
>
> Boxes behind the firewall can still ping the firewall. The firewall can
> still ping the world. But just with the ipv6 module loaded, the boxes behind
> the firewall cannot ping the world. Clearly ipv6 is not properly
> provisioning its space. But why should ipv6's failing have any effect at all
> on ipv4 functionality?
>
> For me, not loading the ipv6 module is a totally fine workaround. It's
> useless cruft in my context anyway. But even though my problem is fixed for
> now, it will be a problem for other people (maybe only those with > 4
> ethernet devices?) when the ipv6 transition finally happens. I remember in
> the early 90s when we were expecting it by about 1998.
>
> So in the spirit of open source development, I'm looking for for someone
> with better knowledge of the underlying theory to help identify where the
> bug here is. Then the responsible developers can have a chance to fix it
> before a lot of other sysadmins also end up wasting many hours because of
> the non-obviousness of having to look at ipv6 stuff to find why ipv4 SNAT
> becomes a black hole.
Please post the list of modules loaded and the output of
/proc/net/nf_conntrack.
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Why does ipv6 enabled interfere with ipv4 SNAT?
2008-03-25 14:25 ` Whit Blauvelt
2008-03-25 15:53 ` Patrick McHardy
@ 2008-03-26 9:45 ` Jozsef Kadlecsik
2008-03-27 14:15 ` Whit Blauvelt
1 sibling, 1 reply; 14+ messages in thread
From: Jozsef Kadlecsik @ 2008-03-26 9:45 UTC (permalink / raw)
To: Whit Blauvelt; +Cc: Jan Engelhardt, netfilter
On Tue, 25 Mar 2008, Whit Blauvelt wrote:
> > If you have got ethernet devices with MTU smaller than 1500, those won't
> > support IPv6 and therefore don't show up in /proc/sys/net/ipv6/conf.
>
> Interesting. But there is no difference between the MTU settings of eth2,
> eth3, eth4 and eth5 - in fact all four ports are on the same physical card.
> All the eth? devices are running at default of 1500. I've checked.
OK. That was a possibility which could have explained the difference in
the interfaces.
> > Please check which modules are loaded in. Probably IPv4 NAT related
> > modules are not auto-loaded. Also, is there any error message when you
> > issue 'iptables -t nat ...' commands?
>
> Josef, the set of iptables modules is precisely the same whether or not ipv6
> is enabled on the system (yes, I've looked).
But which netfilter modules are loaded in? Again, there can be some
auto-loading problem which we cannot figure out without the list of the
modules. And as Patrick suggested: do you see the connections in
/proc/net/nf_conntrack? Or you have got /proc/net/ip_conntrack instead?
Best regards,
Jozsef
-
E-mail : kadlec@blackhole.kfki.hu, kadlec@sunserv.kfki.hu
PGP key : http://www.kfki.hu/~kadlec/pgp_public_key.txt
Address : KFKI Research Institute for Particle and Nuclear Physics
H-1525 Budapest 114, POB. 49, Hungary
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Why does ipv6 enabled interfere with ipv4 SNAT?
2008-03-25 11:03 ` Jozsef Kadlecsik
2008-03-25 14:25 ` Whit Blauvelt
@ 2008-03-26 11:03 ` Pascal Hambourg
2008-03-26 11:12 ` Jozsef Kadlecsik
1 sibling, 1 reply; 14+ messages in thread
From: Pascal Hambourg @ 2008-03-26 11:03 UTC (permalink / raw)
To: netfilter
Jozsef Kadlecsik a écrit :
>
> If you have got ethernet devices with MTU smaller than 1500, those won't
> support IPv6 and therefore don't show up in /proc/sys/net/ipv6/conf.
Don't you mean smaller than 1280 ?
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Why does ipv6 enabled interfere with ipv4 SNAT?
2008-03-26 11:03 ` Pascal Hambourg
@ 2008-03-26 11:12 ` Jozsef Kadlecsik
0 siblings, 0 replies; 14+ messages in thread
From: Jozsef Kadlecsik @ 2008-03-26 11:12 UTC (permalink / raw)
To: Pascal Hambourg; +Cc: netfilter
[-- Attachment #1: Type: TEXT/PLAIN, Size: 583 bytes --]
On Wed, 26 Mar 2008, Pascal Hambourg wrote:
> Jozsef Kadlecsik a écrit :
> >
> > If you have got ethernet devices with MTU smaller than 1500, those won't
> > support IPv6 and therefore don't show up in /proc/sys/net/ipv6/conf.
>
> Don't you mean smaller than 1280 ?
You are right, the exact boundary is 1280.
Best regards,
Jozsef
-
E-mail : kadlec@blackhole.kfki.hu, kadlec@sunserv.kfki.hu
PGP key : http://www.kfki.hu/~kadlec/pgp_public_key.txt
Address : KFKI Research Institute for Particle and Nuclear Physics
H-1525 Budapest 114, POB. 49, Hungary
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Why does ipv6 enabled interfere with ipv4 SNAT?
2008-03-25 15:53 ` Patrick McHardy
@ 2008-03-27 14:10 ` Whit Blauvelt
2008-04-02 10:26 ` Patrick McHardy
0 siblings, 1 reply; 14+ messages in thread
From: Whit Blauvelt @ 2008-03-27 14:10 UTC (permalink / raw)
To: Patrick McHardy
Cc: Jozsef Kadlecsik, Jan Engelhardt, netfilter,
Netfilter Development Mailinglist
On Tue, Mar 25, 2008 at 04:53:19PM +0100, Patrick McHardy wrote:
> Please post the list of modules loaded and the output of
> /proc/net/nf_conntrack.
First here is the list by the system in question, working once the ipv6
module is blocked from loading at boot. Next is the list from a system with
identical hardware and near-identical configuration (same firewall rules),
but with ipv6 loading - and which also has only 4 of the 6 NICs showing up
in the ipv6 proc conf space, and also has NAT (in this case DNAT is what I
tested) failing - also where the NICs on the Internet side of things are
those coincidentally not showing up with proc ipv6 conf settings.
As to the output of /proc/net/nf_conntrack, you just want to see anything,
or under specific load? I'm not going to just publicly post the raw data -
although both systems have some there - since IPs can identify my client and
their clients, which would violate confidentiality.
Okay, the fixed system:
Module Size Used by
drbd 208136 2
cn 9632 1 drbd
parport_pc 37668 0
lp 12452 0
parport 37448 2 parport_pc,lp
loop 19076 0
sg 36380 0
sr_mod 17700 0
cdrom 37408 1 sr_mod
ata_generic 8580 0
usbhid 29664 0
hid 28928 1 usbhid
pcspkr 4224 0
psmouse 39952 0
serio_raw 8068 0
shpchp 34580 0
pci_hotplug 32576 1 shpchp
evdev 11136 0
ipt_TOS 3200 16
ipt_REJECT 5760 2
xt_state 3456 372
nf_nat_ftp 4352 0
nf_conntrack_ftp 11136 1 nf_nat_ftp
xt_limit 3584 3
xt_tcpudp 4224 616
ipt_LOG 7552 2
iptable_mangle 3840 1
iptable_nat 8708 1
nf_nat 20012 2 nf_nat_ftp,iptable_nat
nf_conntrack_ipv4 19724 374 iptable_nat
nf_conntrack 65160 6 xt_state,nf_nat_ftp,nf_conntrack_ftp,iptable_nat,nf_nat,nf_conntrack_ipv4
nfnetlink 6936 3 nf_nat,nf_conntrack_ipv4,nf_conntrack
iptable_filter 3968 1
ip_tables 13924 3 iptable_mangle,iptable_nat,iptable_filter
x_tables 16260 8 ipt_TOS,ipt_REJECT,xt_state,xt_limit,xt_tcpudp,ipt_LOG,iptable_nat,ip_tables
ext3 133640 4
jbd 60456 1 ext3
mbcache 9732 1 ext3
ata_piix 17540 0
libata 125296 2 ata_generic,ata_piix
ehci_hcd 36748 0
bnx2 157208 0
e1000 126656 0
uhci_hcd 26640 0
usbcore 138760 4 usbhid,ehci_hcd,uhci_hcd
cciss 61700 7
scsi_mod 146828 4 sg,sr_mod,libata,cciss
dm_mirror 24320 0
dm_snapshot 18980 0
dm_mod 58816 10 dm_mirror,dm_snapshot
thermal 14344 0
processor 32072 1 thermal
fan 5764 0
fuse 47124 1
apparmor 40600 0
commoncap 8320 1 apparmor
Here's the list from a nearly identical sytem that's still got the ipv6
module loading, and that's also failing at both populating the proc ipv6
space fully (same thing - just four of the 6 NICs) and also failing at NAT
(in this case DNAT was what I tried):
Module Size Used by
ipt_TOS 3200 16
ipt_REJECT 5760 2
nf_nat_ftp 4352 0
nf_conntrack_ftp 11136 1 nf_nat_ftp
xt_limit 3584 3
xt_state 3456 92
xt_tcpudp 4224 266
ipt_LOG 7552 2
iptable_mangle 3840 1
iptable_nat 8708 1
nf_nat 20012 2 nf_nat_ftp,iptable_nat
nf_conntrack_ipv4 19724 94 iptable_nat
nf_conntrack 65160 6 nf_nat_ftp,nf_conntrack_ftp,xt_state,iptable_nat,nf_nat,nf_conntrack_ipv4
nfnetlink 6936 3 nf_nat,nf_conntrack_ipv4,nf_conntrack
iptable_filter 3968 1
ip_tables 13924 3 iptable_mangle,iptable_nat,iptable_filter
x_tables 16260 8 ipt_TOS,ipt_REJECT,xt_limit,xt_state,xt_tcpudp,ipt_LOG,iptable_nat,ip_tables
drbd 208136 1
cn 9632 1 drbd
ipv6 278916 30
parport_pc 37668 0
af_packet 24840 2
lp 12452 0
parport 37448 2 parport_pc,lp
loop 19076 0
serio_raw 8068 0
pcspkr 4224 0
psmouse 39952 0
shpchp 34580 0
pci_hotplug 32576 1 shpchp
evdev 11136 0
sg 36380 0
sr_mod 17700 0
cdrom 37408 1 sr_mod
usbhid 29664 0
hid 28928 1 usbhid
ata_piix 17540 0
ext3 133640 2
jbd 60456 1 ext3
mbcache 9732 1 ext3
ehci_hcd 36748 0
ata_generic 8580 0
libata 125296 2 ata_piix,ata_generic
uhci_hcd 26640 0
usbcore 138760 4 usbhid,ehci_hcd,uhci_hcd
e1000 126656 0
bnx2 157208 0
cciss 61700 6
scsi_mod 146828 4 sg,sr_mod,libata,cciss
dm_mirror 24320 0
dm_snapshot 18980 0
dm_mod 58816 10 dm_mirror,dm_snapshot
thermal 14344 0
processor 32072 1 thermal
fan 5764 0
fuse 47124 1
apparmor 40600 0
commoncap 8320 1 apparmor
- Whit
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Why does ipv6 enabled interfere with ipv4 SNAT?
2008-03-26 9:45 ` Jozsef Kadlecsik
@ 2008-03-27 14:15 ` Whit Blauvelt
0 siblings, 0 replies; 14+ messages in thread
From: Whit Blauvelt @ 2008-03-27 14:15 UTC (permalink / raw)
To: Jozsef Kadlecsik; +Cc: Jan Engelhardt, netfilter
On Wed, Mar 26, 2008 at 10:45:29AM +0100, Jozsef Kadlecsik wrote:
> But which netfilter modules are loaded in? Again, there can be some
> auto-loading problem which we cannot figure out without the list of the
> modules. And as Patrick suggested: do you see the connections in
> /proc/net/nf_conntrack? Or you have got /proc/net/ip_conntrack instead?
I've just posted the modules list. What should I be looking for between
/proc/net/nf_conntrack vs /proc/net/ip_conntrack? Anything that matches the
internal or external IP? What should be there so I can check for anomoly,
since I don't want to just put raw data to the list.
Thanks,
Whit
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Why does ipv6 enabled interfere with ipv4 SNAT?
2008-03-27 14:10 ` Whit Blauvelt
@ 2008-04-02 10:26 ` Patrick McHardy
0 siblings, 0 replies; 14+ messages in thread
From: Patrick McHardy @ 2008-04-02 10:26 UTC (permalink / raw)
To: Whit Blauvelt
Cc: Jozsef Kadlecsik, Jan Engelhardt, netfilter,
Netfilter Development Mailinglist
Whit Blauvelt wrote:
> On Tue, Mar 25, 2008 at 04:53:19PM +0100, Patrick McHardy wrote:
>
>> Please post the list of modules loaded and the output of
>> /proc/net/nf_conntrack.
>
> First here is the list by the system in question, working once the ipv6
> module is blocked from loading at boot. Next is the list from a system with
> identical hardware and near-identical configuration (same firewall rules),
> but with ipv6 loading - and which also has only 4 of the 6 NICs showing up
> in the ipv6 proc conf space, and also has NAT (in this case DNAT is what I
> tested) failing - also where the NICs on the Internet side of things are
> those coincidentally not showing up with proc ipv6 conf settings.
The firewall rules appear to be different between the two systems,
the first one has a lot more references to the IPv4 conntrack module.
> As to the output of /proc/net/nf_conntrack, you just want to see anything,
> or under specific load? I'm not going to just publicly post the raw data -
> although both systems have some there - since IPs can identify my client and
> their clients, which would violate confidentiality.
I'm mainly interested in one or more of the conntrack entries that
should get NATed but don't. One entry should be enough, feel free
to replace IPs as long as similar IPs still are similar.
>
> Okay, the fixed system:
>
> Module Size Used by
> ...
> iptable_nat 8708 1
> nf_nat 20012 2 nf_nat_ftp,iptable_nat
> nf_conntrack_ipv4 19724 374 iptable_nat
>
> Here's the list from a nearly identical sytem that's still got the ipv6
> module loading, and that's also failing at both populating the proc ipv6
> space fully (same thing - just four of the 6 NICs) and also failing at NAT
> (in this case DNAT was what I tried):
>
> iptable_nat 8708 1
> nf_nat 20012 2 nf_nat_ftp,iptable_nat
> nf_conntrack_ipv4 19724 94 iptable_nat
Could you figure out whats causing the different amount of references
to nf_conntrack_ipv4? "-m state" rules, "-m conntrack" etc. take
references, maybe something fails during load?
^ permalink raw reply [flat|nested] 14+ messages in thread
end of thread, other threads:[~2008-04-02 10:26 UTC | newest]
Thread overview: 14+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2008-03-25 1:28 Why does ipv6 enabled interfere with ipv4 SNAT? Whit Blauvelt
2008-03-25 1:58 ` Jan Engelhardt
2008-03-25 2:44 ` Whit Blauvelt
2008-03-25 2:57 ` Jan Engelhardt
2008-03-25 3:57 ` Whit Blauvelt
2008-03-25 11:03 ` Jozsef Kadlecsik
2008-03-25 14:25 ` Whit Blauvelt
2008-03-25 15:53 ` Patrick McHardy
2008-03-27 14:10 ` Whit Blauvelt
2008-04-02 10:26 ` Patrick McHardy
2008-03-26 9:45 ` Jozsef Kadlecsik
2008-03-27 14:15 ` Whit Blauvelt
2008-03-26 11:03 ` Pascal Hambourg
2008-03-26 11:12 ` Jozsef Kadlecsik
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox