RE: RE: Re: How to debug RST filter ?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello Pascal,

> > > $IPTABLES -N Cid4A4A84F123430.0
> > > $IPTABLES -A INPUT  -s myip   -m state --state NEW  -j
> > Cid4A4A84F123430.0
> > > $IPTABLES -A INPUT  -s 127.0.0.1   -m state --state NEW  -j
> > Cid4A4A84F123430.0
> > > $IPTABLES -A Cid4A4A84F123430.0  -d myip   -j ACCEPT
> > > $IPTABLES -A Cid4A4A84F123430.0  -d 127.0.0.1   -j ACCEPT
> > > $IPTABLES -N Cid4A4A84F123430.1
> > > $IPTABLES -A OUTPUT  -s myip    -m state --state NEW  -j
> > Cid4A4A84F123430.1
> > > $IPTABLES -A OUTPUT  -s 127.0.0.1   -m state --state NEW  -j
> > Cid4A4A84F123430.1
> > > $IPTABLES -A Cid4A4A84F123430.1  -d myip   -j ACCEPT
> > > $IPTABLES -A Cid4A4A84F123430.1  -d 127.0.0.1   -j ACCEPT
> >
> > I do not see here "a rule which allows everything in/out on the
> > lo interface". Such rules would be :
> >
> > iptables -A INPUT -i lo -j ACCCEPT
> > iptables -A OUTPUT -o lo -j ACCCEPT
> >
> > Instead, your rules accept only packets in the NEW state (RST packets
> > are never in that state) whose source and destination addresses are
> > "myip" or 127.0.0.1 (not only 127.0.0.1 but also the whole
> 127.0.0.0/8
> > range may be used on the loopback interface).
> 
> Ok,
> 
> I see what you mean, is the RST not (one of) the last packet when a
> connection
> is closed/dropped ?


I had a rule as #1 in the chain with:

$IPTABLES -A INPUT  -i lo   -m state --state NEW  -j ACCEPT
$IPTABLES -A OUTPUT  -o lo   -m state --state NEW  -j ACCEPT

So I assume here also the --state NEW is causing the RTS not be matched,
even it was related to some established connection...

André

Attachment: smime.p7s
Description: S/MIME cryptographic signature


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux