Re: problem with (incorrectly?) INVALID packets

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 12/12/06 13:42, Mike Williams wrote:
I'm getting quite stuck with a problem of returning packets not being classified as ESTABLISHED or RELATED (when they get to LFW).
Below is an attempt at an diagram explaining the setup.

               |
            internet
               |
           81.1...4.217
           SDSL Router
           81.1...7.49
         (81.1...7.48/28)
               |        (90.1...1.64/27)
             switch           /
       ________/\_________   /
      |                   | /
  81.1...7.50        81.1...7.59
     BFW               bridge
  192.168.0.1        90.1...1.69
(192.168.0.0/24)          |
      |              90.1...1.67
                         LFW
                    192.168.136.1
                  (192.168.136.0/24)

Not the simplest thing in the world, nor is it the most complex.

In the above diagram 90.1...1.64/27 is routed by the SDSL router to 81.1...7.59, as it can't support more than one range on it's "LAN" side.

Don't you just love SOHO (and the likes) routers that don't have near the flexibility that a standard unix box has? :)

The bridge has a rule for traffic from 90.1...1.64/27 to go via a default gateway of 81.1...7.49, as it can route to that.

What do you mean by "... bridge has a rule ..."? What sort of rule are you talking about? Are you referring to a route, or an IPTables rule, or an EBTables rule, or something else? Or is this part of your question?

Traffic can go in, out, and over LFW just fine.

Good.

To add a bit more difficultly, the interface on LFW with public IPs is also a bridge, some may remember my question about bridging and NATting, this is the machine which will be doing that.

Do you mean to say that the interface on LFW with the public ip is the bridge port (i.e. bri0) of the bridge that contains the 81.1...7.48/28 and 90.1...1.64/27 networks?

When I ping things from LFW I get an ICMP redirect to 81.1...7.49, but I don't see anyway I can reach it directly from 90.1...1.67. This is however a minor annoyance.

What "things" per say are you trying to ping? Where are you trying to ping them from? What IP address is used during your pinging?

This leads me to believe that you don't have your routing set up quite right.

The real problem is when you overlay VPNs onto that diagram (something I gave up trying to draw). There is a tunnel between 192.168.0.0/24 and 192.168.136.0/24.

Ok

0.0/24 can do all the things they are supposed to be able to do to 136.0/24.
136.0/24 can do all they things they are supposed to be able to do against the internet. 136.0/24 however can't do anything to 0.0/24, as the packets coming back from 0.0/24 get blocked by rules designed to stop non-authorised traffic being initiated from 0.0/24 to 136.0/24.

I'll presume that you are talking IPTables rules here. It sounds like there is a slight problem in your rules.

Pretty much the first rules I have say any ESTABLISHED or RELATED packets get accepted. Which should match these returning packets, and does on the more "normal" firewalls I run.

VPNs make things more complicated. Depending on which VPN technology and / or implementation there of, you may or may not get devices to use in your IPTables rules. The existence or lack there of can complicate things. Usually the lack of the devices means you will have to open up your firewall rules on interfaces that the traffic does come in to be able to match based on IP address.

For some reason I have failed to fathom, all the returning packets that come in over any of the VPNs (there are 3), are INVALID not the ESTABLISHED or RELATED they should be.

3 VPNs? Where are they too? What VPN technology and version there of are you using? Where do these other VPNs connect to? What subnets are on the other ends of the VPNs?

Can anyone help?

Can / will you please provide us with some more information to be able to help you? Namely, all the subnets you are trying to connect together as well as your full IPTables rules. You can easily get your IPTables rules for us via via iptables-save command.

(I use fwbuilder to manage and generate my rules, as it has served me well for about 2 years)

Ok.  I can't say as I have ever worked with fwbuilder.



Grant. . . .


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux