Re: packet matching problem

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,

iptables -I FORWARD -p tcp --tcp-flags SYN,RST,ACK SYN -m limit --limit
1/s --limit-burst 1024 -j ACCEPT
iptables -A FORWARD -p tcp --tcp-flags SYN,RST,ACK SYN -j LOG
--log-prefix "SYN ATTACK"
iptables -A FORWARD -p tcp --tcp-flags SYN,RST,ACK SYN  -j DROP
iptables -A FORWARD -p tcp -m state --state RELATED,ESTABLISHED -j
ACCEPT


I am not quiet sure about the seqence of the rules. Usaully, we place the "-m state
--state RELATED,ESTABLISHED"( the connection tracking stuff) is in the top of the list of
rules.... I guess instead of -A it should have been -I.. Read about connection tracking .. might help you.


now i started an FTP session from the host to an FTP server. in this
session, i turn off the prompt and do an mget * ( multiple files ).
the files are in order of about 4 MB or so. as soon as the first file
is completed, it prints the message SYN ATTACK - with the SRC port as
ftp-data port (20) - no other traffic is coming into the firewall host. TCPDUMP on the firewall machine shows that about 8 or 9 SYN packets having been received by the firewall host.


FTP is one of those peculiar protocols, Again, read about connection tracking. For the protocols like these
the connection tracking modules have more work to do. However , this is not very relavent to your problem.
The solution for your problem possilbly is the ordering of the rules, or the sequence.


There is a link from netfilter.org..(docs section).

Hope this helps ...

Narendra.

--------------------------
Narendra Prabhu. B
DeepRoot Linux Pvt Ltd.,Bangalore.
http://www.deeproot.co.in




[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux