Re: Masquerade difficulties

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Looks like there is something going awry when 2.6, ipsec/openswan and
iptables are combined.

With further tinkering I was able to get ipsec working and
masquerading working separately, however masquerading through ipsec
still wouldnt work.  Just to be clear, I used www.google.com instead
of BoxC in the tests for which masquerading worked.

Anyway, I've reverted to a 2.4 kernel now and everything seems to be
working nicely.

I dont mind running some tests with my 2.6 setup if anyone is
interested though...

Andrew

On Sat, 8 Jan 2005 11:03:22 +0100, Andrew Beekhof <beekhof@xxxxxxxxx> wrote:
> On Fri, 7 Jan 2005 16:12:38 -0600, Trevor Cordes <trevor@xxxxxxxxxxxxx> wrote:
> > > I'm having some difficulties getting masquerading to work and hoping
> > > for some pointers...
> >
> > I can try to help.  But you'll need to better describe your network
> > layout.  Can you draw a little diagram showing where A, B & C are?
> 
> Sure, A & B are connected directly to a netgear DSL modem/hub.  C is
> part of my company's network which I'm accessing over the internet
> with ipsec.  I've also tried replacing C with google.com (after
> specifying an appropriate routing rule) with no success.
> 
> Does that clear things up?
> 
> >
> > Are you sure that BoxC doesn't have some firewall on (XP SP2) that is
> > eating the ping packets?
> 
> XP? God no!  All the machines are linux boxes running either SLES9 or
> Gentoo :)  No firewall on B or C.
> 
> From what I can tell, the packets from BoxB are getting lost on BoxA.
> I just tried using telnet and tcpdump and although I get logs like
> this:
> 
> Jan  8 08:35:55 BoxA IN=eth0 OUT=eth0 SRC=192.168.9.22 DST=10.10.2.86
> LEN=60 TOS=0x10 PREC=0x00 TTL=63 ID=48952 DF PROTO=TCP SPT=34452
> DPT=69 WINDOW=3840 RES=0x00 SYN URGP=0
> 
> ... the packets never actually arrive at BoxC (10.10.2.86).  I dont
> think they ever leave BoxA but I'm not sure I understand the tcpdump
> output enough to say for sure.
> 
> A dump of my iptables in case it helps...
> 
> mayo linux # iptables -L -t nat
> Chain PREROUTING (policy ACCEPT)
> target     prot opt source               destination
> 
> Chain POSTROUTING (policy ACCEPT)
> target     prot opt source               destination
> LOG        all  --  anywhere             anywhere            LOG level warning
> MASQUERADE  all  --  anywhere             anywhere
> 
> Chain OUTPUT (policy ACCEPT)
> target     prot opt source               destination
> 
> mayo linux # iptables -L -t filter
> Chain INPUT (policy ACCEPT)
> target     prot opt source               destination
> 
> Chain FORWARD (policy ACCEPT)
> target     prot opt source               destination
> 
> Chain OUTPUT (policy ACCEPT)
> target     prot opt source               destination
> 
> mayo linux # iptables -L -t mangle
> Chain PREROUTING (policy ACCEPT)
> target     prot opt source               destination
> 
> Chain INPUT (policy ACCEPT)
> target     prot opt source               destination
> 
> Chain FORWARD (policy ACCEPT)
> target     prot opt source               destination
> LOG        all  --  anywhere             anywhere            LOG level debug
> 
> Chain OUTPUT (policy ACCEPT)
> target     prot opt source               destination
> 
> Chain POSTROUTING (policy ACCEPT)
> target     prot opt source               destination
>


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux