Re: Redirect Packets From Interface in Promiscuous Mode

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sun, 2 Oct 2005, Mart Frauenlob wrote:

All that is needed is an arp poisoning tool and a few iptables rules.
If you install an arp poisoning program i.e. ettercap at your testing mysql server, and use it to establish one way poisoning, traffic will go through your testing system and will be transparentely redirected to your production server. Now if you us the iptables MIRROR target (i think it's so called) on your testing server to redirect the mysql queries to localhost, your testing mysql db should receive exactly the same queries as the production one.

Nope, this won't work.

MySQL uses TCP for it's communication, and you can not fork a TCP connection like this at the packet level as TCP absolutely requires that both enpoints talk to each other and agree on a number of things. Thats partly why TCP has the two-way SYN handshake (SYN -> SYN+ACK -> ACK) where this is initialized. Having three endpoints on the same TCP connection is impossible.

What he needs to do is to somehow extract the MySQL queries from the connection to the production server and then send these in new TCP queries to the test server.

The problem is not iptables, but to get past the test servers TCP/IP stack and get the queries delivered to the MySQL server daemon.

Regards
Henrik


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux