Re: Leaking ICMP and UDP packets

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> Are you sure they are un-NATted packets "leaking" through netfilter, and not 
> ICMP packets being sent back to some remote system by the firewall itself, 
> saying "host unreachable" etc?

Finally, after 24 hours I got the following packets on my front edge 
(public) interface:

09:57:48.388232 10.101.10.103 > 169.254.85.249: icmp: time exceeded in-transit
09:58:03.386143 10.101.10.103 > 169.254.85.249: icmp: time exceeded in-transit
09:58:18.386973 10.101.10.103 > 169.254.85.249: icmp: time exceeded in-transit

* This internal IP isn't any of the 1 to 1 NATs listed below and should 
come out as the global NAT IP.

> 1. What's your Internet bandwidth?

It's a 6 Mb/s pipe -- symetric -- ethernet drop within from a provider 
within our building.

> 2. How many conntrack table entries do you typically have (wc -l 
> /proc/net/ip_conntrack)?

Looks to hover around 4300 entries.  This is what I set the table size to:

echo "200000" > /proc/sys/net/ipv4/ip_conntrack_max

> 3. Do you have any DNAT rules for incoming packets, as well as the SNAT rule 
> you've already posted?

Here are all my NAT entries:

####
####  PREROUTING Chain
####

$IPTABLES -t nat -A PREROUTING -i $EXT_IFACE \
-d $EXT_DMZ1 -j DNAT --to-destination $INT_DMZ1
 
$IPTABLES -t nat -A PREROUTING -i $EXT_IFACE \
-d $EXT_DMZ2 -j DNAT --to-destination $INT_DMZ2
 
$IPTABLES -t nat -A PREROUTING -i $EXT_IFACE \
-d $EXT_INEWS -j DNAT --to-destination $INT_INEWS
                                                                                
$IPTABLES -t nat -A PREROUTING -i $EXT_IFACE \
-d $EXT_CABLE -j DNAT --to-destination $INT_CABLE
                                                                                
$IPTABLES -t nat -A PREROUTING -i $EXT_IFACE \
-d $EXT_CABLEDEV -j DNAT --to-destination $INT_CABLEDEV
                                                                                
$IPTABLES -t nat -A PREROUTING -i $EXT_IFACE \
-d $EXT_TRANSFER -j DNAT --to-destination $INT_TRANSFER
                                                                                
$IPTABLES -t nat -A PREROUTING -i eth0 \
-d $EXT_QADMZ1 -j DNAT --to-destination $INT_QADMZ1
                                                                                
####
####  POSTROUTING Chain
####

$IPTABLES -t nat -A POSTROUTING -o $EXT_IFACE \
-s $INT_DMZ1 -j SNAT --to-source $EXT_DMZ1

$IPTABLES -t nat -A POSTROUTING -o $EXT_IFACE \
-s $INT_DMZ2 -j SNAT --to-source $EXT_DMZ2

#$IPTABLES -t nat -A POSTROUTING -o $EXT_IFACE \
#-s $INT_QAWEB1 -j SNAT --to-source $EXT_QAWEB1

$IPTABLES -t nat -A POSTROUTING -o $EXT_IFACE \
-s $INT_INEWS -j SNAT --to-source $EXT_INEWS

$IPTABLES -t nat -A POSTROUTING -o $EXT_IFACE \
-s $INT_CABLE -j SNAT --to-source $EXT_CABLE

$IPTABLES -t nat -A POSTROUTING -o $EXT_IFACE \
-s $INT_CABLEDEV -j SNAT --to-source $EXT_CABLEDEV

$IPTABLES -t nat -A POSTROUTING -o $EXT_IFACE \
-s $INT_TRANSFER -j SNAT --to-source $EXT_TRANSFER

$IPTABLES -t nat -A POSTROUTING -o $EXT_IFACE \
-s $INT_QADMZ1 -j SNAT --to-source $EXT_QADMZ1

$IPTABLES -t nat -A POSTROUTING -o $EXT_IFACE -j SNAT --to-source $EXT_IP

> 4. Are you doing anything in the mangle table?

No

> 5. Do you run any services on the firewall, or is it just a filtering router?

It's just a filtering router.  I have three NICS -- Public, Private, and 
DMZ.  Everything seems to NAT fine except some of these ICMP type packets 
and it looks like UDP packets associated with NTP.

Any help would be much appreciated.  Sorry for such a vague initial 
writeup.

-Dan




[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux