Re: DNAT and promiscuous mode

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Le lun 26/04/2004 à 19:49, Travis Johnson a écrit :
> No, this machine is not a bridge. It will simply sit and watch the
> traffic go by.

You can't do that this way, for you will duplicate traffic, as original
packets will continue their journey to their original destination. You
have to _intercept_ it.

This kind of setting is OK :

	Internet ----- FW ------ DMZ
			|
			|
			`--- Alt.Web

On the firewall, you set a mark based routing for HTTP packets to
Alt.Web (see lartc.org cookbook).
On Alt.web, you set a REDIRECT NAT for HTTP packets to proxy port (e.g.
3128) :

	iptables -t nat -A PREROUTING -p tcp --dport 80 -j REDIRECT \
		--to-ports 3128

HTTP proxy has to be configured for transparent proxying (see Squid
docs).

If you want interception to be more "transparent", you can use a bridge
and use ebtables broute table or frame diverter in order to catch HTTP
packets on the fly.


-- 
http://www.netexit.com/~sid/
PGP KeyID: 157E98EE FingerPrint: FA62226DA9E72FA8AECAA240008B480E157E98EE
>> Hi! I'm your friendly neighbourhood signature virus.
>> Copy me to your signature file and help me spread!



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux