Re: help with netmap.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



yes, this is a test setup. ime also inside of a second firewall.

well it sounds as if i have broken the netmap. with only the
netmap targets, but no dnat. i cant ping an inside address.
using the outside number.

my laptop is running as 10.0.20.42 on the inside.

ping returns:

[user@becks ~]$ ping 205.133.141.42
PING 205.133.141.42 (205.133.141.42) 56(84) bytes of data.
>From 199.218.109.243 icmp_seq=1 Destination Host Unreachable
>From 199.218.109.243 icmp_seq=2 Destination Host Unreachable
>From 199.218.109.243 icmp_seq=3 Destination Host Unreachable

#arp -n 10.0.20.42
10.0.20.42  ether 00:00:86:51:21:5A C eth3.920
as expecter, however

#arp -n 205.133.141.42
205.133.141.42 (incomplete) eth3.920

so the packet made it to the inside address without being natted???


the system is running  Red Hat Enterprise Linux AS (2.6.9-22.0.1.EL)

#route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use
Iface
205.133.140.128 0.0.0.0 255.255.255.128 U     0      0        0 eth3.922
205.133.140.0   0.0.0.0 255.255.255.128 U     0      0        0 eth3.921
10.0.20.0       0.0.0.0 255.255.255.0   U     0      0        0 eth3.920
10.0.21.0       0.0.0.0 255.255.255.0   U     0      0        0 eth3.921
10.0.22.0       0.0.0.0 255.255.255.0   U     0      0        0 eth3.922
205.133.141.0   0.0.0.0 255.255.255.0   U     0      0        0 eth3.920
199.218.109.0   0.0.0.0 255.255.255.0   U     0      0        0 eth2
169.254.0.0     0.0.0.0 255.255.0.0     U     0      0        0 lo
0.0.0.0         199.218.109.1 0.0.0.0         UG    0      0        0 eth2

note that i added routes for the 'real' ip's. without these ping gets a
ttl error and best i can tell the packet is bouncing around in the router
that many times;-)

filter
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [586:91329]
:is_coll - [0:0]
-A INPUT -i eth3.920 -p udp -m udp --dport 67 -j ACCEPT
-A INPUT -i eth3.921 -p udp -m udp --dport 67 -j ACCEPT
-A INPUT -i eth3.922 -p udp -m udp --dport 67 -j ACCEPT
-A INPUT -s 10.0.20.0/255.255.255.0 -p icmp -j ACCEPT
-A INPUT -s 10.0.21.0/255.255.255.0 -p icmp -j ACCEPT
-A INPUT -s 10.0.22.0/255.255.255.0 -p icmp -j ACCEPT
-A INPUT -s 205.133.146.31 -j ACCEPT
-A INPUT -s 205.133.146.0/255.255.255.0 -j is_coll
-A INPUT -s 199.218.109.0/255.255.255.0 -j is_coll
-A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -j DROP
-A FORWARD -d 205.133.146.31 -j ACCEPT
-A FORWARD -p udp -m udp --dport 68 -j DROP
-A FORWARD -p udp -m udp --dport 67 -j DROP
-A FORWARD -d 205.133.144.0/255.255.255.0 -j ACCEPT
-A FORWARD -d 205.133.146.0/255.255.255.0 -j DROP
-A FORWARD -d 199.218.109.1 -j ACCEPT
-A FORWARD -d 199.218.109.2 -j ACCEPT
-A FORWARD -d 199.218.109.4 -j ACCEPT
-A FORWARD -d 199.218.109.6 -j ACCEPT
-A FORWARD -d 199.218.109.7 -j ACCEPT
-A FORWARD -d 199.218.109.20 -j ACCEPT
-A FORWARD -d 199.218.109.21 -j ACCEPT
-A FORWARD -d 199.218.109.27 -j ACCEPT
-A FORWARD -d 199.218.109.28 -j ACCEPT
-A FORWARD -d 199.218.109.30 -j ACCEPT
-A FORWARD -d 199.218.109.38 -j ACCEPT
-A FORWARD -d 199.218.109.206 -j ACCEPT
-A FORWARD -d 199.218.109.0/24 -j REJECT
-A FORWARD -p udp -m udp --dport 137 -j DROP
-A FORWARD -p udp -m udp --dport 445 -j DROP
-A FORWARD -p tcp -m tcp --dport 445 -j DROP
-A FORWARD -j ACCEPT
-A is_coll -p icmp -j ACCEPT
-A is_coll -p udp -m udp --sport 20 -j ACCEPT
-A is_coll -p tcp -m tcp --sport 20 -j ACCEPT
-A is_coll -p udp -m udp --sport 21 -j ACCEPT
-A is_coll -p tcp -m tcp --sport 21 -j ACCEPT
-A is_coll -p udp -m udp --dport 22 -j ACCEPT
-A is_coll -p tcp -m tcp --dport 22 -j ACCEPT
-A is_coll -p udp -m udp --sport 53 -j ACCEPT
-A is_coll -p tcp -m tcp --sport 53 -j ACCEPT
-A is_coll -j DROP
COMMIT
# Completed on Wed Nov  2 14:59:14 2005
# Generated by iptables-save v1.2.11 on Wed Nov  2 14:59:14 2005
*nat
:PREROUTING ACCEPT [5141:627771]
:POSTROUTING ACCEPT [5:410]
:OUTPUT ACCEPT [2:173]
-A POSTROUTING -s 10.0.20.0/255.255.255.0 -j NETMAP --to 205.133.141.0/24
-A POSTROUTING -s 10.0.21.0/255.255.255.128 -j NETMAP --to
205.133.140.0/25
-A POSTROUTING -s 10.0.22.0/255.255.255.128 -j NETMAP --to
205.133.140.128/25
COMMIT
# Completed on Wed Nov  2 14:59:14 2005
~

On Wed, 8 Feb 2006, John A. Sullivan III wrote:

> That sounds like a very dangerous setup.  Nonetheless, if you are indeed
> allowing all inbound access and you are NETMAPped, it should work except
> for those protocols which embed IP address information in the upper
> layers and do not have a nat helper.
>
> For example, NetBIOS browsing includes the IP address in the NetBIOS
> header.  There is not yet a helper in iptables to rewrite the NetBIOS
> portion of the packet so this application breaks when NAT'd with
> iptables.  This could explain why a particular application does not
> work.
>
> It could also be the result of personal firewalls running on the end
> points.
>
> Perhaps you could put a protocol analyzer on the line (e.g., ethereal -
> http://www.ethereal.com) to see where the packets are stopping.  Good
> luck - John
>
> On Wed, 2006-02-08 at 09:15 -0500, Stephen Beck wrote:
> > well at the moment mo FORWARD table blocks a few virus ports
> > and protects a few of my on campus servers. otherwise has a blanket
> > Accept at the bottom, so ime not perventing outside connections there.
> > but they dont seem to be working across the netmap. should netmap pervent
> > outside connections or have I broken it somehow.
> >
> >
> > On Wed, 8 Feb 2006, John A. Sullivan III wrote:
> >
> > > On Wed, 2006-02-08 at 08:35 -0500, Stephen Beck wrote:
> > > > I have several dorm firewalls with nearly 250 users behind each.
> > > > I nat the inside ip's using netmap. this has been up and running for
> > > > 6 months and for the inside users its working fine. for the most part
> > > > I dont want connections orginating from the outside and netmap seems
> > > > to be perventing this. However I now have an application that needs to
> > > > be able to orginate a stream from the outside to any inside
> > > > ip( CopySense ).
> > > >
> > > > ime really not shure:
> > > > if netmap alone should block incomming connections ?
> > > > how to go about allowing them?
> > > >
> > > > from what i see the folling is a start:
> > > > existing netmap lines on one router:
> > > >
> > > > Chain POSTROUTING (policy ACCEPT 6 packets, 300 bytes)
> > > >  362 20370 NETMAP     all  --  *      *       10.0.20.0/24
> > > > 0.0.0.0/0           205.133.141.0/24
> > > >    75  4208 NETMAP     all  --  *      *       10.0.21.0/25
> > > > 0.0.0.0/0           205.133.140.0/25
> > > >   223 10925 NETMAP     all  --  *      *       10.0.22.0/25
> > > > 0.0.0.0/0           205.133.140.128/25
> > > >
> > > > to allow the outside connection for my laptop this works:
> > > >
> > > > Chain PREROUTING (policy ACCEPT 1620 packets, 92093 bytes)
> > > > target     prot opt in     out     source
> > > > destination
> > > > DNAT       all  --  *      *       0.0.0.0/0
> > > > 205.133.141.42      to:10.0.20.42
> > > >
> > > > ile tighten up that rule once i get it working ;-)
> > > >
> > > > however I neet to allow that rule to work for all 255 ip's
> > > > and i cant seem to get the syntax right ???
> > > >
> > > >
> > > > Stephen Beck, Marietta College, 740-376-4366
> > > >
> > > You've hit upon an important distinction -- the nat table does not
> > > handle access control.  That will be handled by your filter table and,
> > > in this case, the FORWARD chain.
> > >
> > > I would suggest a FORWARD policy of DROP and only allow outbound traffic
> > > and inbound from the specific socket you want to allow.
> > >
> > > If you need more information on using nat and filter, Oskar Andreasson
> > > has a great tutorial at
> > > http://iptables-tutorial.frozentux.net/iptables-tutorial.html and there
> > > are some slightly dated training slide shows in the training section of
> > > the ISCS network security management project at
> > > http://iscs.sourceforge.net.  Hope this helps - John
> > > --
> > > John A. Sullivan III
> > > Open Source Development Corporation
> > > +1 207-985-7880
> > > jsullivan@xxxxxxxxxxxxxxxxxxx
> > >
> > > If you would like to participate in the development of an open source
> > > enterprise class network security management system, please visit
> > > http://iscs.sourceforge.net
> > >
> --
> John A. Sullivan III
> Open Source Development Corporation
> +1 207-985-7880
> jsullivan@xxxxxxxxxxxxxxxxxxx
>
> Financially sustainable open source development
> http://www.opensourcedevel.com
>


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux