Re: Redirect Packets From Interface in Promiscuous Mode

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Henrik,

Thanks for your response. Going down the path of your recommendation b) below, it raises a few questions for me.

1) If I put the "sniffing" interface in promiscuous mode, can I not get iptables to grab traffic that is not destined for the host it is running on? For example, if the Production SQL servers IP address is 192.168.1.1, and my Linux based management station's IP address is 192.168.1.2, and the Test MySQL servers IP address is 192.168.1.3, can I not have a rule that say something like:

iptables -t nat -I PREROUTING -i eth0 -p tcp -d 192.168.1.1 --dport 3306 -j REDIRECT --to 192.168.1.3

I guess my question is how can I get iptables to grab traffic that is not destined for any of the IP addresses on the host system?

2) How am I going to stop the return traffic/SQL results from being returned to the original client?

Thanks again for your help.

~Rodre


From: Henrik Nordstrom <hno@xxxxxxxxxxxxxxx>
To: Rodre Ghorashi-Zadeh <rodrico7@xxxxxxxxxxx>
CC: netfilter@xxxxxxxxxxxxxxxxxxx
Subject: Re: Redirect Packets From Interface in Promiscuous Mode
Date: Fri, 30 Sep 2005 14:29:55 +0200 (CEST)

On Thu, 29 Sep 2005, Rodre Ghorashi-Zadeh wrote:

I have a problem that I am hoping someone can help me with. I am currently conducting some load testing on a test MySQL server that is destined to replace our current production MySQL server. What I want to do is send our current MySQL traffic, in real time, to the test MySQL server to measure the load in comparison with our current production MySQL server.

Ok. But not at all trivial to do.

What I have done so far is setup port mirroring on the switch that is shared by the Production MySQL server, the test MySQL server, and my Linux based management station, with the Linux based managment station sniffing the mirrored port of the Production MySQL server.

Ok.

I am able to see the MySQL traffic going to the production MySQL server using tcpdump. For a next step what I want to be able to do is have iptables sniff the port (I set the interface into promiscuous mode using ifconfig), grab all packets that are destined for my Production MySQL server from the mirrored port, rewrite the source IP address to be my Linux based management stations IP address and rewrite the destination address to be my Test MySQL Servers IP address.

This won't work. MySQL uses TCP and you can't mirror a TCP stream like this.

I don't really care about the MySQL results returned to tthe Linux based management station, they can go to /dev/null for all I care, but I want to see the queries going through the Test MySQL server.

Ok. This simplifies things somewhat.

Can be done in two different manners. Both requires programming.

a) By sniffing and using a TCP stream reassembly tool and when a MySQL query has been reassembled from the TCP stream send it to the test server. Drawbacks is that TCP stream reassembly is not always reliable (packets may have been dropped and a number of other complications).

b) Use a MySQL proxy via iptables REDIRECT and send each query to both servers. This requires the intercepting box to be between the old server and the network. Main drawback is that the source IP seen by the old server will be changed to the address of the proxy.

Regards
Henrik




[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux