Re: Nat and firewall holes

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



>On Mon, Mar 22, 2010 at 10:42 PM, Pascal Hambourg <pascal.mail@xxxxxxxxxxxxxxx> wrote:
> If a crafted packet matches all the characteristics of the conntrack
> entry for that connection (including reply source port 80, TCP sequence
> number), then it will be considered belonging to the reply direction of
> that connection and the NAT will process it accordingly.


i thought ,  only a tuple of ip and port is kept for connection
tracking ( not tcp sequence )  .



On Mon, Mar 22, 2010 at 10:42 PM, Pascal Hambourg
<pascal.mail@xxxxxxxxxxxxxxx> wrote:
> ratheesh k a écrit :
>>
>> I have a linux machine'( say B )  with two interfaces ( eth0
>> -192.168.1.1  and eth1 - 192.168.55.1 ) .This linux machine works as a
>> gateway machine . eth0 is connected to LAN network and eth1 is
>> connected to WAN network . below rules are applied on the gateway
>> machine .,
>>
>>     iptables -A  INPUT -i eth0 -j ACCEPT
>>     iptables -A INPUT  -i eth1 -j DROP
>>
>>     iptables -A FORWARD -i eth0 -o eth1 -j ACCEPT
>>     iptables -A FORWARD -i eth1 -o eth0 -j DROP
>
> Hmm, not sure that dropping everything received on eth1 is a good idea.
>
>>     iptables -t nat -A POSTROUTING -o eth1 -j MASQUERADE .
>>
>>
>> LAN ---> eth0 : Gateway linux machine :eth1 ---> WAN
>>
>> We have machine called A , connected to LAN network and is assigned an
>> ip 192.168.1.100 and its gateway is machine B's eth0 interface (
>> 192.168.1.1 ) .
>> if i access "google.com " from machine A , syn packet with dest ip as
>> a.b.c.d ( google.com ip ) and  dest port 80 will go to machine B
>> (default gateway ) . Since we are masquerading all the packets , it
>> will change  source ip with 192.168.55.1 and source port with some
>> random port ( say portx ) .
>
> MASQUERADE won't change the source port unless specified otherwise by
> --random or --to-ports options, or if it is necessary in order to avoid
> a "collision" with an existing connection (e.g. two clients connecting
> to the same server with the same source port). See iptables man page.
>
>> Packets from server will be having
>> 192.18.55.1 ip and port as portx . This will be changed to original ip
>> and port by conntrack module .
>
> Actually the conntrack module will only associate the packet to the
> existing connection, and the nat module will change the addresses and ports.
>
>>  My qustion is : if i create a packet with source ip as 192.168.55.1
>> and dest port as portx , can i get into the machine B from WAN side .
>
> Do you mean machine A (the client) ?
> If a crafted packet matches all the characteristics of the conntrack
> entry for that connection (including reply source port 80, TCP sequence
> number), then it will be considered belonging to the reply direction of
> that connection and the NAT will process it accordingly.
> --
> To unsubscribe from this list: send the line "unsubscribe netfilter" in
> the body of a message to majordomo@xxxxxxxxxxxxxxx
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
>
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux