Hi, I am stuck with a strange phenonemon where iptables drops packages it (probably) shouldn't. The dropped packages are logged like this: DROP IN= OUT=eth1 SRC=192.168.100.240 DST=192.168.100.10 LEN=28 TOS=0x00 PREC=0x00 TTL=64 ID=32153 PROTO=ICMP TYPE=0 CODE=0 ID=45639 SEQ=0 So that means that this is about an icmp echo reply, originating from 192.168.100.240, pending to be sent through its internal interface (eth1) and destined to 192.168.100.10. It is completely mysterious to me where this reply comes from, but that's not all. Each of the two hosts involved can ping each other and in the case of a ping, iptables does not drop any packages. If I shut down 192.168.100.10 (a box within the DMZ), it doesn't take long until iptables starts to drop packages destined to other boxes in the DMZ. One of the first rules in my iptables setup is this: iptables -A INPUT -s 192.168.100.0/24 -m state --state NEW -j ACCEPT iptables -A OUTPUT -s 192.168.100.0/24 -m state --state NEW -j ACCEPT iptables -A FORWARD -s 192.168.100.0/24 -m state --state NEW -j ACCEPT For the internal interface this is the first rule: iptables -A INPUT -i eth1 -s 192.168.100.0/24 -d 192.168.100.0/24 -m state --state NEW -j ACCEPT iptables -A FORWARD -i eth1 -s 192.168.100.0/24 -d 192.168.100.0/24 -m state --state NEW -j ACCEPT iptables -A OUTPUT -o eth1 -s 192.168.100.0/24 -d 192.168.100.0/24 -m state --state NEW -j ACCEPT iptables -A FORWARD -o eth1 -s 192.168.100.0/24 -d 192.168.100.0/24 -m state --state NEW -j ACCEPT The rule that drops the package is the very last one (the 'catch all') rule. This is something new, because I haven't changed the iptaples setup for quite some time, so if anybody has any guess on what's going on here. Udo Rader BestSolution.at GmbH http://www.bestsolution.at
Attachment:
signature.asc
Description: This is a digitally signed message part