Linux Netfilter discussions
 help / color / mirror / Atom feed
* Connection intercept
@ 2008-01-15 16:43 DI Roman Fiedler
  2008-01-16  7:01 ` Josh Cepek
  0 siblings, 1 reply; 4+ messages in thread
From: DI Roman Fiedler @ 2008-01-15 16:43 UTC (permalink / raw)
  To: netfilter

Hi all,

I want to create an iptables setup that routes all packets that would be 
dropped to a gateway on a separate interface. I try to do it by marking 
these packets with a INTERCEPT connmark (and ACCEPT them) and use a 
different routing table (std. policy routing) with a default route to 
the separate interface.  The problem: I want to use the filter tables to 
do the filtering, but the packets are already routed when they reach the 
filter tables. So I cannot route the first packet of a connection to 
this special interface, hence no real connection intercept is possible.

Setup:

Inet  - Firewall - Internal Zone
                 |
              Intercept host


The intercept host will answer for all IPs (Honeypot like), so that 
connections that would have been refused are openen and can be analysed. 
Example: Host xxxx from internal zone tries to reach nonstandard mail 
exchange, mail connection is automatically routed to the intercept host 
and mail is captured to see if xxxxx is just malconfigured or if some 
malware tries to send out some data.


Any ideas for workarounds to realise such an fw setup, e.g. exotic 
netfilter targets that can push back a packet to the beginning of the 
filter process so that it runs through the whole filter again, this time 
with the correct connmark so that it uses the alternate interface

greets, Roman







^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2008-01-16 15:36 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2008-01-15 16:43 Connection intercept DI Roman Fiedler
2008-01-16  7:01 ` Josh Cepek
2008-01-16  9:37   ` DI Roman Fiedler
2008-01-16 15:36     ` Grant Taylor

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox