Re: new target - ebtables dynamic snat, kernel and userspace patch

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



in case you manipulate the data in the connection, such as in tproxy scenario (squid etc') a new connection goes out (with the same tuple) but the mac address is diffrent (the source mac is the device interface)

assuming A,B,C are mac address and 1,2,3 are ip address

[user]<--->[transparent bridge]<--->[server]
A1 B2 C3

user initiates a connection A1--->C3
the connection is redirected into B2, the connection is terminated as a socket to a local application on the traparent bridge machine.

a new connection goes out from B2, masked as B1--->C3 (the target changes B1 into A1) in return, the server answers A1 C3--->A1, the connection is redirected into the localhost
the data then forwarded to the user B3--->A1 (the target changes B3 int C3)

Shai Tahar
Storwize

Jan Engelhardt wrote:
On Thursday 2009-09-24 09:43, Shai Tahar wrote:

---- README ---
ebt_dyn_snat - ebtable dynamic snat
   Authors:
     Shai Tahar <shai.tahar@xxxxxxxxxxxx>

   Changes source mac address according to source ip address based on local
arp table
   to be used when source ip address is snated

Copyright (C) 2009 Storwize

ebtables target for transparent bridge
[user]<--->[transparent bridge]<--->[server]

if the transparent bridge maskes user ip address towards the server,
the bridge normally would replace the source mac address

Well, if you want to have the client's original MAC address in the
packet, do not SNAT it. It (seems) as simple as that.

--
To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Netfitler Users]     [LARTC]     [Bugtraq]     [Yosemite Forum]

  Powered by Linux