Re: iptables and wireless card in promiscuous mode

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Well,

I guess that there is nothing wrong with that. I checked quickly the BPF documentation and it seems to do the job. I am just more comfortable with iptables at the moment. If I cannot obtain what I need with iptables I will study BPF better...

Thx

CLaudio

Scott Knake wrote:

iptables -t MANGLE -D PREROUTING 1.
It was also mentioned earlier to configure BPF to drop the undesired
packets.. what is wrong with this solution?



Well,

In fact I really wanted my WLAN card set in promiscuous mode to drop all the packets coming from the other laptop, this means that I wanted


a

filter BEFORE the promiscuos mode filter.
And by the way: how do I cancel a rule from the PREROUTING chain?
If I do the standard way, I get:

~ # iptables -D PREROUTING 1
iptables: No chain/target/match by that name

Thx

Claudio


Alistair Tonner wrote:



see inlined:

On November 30, 2004 07:53 am, Claudio Lavecchia wrote:




Hello People,

I have a little question:

I have two laptops that have 802.11 wireless cards. I am developing


some


application that essentially perform sniffing functions using


wireless


cards in promiscuous mode. To test my code, I need those two laptops


not


to "see" each other (--> I do not want the wireless card of laptop A,
which is operating in promiscuous mode to process packets coming from
laptop B) and I tought to do it using iptables. so on laptop A i


added


the following rule:

iptables -A INPUT -mac --mac-source MAC_ADDRESS_LAPTOP_B -j DROP

and on laptop B I added the rule:

iptables -A INPUT -mac --mac-source MAC_ADDRESS_LAPTOP_A -j DROP

I just executed my first tests and the feeling  I got is that, for
example, the wlan card of  laptop B still passes through the packet
coming from laptop A.

Can anyone confirm this analysis? If I am right, can anyone give me


a


hint to possibly workaround this?




Urrm.
You are likely doing the filtering in the wrong pipe. These rules


will only


drop packets that are destined for the IP of the host they are on.


You


PROBABLY are trying to drop *all* traffic from the other laptop.


Iptables


can do this at the IP layer, however you will STILL be able to see the
traffic across that card (from the other laptop) with any decent


sniffer


program since ip sniffers work below the IP layer, before iptables


gets the


packet to filter. Most decent network sniffers, however, can do mac


address


filtering on input.


If you would like to have the traffic dropped anyway, there are


better places


to put these rules, even though many are strongly against filtering


anywhere


but in the filter table (including myself) the following would get the
traffic off your iptables radar:

iptables -A PREROUTING -t mangle -m mac --mac-source


MAC_ADDRESS_LAPTOP_A -j \


DROP

Although in truth I'm not sure that this is wise, it might serve your
purposes.

Alistair Tonner
RSO HP Unix support












[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux