Re: Packages which should be DNATed are dropped incidentally

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Friday 2008-08-22 08:25, Bram Metsch wrote:
>
>At our site, we have a mailserver inside a DMZ. This DMZ
>employs private IPs (range 192.168.193/24), so we configured additional offical
>IPs on the external interface of the firewall:
>
>(excerpt of `iptables -L -n -v -t nat`)
>Chain PREROUTING (policy ACCEPT 2468K packets, 218M bytes)
> pkts bytes target     prot opt in     out     source               destination
> 103K 5881K DNAT       all  --  external *       0.0.0.0/0            <external mailserver IP>      to:192.168.193.13
>
>In addition, I let through the required services for this mailserver (also serves as DNS-server, btw):
>
>Chain FORWARD (policy DROP 0 packets, 0 bytes)
> pkts bytes target     prot opt in     out     source               destination
> 2089  110K ACCEPT     udp  --  external dmz     0.0.0.0/0            192.168.193.13      udp dpt:53
[...]
>
>Now, we incidentally watch packets being dropped allthough they belong to valid connections:
>
>Aug 22 13:52:13 localhost kernel: DROP IN=external OUT= MAC=<firewall external mac>:<next router's mac>:08:00 SRC=<remoteip> DST=<external mailserver ip> LEN=109 TOS=0x00 PREC=0x00 TTL=54 ID=60517 DF PROTO=TCP SPT=18995 DPT=993 WINDOW=2282 RES=0x00 ACK PSH URGP=0

Try adding iptables -t nat -A PREROUTING -j LOG --log-prefix "[this did not get nated]"
and compare with the DROP IN=... line when they appear together.
>
>Something that confuses me: If I understand the log line above correctly, the packed is not dropped in the FORWARD chain 
>but in the INPUT chain. However, this would mean that the packet would not have been processed by the DNAT rule.
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux