Re: iptables vs. IPsec SP

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Yes, that is also what I thought.

However it does not work in my test.
I add a SNAT rule on the host of 192.168.1.20 as following:

 iptables -t nat -A POSTROUTING -p udp --dport 5002 -o eth0 -j SNAT
--to-source 192.168.1.55

to change the source address of outgoing upd packets with port 5002 to
192.168.1.55.

I also insert one SPs as follows (output of "ip xfrm policy list"):

...
src 192.168.1.55/32 dst 192.168.1.21/32
	dir out priority 2080 ptype main
	tmpl src 192.168.1.20 dst 192.168.1.21
		proto esp reqid 16409 mode tunnel
...

Then I send udp multicast at the port 5002.

But, I cannot see any ESP packets by tcpdump. Furthermore, on the
recipient side, I can get the muliticast udp with the changed source
IP (192.168.1.55). Actually I have stopped IPsec on the recipient
side. It looks that IPsec on the sender side is bypassed. Do I miss
something?

Thanks


On 2/18/09, Jan Engelhardt <jengelh@xxxxxxxxxx> wrote:
>
> On Wednesday 2009-02-18 17:17, Jianqing Zhang wrote:
>
>>If I configure both IPsec SPs and iptables, when an IP packet is going
>>out or coming,  which will process the packet first? SP or iptables
>>(netfilters) rules?
>
> On the input path, obviously ESP is the first one seen, then the unpacked
> one;
> on the output path this is precisely reversed.
>
--
To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Netfitler Users]     [LARTC]     [Bugtraq]     [Yosemite Forum]

  Powered by Linux