Re: ip_conntrack_pptp and inbound PPTP/GRE

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Charlie Brady wrote:
I've struck a problem with inbound PPTP with CVS pptp conntrack and a patched 2.4.18 kernel.

Which pptp server and client are you using? Is either on the iptables machine?

Is there any reason you are still using 2.4.18?  It is quite likely
that this kernel is lacking patches that are required for PPTP
connection tracking.

...
gre      47 170 timeout=30, stream_timeout=180 src=64.230.9.110 \
 dst=64.230.132.224 version=1 protocol=0x880b srckey=0x0 dstkey=0x1f21\
 src=64.230.132.224 dst=64.230.9.110 version=1 protocol=0x880b srckey=0x1f21 dstkey=0x0 \
 [ASSURED] use=1

The low timeouts on this conntrack indicate it is using only the gre connection tracking and not the pptp connection tracking. That is, it is not related to the pptp control connection, and shouldn't have been created if all was working.

gre      47 566 timeout=600, stream_timeout=432000 src=64.230.132.224 \
  dst=64.230.9.110 version=1 protocol=0x880b srckey=0x0 dstkey=0x0 \
  [UNREPLIED] \
  src=64.230.9.110 dst=64.230.132.224 version=1 protocol=0x880b srckey=0x0 dstkey=0x0 \
  use=1

This conntrack is related to the pptp connection tracking, but having both a srckey and dstkey of 0 is very unusual. I expect that the keys should be the same as the first conntrack.

tcp      6 431968 ESTABLISHED \
  src=64.230.132.224 dst=64.230.9.110 sport=7968 dport=1723 \
  src=64.230.9.110 dst=64.230.132.224 sport=1723 dport=7968 \
  [ASSURED] use=2
...

The problem is that after establishing the connection, I have two gre conntrack entries. The first one above sees the tunnel traffic, and the timeout value is continually reset. The second one always stays UNREPLIED and times out after 10 minutes. After the timeout, new incoming GRE packets no longer have state RELATED and are blocked.

Is this a bug, or am I doing something wrong? If nobody is sure, can someone advise how I can proceed? I'm in the process of enabling the debugging code in the conntrack module.

Enabling debugging would certainly help figure out what is going wrong, but it would be preferable to try a later kernel if possible.

--
Philip Craig - SnapGear, A CyberGuard Company - http://www.SnapGear.com



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux