RE: mysterious dropped echo replies

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I have a similar situation where I get mysterious dropped echo replies.

May 31 18:26:37 fw1 FW-RULE 19 -- DENY IN= OUT=eth0 SRC=64.48.194.253
DST=62.183.11.71 LEN=28 TOS=0x00 PREC=0xE0 TTL=64 ID=63250 PROTO=ICMP TYPE=0
CODE=0 ID=512 SEQ=46741
May 31 19:03:36 fw1 FW-RULE 19 -- DENY IN= OUT=eth0 SRC=64.48.194.253
DST=62.118.140.48 LEN=28 TOS=0x00 PREC=0xE0 TTL=64 ID=41443 PROTO=ICMP
TYPE=0 CODE=0 ID=512 SEQ=22592

Again these packets originate at the FW (64.48.194.253) running iptables,
and in my case all dropped packets are destined to the outside addresses.

I looked at the rules and I cannot see the reason of this behaviour.

Can anybody help?
Note: I attached the iptables script.

Clemente

-----Mensagem original-----
De: netfilter-bounces@xxxxxxxxxxxxxxxxxxx
[mailto:netfilter-bounces@xxxxxxxxxxxxxxxxxxx] Em nome de Udo Rader
Enviada: terça-feira, 31 de Maio de 2005 17:59
Para: Netfilter list
Assunto: Re: mysterious dropped echo replies


thanks for your suggestion, now indeed I don't get any strange log messages
any more. And even better I reviewed the firewall configuration and found
some other "strange" things in it as well :-)

Udo Rader

BestSolution.at GmbH
http://www.bestsolution.at

On Wed, 2005-06-01 at 18:21 +0300, Sertys wrote:
> Well , this line :
> iptables -t nat -A Cid3D99741E.0   -d 192.168.100.0/24 -j RETURN
> 
> change it to -j DROP and it wont generate any replies. -j RETURN, 
> returns
> the packet and sends and icmp message to the src!
> 
> 
> On Tue, 31 May 2005 13:33:48 +0200, Udo Rader 
> <udo.rader@xxxxxxxxxxxxxxx>
> wrote:
> 
> > Hi Sertys,
> >
> > thanks for your reponse. I doubt that my entire script will help 
> > much, but anyway, I attached it (obfuscated a bit, of course :-)
> >
> > Yes, we are using traffic shaping (qdisc), but not RP_filter.
> >
> > The netmask for .240 is find, actually .240 _is_ the router, the 
> > router sends echo replies to some other hosts in the DMZ for reasons 
> > unknown ...
> >
> > And no, this is no PPP network but a leased line instead.
> >
> > Udo Rader
> >
> > BestSolution.at GmbH
> > http://www.bestsolution.at
> >
> > On Wed, 2005-06-01 at 15:57 +0300, Sertys wrote:
> >> I was totally wrong and realised it a min after sending. In fact 
> >> why
> >> don't
> >> you post your whole script. Do you use connection limiting? RP_filter?
> >> First - check that the netmask is set correctly on 240. As long as they
> >> are on the same segment, they aren't suppose to talk via the router.  
> >> They
> >> just have to ARP discover each other and talk directly. A machine gets

> >> to
> >> default gw, when the ip is not in the routing table. IS THIS A PPP  
> >> network?
> >>
> >>
> >>
> >> On Wed, 01 Jun 2005 15:50:35 +0300, Sertys <sertys@xxxxxxxxxxxxxx>
> >> wrote:
> >>
> >> > On Tue, 31 May 2005 10:42:36 +0200, Udo Rader 
> >> > <udo.rader@xxxxxxxxxxxxxxx> wrote:
> >> >
> >> > Those are illegal packets:
> >> >> DROP IN= OUT=eth1 SRC=192.168.100.240 DST=192.168.100.10 LEN=28
> >> TOS=0x00
> >> >> PREC=0x00 TTL=64 ID=32153 PROTO=ICMP TYPE=0 CODE=0 ID=45639 
> >> >> SEQ=0
> >> > There's no type0&code0 combination.
> >> >
> >> >
> >> >> Hi,
> >> >>
> >> >> I am stuck with a strange phenonemon where iptables drops 
> >> >> packages it
> >> >> (probably) shouldn't.
> >> >>
> >> >> The dropped packages are logged like this:
> >> >>
> >> >> DROP IN= OUT=eth1 SRC=192.168.100.240 DST=192.168.100.10 LEN=28
> >> TOS=0x00
> >> >> PREC=0x00 TTL=64 ID=32153 PROTO=ICMP TYPE=0 CODE=0 ID=45639 
> >> >> SEQ=0
> >> >>
> >> >> So that means that this is about an icmp echo reply, originating 
> >> >> from 192.168.100.240, pending to be sent through its internal 
> >> >> interface
> >> >> (eth1) and destined to 192.168.100.10.
> >> >>
> >> >> It is completely mysterious to me where this reply comes from, 
> >> >> but that's not all.
> >> >>
> >> >> Each of the two hosts involved can ping each other and in the 
> >> >> case
> >> of a
> >> >> ping, iptables does not drop any packages.
> >> >>
> >> >> If I shut down 192.168.100.10 (a box within the DMZ), it doesn't 
> >> >> take long until iptables starts to drop packages destined to other
boxes
> >> in
> >> >> the DMZ.
> >> >>
> >> >> One of the first rules in my iptables setup is this:
> >> >>
> >> >> iptables -A INPUT -s 192.168.100.0/24 -m state --state NEW -j 
> >> >> ACCEPT iptables -A OUTPUT -s 192.168.100.0/24 -m state --state 
> >> >> NEW -j ACCEPT iptables -A FORWARD -s 192.168.100.0/24 -m state
--state NEW -j
> >> ACCEPT
> >> >>
> >> >> For the internal interface this is the first rule:
> >> >>
> >> >> iptables -A INPUT -i eth1 -s 192.168.100.0/24 -d 
> >> >> 192.168.100.0/24 -m state --state NEW -j ACCEPT iptables -A 
> >> >> FORWARD  -i eth1 -s 192.168.100.0/24 -d 192.168.100.0/24
> >> -m
> >> >> state --state NEW -j ACCEPT
> >> >> iptables -A OUTPUT -o eth1 -s 192.168.100.0/24 -d 
> >> >> 192.168.100.0/24 -m state --state NEW -j ACCEPT iptables -A 
> >> >> FORWARD -o eth1 -s 192.168.100.0/24 -d 192.168.100.0/24
> >> -m
> >> >> state --state NEW -j ACCEPT
> >> >>
> >> >> The rule that drops the package is the very last one (the 'catch
> >> all')
> >> >> rule.
> >> >>
> >> >> This is something new, because I haven't changed the iptaples 
> >> >> setup
> >> for
> >> >> quite some time, so if anybody has any guess on what's going on 
> >> >> here.
> >> >>
> >> >> Udo Rader
> >> >>
> >> >> BestSolution.at GmbH
> >> >> http://www.bestsolution.at
> >> >
> >> >
> >> >
> >>
> >>
> >>
> 
> 
> 
> --
> www.supportivo.org
> 
> I can't stop myself checking for pigs in the outlets. Everybody thinks 
> i'm
> a punk, cause of the hairstyle(220V).
> end
-- 
B e s t S o l u t i o n . a t                        EDV Systemhaus GmbH
------------------------------------------------------------------------
udo rader              technischer leiter/CEM   mobile  ++43 660 5263642
------------------------------------------------------------------------
eduard-bodem-gasse 8/3    A-6020 innsbruck      fax      ++43 512 935833
http://www.bestsolution.at                      phone    ++43 512 935834

Attachment: fw.sh
Description: Binary data


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux