Re: help bootp filters

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



George,

In fact, the server gives out DHCP IPs...this is why I'm surprised.

----- Original Message -----
From: "George Vieira" <georgev@xxxxxxxxxxxxxxxxxxxxxx>
To: "Yoann" <yoann.juet@xxxxxxxxxxx>; <netfilter@xxxxxxxxxxxxxxxxxxx>
Sent: Monday, June 16, 2003 2:56 PM
Subject: RE: help bootp filters


> If I'm not wrong, I think tcpdump works on a different layer to netfilter
so even though it's dropped I think tcpdump still sees them.... but I may be
wrong.
> Does it eventually give out DHCP IP's or receives an IP addres or doesn't
it? If DHCP isn't working then it's probably dropped but tcpdumps still sees
them..
>
> I just did a test from work to home which I'm defiantely blockinh port
6665 and I get the same results but I know 6665 is being dropped... yet
TCPDUMP catches it before netfilter.
>
> Jun 16 22:52:24 newjackswing kernel: INET IN=ppp0 OUT= MAC=
SRC=203.111.79.114 DST=150.101.112.146 LEN=60 TOS=0x00 PREC=0xE0 TTL=50
ID=44842 DF PROTO=TCP SPT=3698 DPT=6665 WINDOW=5840 RES=0x00 SYN URGP=0 OPT
(020405840402080A0B09245F0000000001030300)
>
> [root@xxxxxxxxxxxx /usr]# tcpdump -x port 6665
> Kernel filter, protocol ALL, datagram packet socket
> tcpdump: listening on all devices
> 22:52:24.984380 if134 < work.domain.com.3698 > myhome.domain.com.6665: S
614501237:614501237(0) win 5840 <mss 1412,sackOK,timestamp 185148511
0,nop,wscale 0> (DF) [tos 0xe0]
>                          45e0 003c af2a 4000 3206 76d8 cb6f 4f72
>                          9665 7092 0e72 1a09 24a0 8b75 0000 0000
>                          a002 16d0 0795 0000 0204 0584 0402 080a
>                          0b09 245f 0000 0000 0103 0300
>
> So I think I might be right? Anybody wanna shed some light with this layer
stuff ;) I'm confused on that part ;P
>
> -----Original Message-----
> From: Yoann [mailto:yoann.juet@xxxxxxxxxxx]
> Sent: Mon 16-Jun-03 9:33 PM
> To: netfilter@xxxxxxxxxxxxxxxxxxx
> Cc:
> Subject: help bootp filters
>
>
>
> Hi,
>
> I experiment trouble with netfilter/iptables on rh9. I configured a server
with the following rules just to accept, for the moment, SSH sessions,
everything else is dropped.
>
> $IPTABLES -P INPUT DROP
> $IPTABLES -P FORWARD DROP
> $IPTABLES -P OUTPUT DROP
>
> $IPTABLES -A INPUT -i $LO_IFACE -j ACCEPT
> $IPTABLES -A OUTPUT -o $LO_IFACE -j ACCEPT
>
> $IPTABLES -A INPUT -p tcp --dport 22 -m state --state NEW,ESTABLISHED -j
ACCEPT
> $IPTABLES -A OUTPUT -p tcp --sport 22 -m state --state ESTABLISHED -j
ACCEPT
>
> $IPTABLES -A INPUT -j LOG --log-level warning --log-prefix "DROP input
packet died: "
> $IPTABLES -A OUTPUT -j LOG --log-level warning --log-prefix "DROP output
packet died: "
>
> It works fine, excepted for DHCP/BOOTP requests. In fact, the server
(single interface with IP address 192.168.2.110) is also a DHCP server and
responds to BOOTP requests as shown below :
>
> [root@xxxxxx root]# tcpdump port 67 or 68
> tcpdump: listening on eth0
> 17:10:30.925605 0.0.0.0.bootpc > 255.255.255.255.bootps:  xid:0x9a499735
flags:0x8000 [|bootp]
> 17:10:31.005330 192.168.2.1.bootps > 255.255.255.255.bootpc:
xid:0x9a499735 flags:0x8000 Y:192.168.2.110 S:192.168.2.1 ether
0:90:f5:c:80:a0 [|bootp] [tos 0x10]
>
> netfilter log messages are show below :
>
> Jun 12 17:28:29 pluton kernel: DROP input packet died: IN=eth0 OUT=
MAC=ff:ff:ff:ff:ff:ff:00:90:f5:0c:80:a0:08:00 SRC=0.0.0.0
DST=255.255.255.255 LEN=328 TOS=0x00 PREC=0x00 TTL=128 ID=55877 PROTO=UDP
SPT=68 DPT=67 LEN=308
> Jun 12 17:28:29 pluton kernel: DROP output packet died: IN= OUT=eth0
SRC=192.168.2.1 DST=192.168.2.110 LEN=48 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF
PROTO=ICMP TYPE=8 CODE=0 ID=63703 SEQ=0
>
> Can you explain me why a BOOTP response is sent even though such packets
(seem to be) dropped by iptables rules ?
>
> Many thanks,
> Regards,
> Yoann.
>
>


_____________________________________________________________________
Envie de discuter en "live" avec vos amis ? Télécharger MSN Messenger
http://www.ifrance.com/_reloc/m la 1ère messagerie instantanée de France



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux