PREROUTING table and quota

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Howdy,

I'm having some issues using the quota module in the PREROUTING table.

I'm trying to write a captive portal software, and a requirement of it
is to have the client be automatically redirected to a login page on
HTTP requests where the user has no quota remaining or isn't logged in,
and it is not a request to a "free" site.

The firewall is being rewritten by a daemon which the web frontend
connects to.  On startup, the daemon sets up a basic NAT and all the
standard rules, then when a user logs in the webpage connects to the
daemon and issues commands like "add computer at <ip> <mac> to userid
<n>".  The daemon is fairly dumb and doesn't retain any state data -
it's only there to insulate the web server and application from
requiring root.

As far as I can tell, not all packets are actually hitting my quota
rules.  Instead only new connections seem to be managed correctly -
subsequent and return packets are unaffected, and thus uncounted.

The rules are a bit messy, what I'm trying to achieve and the ordering
is:
     1. p2_unmetered: Unmetered/free locations are sent to the
        p2_allowed chain.
     2. p2_blacklist: Blacklisted locations are sent to the p2_captive
        chain.
     3. p2_users: Maps a host to a user chain (p2u_*).  This allows one
        user to be signed on from many hosts.
     4. p2_captive: All unhandled traffic is sent to this chain.

In p2_allowed:
      * All traffic is allowed through.

In p2_captive:
      * All tcp traffic on port 80 to be redirected to the local port
        998 (which is a small web server that redirects users to the
        captive portal login page)
      * All tcp traffic on other ports are redirected to the local port
        997
      * All icmp traffic is redirected to the local machine
      * All other traffic is dropped

In p2u_*:
      * If there is enough quota for the packet, it is sent to
        p2_allowed, and the size of the packet is subtracted from the
        quota.
      * If there is insufficient quota, it should not end processing
        (and goto p2_captive)

The network setup:
  eth0 (172.20.0.147): The external interface on the gateway.
  eth1 (10.13.37.3): The internal interface on the gateway.
  10.13.37.254: A client PC I'm using for testing.

Here is a dump of my iptables rules:

# Generated by iptables-save v1.3.6 on Thu Nov 13 21:22:03 2008
*filter
:INPUT ACCEPT [2765:294789]
:FORWARD ACCEPT [77631:59364457]
:OUTPUT ACCEPT [3210:423042]
COMMIT
# Completed on Thu Nov 13 21:22:03 2008
# Generated by iptables-save v1.3.6 on Thu Nov 13 21:22:03 2008
*nat
:PREROUTING ACCEPT [0:0]
:POSTROUTING ACCEPT [750:56421]
:OUTPUT ACCEPT [907:68008]
:p2_allowed - [0:0]
:p2_blacklist - [0:0]
:p2_captive - [0:0]
:p2_hosts - [0:0]
:p2_unmetered - [0:0]
:p2u_12 - [0:0]
-A PREROUTING -j p2_unmetered 
-A PREROUTING -j p2_blacklist 
-A PREROUTING -j p2_hosts 
-A PREROUTING -j p2_captive 
-A POSTROUTING -o eth0 -j MASQUERADE 
-A p2_allowed -i eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT 
-A p2_allowed -i eth1 -j ACCEPT 
-A p2_blacklist -d 192.168.0.0/255.255.0.0 -j p2_captive 
-A p2_captive -p tcp -m tcp --dport 80 -j REDIRECT --to-ports 998 
-A p2_captive -p tcp -j REDIRECT --to-ports 997 
-A p2_captive -p icmp -j REDIRECT 
-A p2_captive -j DROP 
-A p2_hosts -s 10.13.37.254 -i eth1 -m mac --mac-source
00:02:XX:XX:XX:XX -j p2u_12 
-A p2_hosts -d 10.13.37.254 -o eth1 -j p2u_12
-A p2_unmetered -d 10.13.37.3 -p tcp -m tcp --dport 80 -j ACCEPT 
-A p2_unmetered -d 10.13.37.3 -p tcp -m tcp --dport 443 -j ACCEPT 
-A p2_unmetered -d 10.13.37.3 -p tcp -m tcp --dport 53 -j ACCEPT 
-A p2_unmetered -d 10.13.37.3 -p udp -m udp --dport 53 -j ACCEPT 
-A p2_unmetered -d 172.20.0.147 -j ACCEPT 
-A p2_unmetered -d 10.13.37.3 -p tcp -m tcp --dport 22 -j ACCEPT 
-A p2_unmetered -d 10.13.37.3 -p tcp -m tcp --dport 998 -j ACCEPT
-A p2u_12 -m quota --quota 999705946 -j p2_allowed 
COMMIT
# Completed on Thu Nov 13 21:22:03 2008

Versions of stuff:
      * iptables v1.3.6
      * kernel 2.6.18
      * Debian 4.0 (etch/stable) i386

I've had this previously working correctly when I was doing the work in
the FORWARD chain of the filter rule, however I cannot do automatic
redirection to the login page using this method.

Any advice would be greatly appreciated.

Cheers!


--michael

--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux