Re: tcpdump (was: hostapd + ap_isolate)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]





Am 23.10.21 um 14:29 schrieb u34@xxxxxxx:
Uwe Sauter via arch-general <arch-general@xxxxxxxxxxxxxxxxxxx> wrote:


Does the following quote, copied from
https://wiki.archlinux.org/title/Network_Debugging#Tcpdump, relevant?

    they can only see outbound packets the firewall passes through:
[https://superuser.com/questions/925286/does-tcpdump-bypass-iptables]

Perhaps you should disable the firewall, or loosen it, while debugging.

Thanks for the hint, but it does not apply: (one of) the clients doesn't
even have a firewall enabled and I still cannot see the packages. To me,
it looks, like it doesn't even try to send the pings, because it maybe
thinks, the target is not reachable anyways ...



  From my experience, tcpdump connects to the interface and you will see
all traffic regardless of firewall settings, given you have the permissions.

In your case I'd first verify that layer 2 is working correctly (layer 2
is ethernet or wifi). So I'd use the utilities provided by
"wpa_supplicant" or "iw" to see if the "hardware connection" is working
as expected.

If your wifi card didn't connect on layer 2 it has no reasons to
configure layer 3 (IP, IPv6) and above.


Regards,

	Uwe

Is Uwe implying tcpdump can see packets local software is trying to send,
but the firewall blocks? That is, packets that are blocked, for example,
by rules in the output chain?

Sorry, that perhaps was poorly worded. You are totally write, if an egress packet is discarded by the output or any of the following hooks (see [1]), it will be dropped by the kernel and thus cannot be seen by tcpdump.

I was referring to ingress packets that tcpdump / wireshark is able to capture before the firewall can filter.


[1] https://wiki.nftables.org/wiki-nftables/index.php/Netfilter_hooks


As far as I know, tcpdump is probing the junction of the the nic and the
wire. Packets that are blocked by firewall rules in the output chain can
not reach that point. Which is why tcpdump can not see tham.
With ascii graphic:

     [wire] <-> [tcpdump, if activated] <-> [nic] <-> [firewall] <-> [application]

And somewhat more accurately:

     [wire] <-> [[nic front end] <-> [tcpdump, if actiavted] <-> [nic back end]] <-> [firewall] <-> [application]

--
u34




[Index of Archives]     [Linux Wireless]     [Linux Kernel]     [ATH6KL]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [Share Photos]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Samba]     [Device Mapper]

  Powered by Linux