Du'oh!
I changed it and this is what I see so far. I'm running a Nessus scan on one side of the bridge and the target system is at the other side of the bridge.
PRE QUEUEIN=safetynet0 OUT=safetynet0 PHYSIN=eth2 PHYSOUT=eth1 SRC=68.16.185.132 DST=68.16.185.130 LEN=41 TOS=0x00 PREC=0x00 TTL=64 ID=3072 PROTO=TCP SPT=3133 DPT=45495 WINDOW=2048 RES=0x00 ACK URGP=0
POST QUEUEIN=safetynet0 OUT=safetynet0 PHYSIN=eth2 PHYSOUT=eth1 SRC=68.16.185.132 DST=68.16.185.130 LEN=41 TOS=0x00 PREC=0x00 TTL=64 ID=3072 PROTO=TCP SPT=3133 DPT=45495 WINDOW=2048 RES=0x00 ACK URGP=0
----- Original Message ----- From: "Jason Opperisano" <opie@xxxxxxxxxxx>
To: <netfilter@xxxxxxxxxxxxxxxxxxx>
Sent: Friday, January 07, 2005 4:01 PM
Subject: Re: transparent bridge troubles?
On Fri, Jan 07, 2005 at 03:55:58PM -0500, mdpeters wrote:OK. This is what I have loaded now.
/usr/local/sbin/iptables -P FORWARD DROP /usr/local/sbin/iptables -A FORWARD -j LOG --log-prefix /var/iptablequeue/pre_queue /usr/local/sbin/iptables -A FORWARD -p tcp --syn -m state --state NEW -j QUEUE /usr/local/sbin/iptables -A FORWARD -p tcp -m state --state RELATED,ESTABLISHED -j QUEUE /usr/local/sbin/iptables -A FORWARD -p udp -j QUEUE /usr/local/sbin/iptables -A FORWARD -p icmp -j QUEUE /usr/local/sbin/iptables -A FORWARD -j LOG --log-prefix /var/iptablequeue/post_queue
I should see some sort of log file in /var/iptablequeue/post_queue or /var/iptablequeue/pre_queue now? Should I try sending packets through the bridge to generate something?
uh--no. those rules might not even load. "--log-prefix" specifies a string to prefix the log entries in your syslog files. my rules were literal:
/usr/local/sbin/iptables -A FORWARD -j LOG --log-prefix "PRE QUEUE: "
...
/usr/local/sbin/iptables -A FORWARD -j LOG --log-prefix "POST QUEUE: "
so the entries in /var/log/messages will have the strings "PRE QUEUE: " and "POST QUEUE: " in them for identification purposes.
-j
-- "Kids, you tried your best and you failed miserably. The lesson is, never try." --The Simpsons