Help with using 'iptables' to forward different physical machine IP address/port-combos to a NAT'ed multihomed internal virtual machine

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



All,

*** Using 'iptables' to forward different physical machine
IP address/port-combos to a NAT'ed multihomed internal virtual machine ... ***

I have problems with this network scenario.  Setup is a bit intricate
but might be interesting to diagnose as well.  I can provide more info
if you like.  Thanks for looking at it.

 * I have a physical host at IP address (eth0) xx.yy.zzz.231 that also
   listens on the same (eth0) interface to xx.yy.zzz.232 and xx.yy.zzz.233
   (Fedora 13 Linux)

 * The physical host houses various virtual machines running various
   versions of Linux and Windows ... only Linux machines are involved
   in this scenario ... and for purposes here I've limited the scenario
   to just one virtual machine and two virtual subnets

 * Virtualization courtesy of libvirtd/qemu/kvm and brctl from Fedora 13, stock
   and up to date as of 2011/03/15

 * The virtual machine in question runs Scientific Linux 6

 * The virtual machine is multihomed with one interface on one subnet
   and two interfaces on the other (why?  because I want one VM to
   house Apache and provide http://... and https://... services to
   different subnets ... there are three https://... virtual hosts
   in play, each listening on a different interface on a single
   Apache installation -- I use this infrastructure to simulate
   multi-host/multi-network environments and also to house
   source code, etc. on a more permanent basis)

 * I'm using 'iptables' on the physical host to send external port 443
   connections on xx.yy.zzz.{231,232,233} to a single virtual machine
   that provides https://... services on internal IP addresses
   192.168.6.45, 192.168.9.32, and 192.168.6.33 respectively ...
   the virtual machine interfaces attach to internal virtual networks
   virbr6 (192.168.6.*) and virbr9 (192.168.9.*)

 * MANIFESTATION OF THE PROBLEM:  from the physical host itself I am able
   to successfully 'telnet 192.168.6.45 443',
   'telnet 192.168.6.33 443', and 'telnet 192.168.9.32 443'
   to access the proper https://... "Apache virtual hosts",
   and the Apache logs (segregated per "Apache virtual host")
   show that I am indeed reaching each of them, also corroborated
   by 'iptables' "-j LOG" entries in the virtual machine's
   'iptables ... BUT ... from outside the physical host
   I am able successfully to 'telnet xx.yy.zzz.231 443'
   and 'telnet xx.yy.zzz.233 443' to reach the 192.168.6.*
   https://... services, **** but I'm never successful
   with 'telnet xx.yy.zzz.232 443' which would reach
   the 192.168.9.32 internal https://... service ****

 * 'iptables' "-j LOG" table entries do, however, I believe,
   indicate that both internal and external traffic to the
   virtual machine's 192.168.9.32 interface reach that interface
   on the virtual machine, but for some reason those starting from
   the general internet are never processed fully, but those
   initiated internally (from the physical host) are

 * my initial guess is that the virtual machine's routing tables
   might have something to do with the problem, but I'm not sure

NOTE:  I'm not an 'iptables' or networking guru, I'd just like this
configuration to work, and a similar configuration seemingly worked
well in the past but I've upgraded base software and modified my env
recently and it's not working quite so well.

So, on to configuration, which I've hopefully simplified to only
the essence here.

=== physical host 'iptables' (in iptables-save form) ===

        # physical host 'iptables'
        #
        # Fedora 13 libvirtd et. al. automatically add the
*nat-'MASQUERADE' stuff in POSTROUTING,
        # and I removed all the default libvirtd *filter-FORWARD
restrictions from the *filter-FORWARD
        # tables as I want to allow all forwarding between networks.

    *nat

    -A PREROUTING -d xx.yy.zzz.245/32 -p tcp -m tcp --dport 22 -j DNAT
--to-destination 192.168.6.45:22
    -A PREROUTING -d xx.yy.zzz.231/32 -p tcp -m tcp --dport 80 -j DNAT
--to-destination 192.168.6.45:80

      # route xx.yy.zzz.231:443 -> 192.168.6.45:443 ... with logging
    -A PREROUTING -d xx.yy.zzz.231/32 -p tcp -m tcp --dport 443 -j LOG
--log-prefix "P_incoming_www.NWRKA.com____ "
    -A PREROUTING -d xx.yy.zzz.231/32 -p tcp -m tcp --dport 443 -j
DNAT --to-destination 192.168.6.45:443

      # route xx.yy.zzz.232:443 -> 192.168.9.32:443 ... with logging
    -A PREROUTING -d xx.yy.zzz.232/32 -p tcp -m tcp --dport 443 -j LOG
--log-prefix "P_incoming_www.NETWORKB.com_ "
    -A PREROUTING -d xx.yy.zzz.232/32 -p tcp -m tcp --dport 443 -j
DNAT --to-destination 192.168.9.32:443

      # route xx.yy.zzz.233:443 -> 192.168.6.45:443 ... with logging
    -A PREROUTING -d xx.yy.zzz.233/32 -p tcp -m tcp --dport 443 -j LOG
--log-prefix "P_incoming_svn.NWRKA.com____ "
    -A PREROUTING -d xx.yy.zzz.233/32 -p tcp -m tcp --dport 443 -j
DNAT --to-destination 192.168.6.33:443

      # stuff libvirtd likes to put in, masquerading internal networks
    -A POSTROUTING -s 192.168.9.0/24 ! -d 192.168.9.0/24 -p tcp -j
MASQUERADE --to-ports 1024-65535
    -A POSTROUTING -s 192.168.9.0/24 ! -d 192.168.9.0/24 -p udp -j
MASQUERADE --to-ports 1024-65535
    -A POSTROUTING -s 192.168.9.0/24 ! -d 192.168.9.0/24 -j MASQUERADE
    -A POSTROUTING -s 192.168.6.0/24 ! -d 192.168.6.0/24 -p tcp -j
MASQUERADE --to-ports 1024-65535
    -A POSTROUTING -s 192.168.6.0/24 ! -d 192.168.6.0/24 -p udp -j
MASQUERADE --to-ports 1024-65535
    -A POSTROUTING -s 192.168.6.0/24 ! -d 192.168.6.0/24 -j MASQUERADE

    COMMIT

    *filter

      # libvirtd stuff
    -A INPUT -i virbr9 -p udp -m udp --dport 53 -j ACCEPT
    -A INPUT -i virbr9 -p tcp -m tcp --dport 53 -j ACCEPT
    -A INPUT -i virbr9 -p udp -m udp --dport 67 -j ACCEPT
    -A INPUT -i virbr9 -p tcp -m tcp --dport 67 -j ACCEPT
    -A INPUT -i virbr6 -p udp -m udp --dport 53 -j ACCEPT
    -A INPUT -i virbr6 -p tcp -m tcp --dport 53 -j ACCEPT
    -A INPUT -i virbr6 -p udp -m udp --dport 67 -j ACCEPT
    -A INPUT -i virbr6 -p tcp -m tcp --dport 67 -j ACCEPT

      # usual default stuff, apparently
    -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
    -A INPUT -p icmp -j ACCEPT
    -A INPUT -i lo -j ACCEPT
    -A INPUT -p tcp -m state --state NEW -m tcp --dport 22 -j ACCEPT
    -A INPUT -j REJECT --reject-with icmp-host-prohibited

      # I eliminated libvirtd restrictions on internal FORWARDing ...
I want the virtual
      # subnets to accept FORWARDed traffic from the outside world and
want them to
      # talk to each other too ... at least for now, might
partition/firewall them off in future

      # log packets of interest going to/from virtual network port-443
https://...
    -A FORWARD -d 192.168.6.45/32 -p tcp -m tcp --dport 443 -j LOG
--log-prefix "P_INCOMING_www.NWRKA.com____ "
    -A FORWARD -d 192.168.9.32/32 -p tcp -m tcp --dport 443 -j LOG
--log-prefix "P_INCOMING_www.NETWORKB.com_ "
    -A FORWARD -d 192.168.6.33/32 -p tcp -m tcp --dport 443 -j LOG
--log-prefix "P_INCOMING_svn.NWRKA.com____ "
    -A FORWARD -s 192.168.6.45/32 -p tcp -m tcp --sport 443 -j LOG
--log-prefix "P_OUTGOING_www.NWRKA.com____ "
    -A FORWARD -s 192.168.9.32/32 -p tcp -m tcp --sport 443 -j LOG
--log-prefix "P_OUTGOING_www.NETWORKB.com_ "
    -A FORWARD -s 192.168.6.33/32 -p tcp -m tcp --sport 443 -j LOG
--log-prefix "P_OUTGOING_svn.NWRKA.com____ "

    COMMIT


=== relevant 'ifconfig' on physical host ===

        # single network interface on physical box listening to three
IP addresses

    eth0      Link encap:Ethernet  HWaddr PHYS_HOST_MAC_ADDR
              inet addr:xx.yy.zzz.231  Bcast:64.255.255.255  Mask:255.255.255.0
              UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
              RX packets:262586 errors:0 dropped:0 overruns:0 frame:0
              TX packets:208909 errors:0 dropped:0 overruns:0 carrier:0
              collisions:0 txqueuelen:1000
              RX bytes:27232517 (25.9 MiB)  TX bytes:46497552 (44.3 MiB)
              Memory:d8000000-d8020000

    eth0:NWRKAsvn Link encap:Ethernet  HWaddr PHYS_HOST_MAC_ADDR
              inet addr:xx.yy.zzz.233  Bcast:xx.yy.zzz.224  Mask:255.255.255.224
              UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
              Memory:d8000000-d8020000

    eth0:NETWORKB Link encap:Ethernet  HWaddr PHYS_HOST_MAC_ADDR
              inet addr:xx.yy.zzz.232  Bcast:xx.yy.zzz.224  Mask:255.255.255.224
              UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
              Memory:d8000000-d8020000

       # 192.168.6.* virbr

    virbr6    Link encap:Ethernet  HWaddr BA:E0:8F:F0:E1:2C
              inet addr:192.168.6.1  Bcast:192.168.6.255  Mask:255.255.255.0
              UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
              RX packets:5455 errors:0 dropped:0 overruns:0 frame:0
              TX packets:9244 errors:0 dropped:0 overruns:0 carrier:0
              collisions:0 txqueuelen:0
              RX bytes:857122 (837.0 KiB)  TX bytes:832458 (812.9 KiB)

        # 192.168.9.* virbr

    virbr9    Link encap:Ethernet  HWaddr E6:02:14:9C:B0:0C
              inet addr:192.168.9.1  Bcast:192.168.9.255  Mask:255.255.255.0
              UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
              RX packets:234 errors:0 dropped:0 overruns:0 frame:0
              TX packets:274 errors:0 dropped:0 overruns:0 carrier:0
              collisions:0 txqueuelen:0
              RX bytes:23536 (22.9 KiB)  TX bytes:21258 (20.7 KiB)

        # virtual interfaces attached to the virbr's (all belong to
the single virtual machine)
        # ... and these are all 'virtio' interfaces

    vnet0     Link encap:Ethernet  HWaddr D6:07:B9:FB:63:EC
              UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
              RX packets:5386 errors:0 dropped:0 overruns:0 frame:0
              TX packets:15741 errors:0 dropped:0 overruns:0 carrier:0
              collisions:0 txqueuelen:500
              RX bytes:929350 (907.5 KiB)  TX bytes:1170244 (1.1 MiB)

    vnet1     Link encap:Ethernet  HWaddr E6:02:14:9C:B0:0C
              UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
              RX packets:234 errors:0 dropped:0 overruns:0 frame:0
              TX packets:6702 errors:0 dropped:0 overruns:0 carrier:0
              collisions:0 txqueuelen:500
              RX bytes:26812 (26.1 KiB)  TX bytes:354902 (346.5 KiB)

    vnet2     Link encap:Ethernet  HWaddr BA:E0:8F:F0:E1:2C
              UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
              RX packets:69 errors:0 dropped:0 overruns:0 frame:0
              TX packets:6575 errors:0 dropped:0 overruns:0 carrier:0
              collisions:0 txqueuelen:500
              RX bytes:4142 (4.0 KiB)  TX bytes:341390 (333.3 KiB)


=== association between virbr's and vnet's on physical machine ===

    [_MASTER_ root@porta01 log]# brctl show macs
    bridge name     bridge id               STP enabled     interfaces
    virbr6          8000.bae08ff0e12c       yes             vnet0
                                                            vnet2
    virbr9          8000.e602149cb00c       yes             vnet1
    [_MASTER_ root@porta01 log]#


=== virtual host 'iptables' (in iptables-save form) ===

        # virtual host 'iptables'
        #
        # Scientific Linux 6

    *nat

        # log incoming port-443 at this level
    -A PREROUTING -d 192.168.6.33/32 -p tcp -m tcp --dport 443 -j LOG
--log-prefix "incoming_svn.NWRKA.com____ "
    -A PREROUTING -d 192.168.6.45/32 -p tcp -m tcp --dport 443 -j LOG
--log-prefix "incoming_www.NWRKA.com____ "
    -A PREROUTING -d 192.168.9.32/32 -p tcp -m tcp --dport 443 -j LOG
--log-prefix "incoming_www.NETWORKB.com_ "

    COMMIT


    *filter

        # other
    -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
    -A INPUT -p icmp -j ACCEPT
    -A INPUT -i lo -j ACCEPT

        # log incoming port-443 traffic
    -A INPUT -d 192.168.6.33/32 -p tcp -m tcp --dport 443 -j LOG
--log-prefix "INCOMING_svn.NWRKA.com____ "
    -A INPUT -d 192.168.6.45/32 -p tcp -m tcp --dport 443 -j LOG
--log-prefix "INCOMING_www.NWRKA.com____ "
    -A INPUT -d 192.168.9.32/32 -p tcp -m tcp --dport 443 -j LOG
--log-prefix "INCOMING_www.NETWORKB.com_ "

        # accept port-443 connections
    -A INPUT -d 192.168.6.45/32 -p tcp -m state --state NEW -m tcp
--dport 443 -j ACCEPT
    -A INPUT -d 192.168.6.33/32 -p tcp -m state --state NEW -m tcp
--dport 443 -j ACCEPT
    -A INPUT -d 192.168.9.32/32 -p tcp -m state --state NEW -m tcp
--dport 443 -j ACCEPT

        # other ... note:  removing port 80 to verify that iptables is
filtering out some traffic
    -A INPUT -p tcp -m state --state NEW -m tcp --dport 22 -j ACCEPT
    #-A INPUT -p tcp -m state --state NEW -m tcp --dport 80 -j ACCEPT

        # reject
    -A INPUT -j REJECT --reject-with icmp-host-prohibited

        # other
    -A FORWARD -j REJECT --reject-with icmp-host-prohibited

        # log outgoing packets related to port-443 interactions (I
guess this works)
    -A OUTPUT -s 192.168.6.33/32 -p tcp -m tcp --sport 443 -j LOG
--log-prefix "OUTGOING_svn.NWRKA.com____ "
    -A OUTPUT -s 192.168.6.45/32 -p tcp -m tcp --sport 443 -j LOG
--log-prefix "OUTGOING_www.NWRKA.com____ "
    -A OUTPUT -s 192.168.9.32/32 -p tcp -m tcp --sport 443 -j LOG
--log-prefix "OUTGOING_www.NETWORKB.com_ "

    COMMIT


=== 'ifconfig' on virtual machine ===

    # three virtual interfaces on two different subnets ... reflected
in brctl output on physical host

eth0      Link encap:Ethernet  HWaddr 52:54:00:58:25:73
          inet addr:192.168.6.45  Bcast:192.168.6.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:3669 errors:0 dropped:0 overruns:0 frame:0
          TX packets:2038 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:314076 (306.7 KiB)  TX bytes:377399 (368.5 KiB)

eth3      Link encap:Ethernet  HWaddr 52:54:00:81:0D:CE
          inet addr:192.168.9.32  Bcast:192.168.9.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:287 errors:0 dropped:0 overruns:0 frame:0
          TX packets:19 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:14380 (14.0 KiB)  TX bytes:958 (958.0 b)

eth4      Link encap:Ethernet  HWaddr 52:54:00:10:91:CF
          inet addr:192.168.6.33  Bcast:192.168.6.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:311 errors:0 dropped:0 overruns:0 frame:0
          TX packets:5 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:14128 (13.7 KiB)  TX bytes:210 (210.0 b)

lo        Link encap:Local Loopback
          inet addr:127.0.0.1  Mask:255.0.0.0
          UP LOOPBACK RUNNING  MTU:16436  Metric:1
          RX packets:21 errors:0 dropped:0 overruns:0 frame:0
          TX packets:21 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:1848 (1.8 KiB)  TX bytes:1848 (1.8 KiB)


=== routing tables on virtual machine <-- this may be source of the
problem!?? ===

    [root@brasilia httpd]# route -n
    Kernel IP routing table
    Destination     Gateway         Genmask         Flags Metric Ref
 Use Iface
    192.168.6.0     0.0.0.0         255.255.255.0   U     0      0        0 eth0
    192.168.6.0     0.0.0.0         255.255.255.0   U     0      0        0 eth4
    192.168.9.0     0.0.0.0         255.255.255.0   U     0      0        0 eth3
    169.254.0.0     0.0.0.0         255.255.0.0     U     1002   0        0 eth0
    169.254.0.0     0.0.0.0         255.255.0.0     U     1003   0        0 eth3
    169.254.0.0     0.0.0.0         255.255.0.0     U     1004   0        0 eth4
    0.0.0.0         192.168.6.1     0.0.0.0         UG    0      0        0 eth0
    [root@brasilia httpd]#

============ NOTE:  for following 'telnet HOST 443' DEMOS ... ============

For the following demos I initiate the 'telnet' and then do ^] and
exit the session.
The /var/log/messages output at each stage may not be full/complete, but the
point is that for 5 of these 6 interactions all goes well, and there's
good evidence
in from the iptables "-j LOG".  In the 6th interaction, the interaction from
general internet to www.NETWORKB.com, the interaction goes wrong.

Here's a sample client-side 'telnet' session showing interaction, from
a Linux box,
and it's enough to show full round-trip TCP/IP traffic to/from the
service of interest.

    [_MASTER_ root@porta01 log]# telnet www.NWRKA.com 443
    Trying 192.168.6.45...
    Connected to www.NWRKA.com.
    Escape character is '^]'.
    ^]
    telnet> quit
    Connection closed.
    [_MASTER_ root@porta01 log]#


=== demo of interaction 'telnet www.NWRKA.com 443' ===

    === telnet www.NWRKA.com 443, initiated from physical host, evidence seen
        in /var/log/messages on virtual host ... all OK ===

            Mar 16 10:12:05 brasilia kernel:
incoming_www.NWRKA.com____ IN=eth0 OUT=
MAC=52:54:00:58:25:73:ba:e0:8f:f0:e1:2c:08:00 SRC=192.168.6.1
DST=192.168.6.45 LEN=60 TOS=0x10 PREC=0x00 TTL=64 ID=43612 DF
PROTO=TCP SPT=45172 DPT=443 WINDOW=5840 RES=0x00 SYN URGP=0
            Mar 16 10:12:05 brasilia kernel:
INCOMING_www.NWRKA.com____ IN=eth0 OUT=
MAC=52:54:00:58:25:73:ba:e0:8f:f0:e1:2c:08:00 SRC=192.168.6.1
DST=192.168.6.45 LEN=60 TOS=0x10 PREC=0x00 TTL=64 ID=43612 DF
PROTO=TCP SPT=45172 DPT=443 WINDOW=5840 RES=0x00 SYN URGP=0
            Mar 16 10:12:05 brasilia kernel:
OUTGOING_www.NWRKA.com____ IN= OUT=eth0 SRC=192.168.6.45
DST=192.168.6.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=TCP
SPT=443 DPT=45172 WINDOW=5792 RES=0x00 ACK SYN URGP=0
            Mar 16 10:12:05 brasilia kernel:
INCOMING_www.NWRKA.com____ IN=eth0 OUT=
MAC=52:54:00:58:25:73:ba:e0:8f:f0:e1:2c:08:00 SRC=192.168.6.1
DST=192.168.6.45 LEN=52 TOS=0x10 PREC=0x00 TTL=64 ID=43613 DF
PROTO=TCP SPT=45172 DPT=443 WINDOW=46 RES=0x00 ACK URGP=0
            Mar 16 10:12:06 brasilia kernel:
INCOMING_www.NWRKA.com____ IN=eth0 OUT=
MAC=52:54:00:58:25:73:ba:e0:8f:f0:e1:2c:08:00 SRC=192.168.6.1
DST=192.168.6.45 LEN=52 TOS=0x10 PREC=0x00 TTL=64 ID=43614 DF
PROTO=TCP SPT=45172 DPT=443 WINDOW=46 RES=0x00 ACK FIN URGP=0
            Mar 16 10:12:06 brasilia kernel:
OUTGOING_www.NWRKA.com____ IN= OUT=eth0 SRC=192.168.6.45
DST=192.168.6.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=63494 DF PROTO=TCP
SPT=443 DPT=45172 WINDOW=46 RES=0x00 ACK FIN URGP=0
            Mar 16 10:12:06 brasilia kernel:
INCOMING_www.NWRKA.com____ IN=eth0 OUT=
MAC=52:54:00:58:25:73:ba:e0:8f:f0:e1:2c:08:00 SRC=192.168.6.1
DST=192.168.6.45 LEN=52 TOS=0x10 PREC=0x00 TTL=64 ID=43615 DF
PROTO=TCP SPT=45172 DPT=443 WINDOW=46 RES=0x00 ACK URGP=0

    === telnet www.NWRKA.com 443, initiated from general internet, evidence seen
        in /var/log/messages on physical and virtual hosts ... all OK ===

        === physical host iptables "-j LOG" stuff ===

            Mar 16 10:23:48 porta01 kernel:
P_incoming_www.NWRKA.com____ IN=eth0 OUT=
MAC=PHYS_HOST_MAC_ADDR:00:0c:db:fc:71:00:08:00 SRC=67.188.154.219
DST=xx.yy.zzz.231 LEN=64 TOS=0x00 PREC=0x20 TTL=52 ID=4317 DF
PROTO=TCP SPT=60002 DPT=443 WINDOW=65535 RES=0x00 SYN URGP=0
            Mar 16 10:23:48 porta01 kernel:
P_INCOMING_www.NWRKA.com____ IN=eth0 OUT=virbr6 SRC=67.188.154.219
DST=192.168.6.45 LEN=64 TOS=0x00 PREC=0x20 TTL=51 ID=4317 DF PROTO=TCP
SPT=60002 DPT=443 WINDOW=65535 RES=0x00 SYN URGP=0
            Mar 16 10:23:48 porta01 kernel:
P_OUTGOING_www.NWRKA.com____ IN=virbr6 OUT=eth0 PHYSIN=vnet0
SRC=192.168.6.45 DST=67.188.154.219 LEN=60 TOS=0x00 PREC=0x00 TTL=63
ID=0 DF PROTO=TCP SPT=443 DPT=60002 WINDOW=5792 RES=0x00 ACK SYN
URGP=0
            Mar 16 10:23:48 porta01 kernel:
P_INCOMING_www.NWRKA.com____ IN=eth0 OUT=virbr6 SRC=67.188.154.219
DST=192.168.6.45 LEN=52 TOS=0x00 PREC=0x20 TTL=51 ID=28035 DF
PROTO=TCP SPT=60002 DPT=443 WINDOW=33304 RES=0x00 ACK URGP=0
            Mar 16 10:23:50 porta01 kernel:
P_INCOMING_www.NWRKA.com____ IN=eth0 OUT=virbr6 SRC=67.188.154.219
DST=192.168.6.45 LEN=52 TOS=0x00 PREC=0x20 TTL=51 ID=18893 DF
PROTO=TCP SPT=60002 DPT=443 WINDOW=33304 RES=0x00 ACK FIN URGP=0
            Mar 16 10:23:50 porta01 kernel:
P_OUTGOING_www.NWRKA.com____ IN=virbr6 OUT=eth0 PHYSIN=vnet0
SRC=192.168.6.45 DST=67.188.154.219 LEN=52 TOS=0x00 PREC=0x00 TTL=63
ID=28018 DF PROTO=TCP SPT=443 DPT=60002 WINDOW=46 RES=0x00 ACK URGP=0
            Mar 16 10:23:50 porta01 kernel:
P_OUTGOING_www.NWRKA.com____ IN=virbr6 OUT=eth0 PHYSIN=vnet0
SRC=192.168.6.45 DST=67.188.154.219 LEN=52 TOS=0x00 PREC=0x00 TTL=63
ID=28019 DF PROTO=TCP SPT=443 DPT=60002 WINDOW=46 RES=0x00 ACK FIN
URGP=0
            Mar 16 10:23:50 porta01 kernel:
P_INCOMING_www.NWRKA.com____ IN=eth0 OUT=virbr6 SRC=67.188.154.219
DST=192.168.6.45 LEN=52 TOS=0x00 PREC=0x20 TTL=51 ID=23035 DF
PROTO=TCP SPT=60002 DPT=443 WINDOW=33304 RES=0x00 ACK URGP=0
            Mar 16 10:23:50 porta01 kernel:
P_INCOMING_www.NWRKA.com____ IN=eth0 OUT=virbr6 SRC=67.188.154.219
DST=192.168.6.45 LEN=52 TOS=0x00 PREC=0x20 TTL=51 ID=31446 DF
PROTO=TCP SPT=60002 DPT=443 WINDOW=33303 RES=0x00 ACK URGP=0

        === virtual host iptables "-j LOG" stuff ===

            Mar 16 10:23:47 brasilia kernel:
incoming_www.NWRKA.com____ IN=eth0 OUT=
MAC=52:54:00:58:25:73:ba:e0:8f:f0:e1:2c:08:00 SRC=67.188.154.219
DST=192.168.6.45 LEN=64 TOS=0x00 PREC=0x20 TTL=51 ID=4317 DF PROTO=TCP
SPT=60002 DPT=443 WINDOW=65535 RES=0x00 SYN URGP=0
            Mar 16 10:23:47 brasilia kernel:
INCOMING_www.NWRKA.com____ IN=eth0 OUT=
MAC=52:54:00:58:25:73:ba:e0:8f:f0:e1:2c:08:00 SRC=67.188.154.219
DST=192.168.6.45 LEN=64 TOS=0x00 PREC=0x20 TTL=51 ID=4317 DF PROTO=TCP
SPT=60002 DPT=443 WINDOW=65535 RES=0x00 SYN URGP=0
            Mar 16 10:23:47 brasilia kernel:
OUTGOING_www.NWRKA.com____ IN= OUT=eth0 SRC=192.168.6.45
DST=67.188.154.219 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=TCP
SPT=443 DPT=60002 WINDOW=5792 RES=0x00 ACK SYN URGP=0
            Mar 16 10:23:47 brasilia kernel:
INCOMING_www.NWRKA.com____ IN=eth0 OUT=
MAC=52:54:00:58:25:73:ba:e0:8f:f0:e1:2c:08:00 SRC=67.188.154.219
DST=192.168.6.45 LEN=52 TOS=0x00 PREC=0x20 TTL=51 ID=28035 DF
PROTO=TCP SPT=60002 DPT=443 WINDOW=33304 RES=0x00 ACK URGP=0
            Mar 16 10:23:49 brasilia kernel:
INCOMING_www.NWRKA.com____ IN=eth0 OUT=
MAC=52:54:00:58:25:73:ba:e0:8f:f0:e1:2c:08:00 SRC=67.188.154.219
DST=192.168.6.45 LEN=52 TOS=0x00 PREC=0x20 TTL=51 ID=18893 DF
PROTO=TCP SPT=60002 DPT=443 WINDOW=33304 RES=0x00 ACK FIN URGP=0
            Mar 16 10:23:49 brasilia kernel:
OUTGOING_www.NWRKA.com____ IN= OUT=eth0 SRC=192.168.6.45
DST=67.188.154.219 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=28018 DF
PROTO=TCP SPT=443 DPT=60002 WINDOW=46 RES=0x00 ACK URGP=0
            Mar 16 10:23:49 brasilia kernel:
OUTGOING_www.NWRKA.com____ IN= OUT=eth0 SRC=192.168.6.45
DST=67.188.154.219 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=28019 DF
PROTO=TCP SPT=443 DPT=60002 WINDOW=46 RES=0x00 ACK FIN URGP=0
            Mar 16 10:23:49 brasilia kernel:
INCOMING_www.NWRKA.com____ IN=eth0 OUT=
MAC=52:54:00:58:25:73:ba:e0:8f:f0:e1:2c:08:00 SRC=67.188.154.219
DST=192.168.6.45 LEN=52 TOS=0x00 PREC=0x20 TTL=51 ID=23035 DF
PROTO=TCP SPT=60002 DPT=443 WINDOW=33304 RES=0x00 ACK URGP=0
            Mar 16 10:23:49 brasilia kernel:
INCOMING_www.NWRKA.com____ IN=eth0 OUT=
MAC=52:54:00:58:25:73:ba:e0:8f:f0:e1:2c:08:00 SRC=67.188.154.219
DST=192.168.6.45 LEN=52 TOS=0x00 PREC=0x20 TTL=51 ID=31446 DF
PROTO=TCP SPT=60002 DPT=443 WINDOW=33303 RES=0x00 ACK URGP=0
            Mar 16 10:23:59 brasilia kernel:
OUTGOING_www.NWRKA.com____ IN= OUT=eth0 SRC=192.168.6.45
DST=174.102.135.26 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=TCP
SPT=443 DPT=1718 WINDOW=5840 RES=0x00 ACK SYN URGP=0
            Mar 16 10:24:00 brasilia kernel:
OUTGOING_www.NWRKA.com____ IN= OUT=eth0 SRC=192.168.6.45
DST=174.102.135.26 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=TCP
SPT=443 DPT=45747 WINDOW=5840 RES=0x00 ACK SYN URGP=0

=== demo of interaction 'telnet svn.NWRKA.com 443' ===

    === telnet svn.NWRKA.com 443, initiated from physical host, evidence seen
        in /var/log/messages on virtual host ... all OK ===

            Mar 16 10:25:31 brasilia kernel:
incoming_svn.NWRKA.com____ IN=eth0 OUT=
MAC=52:54:00:58:25:73:ba:e0:8f:f0:e1:2c:08:00 SRC=192.168.6.1
DST=192.168.6.33 LEN=60 TOS=0x10 PREC=0x00 TTL=64 ID=10196 DF
PROTO=TCP SPT=42878 DPT=443 WINDOW=5840 RES=0x00 SYN URGP=0
            Mar 16 10:25:31 brasilia kernel:
INCOMING_svn.NWRKA.com____ IN=eth0 OUT=
MAC=52:54:00:58:25:73:ba:e0:8f:f0:e1:2c:08:00 SRC=192.168.6.1
DST=192.168.6.33 LEN=60 TOS=0x10 PREC=0x00 TTL=64 ID=10196 DF
PROTO=TCP SPT=42878 DPT=443 WINDOW=5840 RES=0x00 SYN URGP=0
            Mar 16 10:25:31 brasilia kernel:
OUTGOING_svn.NWRKA.com____ IN= OUT=eth0 SRC=192.168.6.33
DST=192.168.6.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=TCP
SPT=443 DPT=42878 WINDOW=5792 RES=0x00 ACK SYN URGP=0
            Mar 16 10:25:31 brasilia kernel:
INCOMING_svn.NWRKA.com____ IN=eth0 OUT=
MAC=52:54:00:58:25:73:ba:e0:8f:f0:e1:2c:08:00 SRC=192.168.6.1
DST=192.168.6.33 LEN=52 TOS=0x10 PREC=0x00 TTL=64 ID=10197 DF
PROTO=TCP SPT=42878 DPT=443 WINDOW=46 RES=0x00 ACK URGP=0
            Mar 16 10:25:33 brasilia kernel:
INCOMING_svn.NWRKA.com____ IN=eth0 OUT=
MAC=52:54:00:58:25:73:ba:e0:8f:f0:e1:2c:08:00 SRC=192.168.6.1
DST=192.168.6.33 LEN=52 TOS=0x10 PREC=0x00 TTL=64 ID=10198 DF
PROTO=TCP SPT=42878 DPT=443 WINDOW=46 RES=0x00 ACK FIN URGP=0
            Mar 16 10:25:33 brasilia kernel:
OUTGOING_svn.NWRKA.com____ IN= OUT=eth0 SRC=192.168.6.33
DST=192.168.6.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=23769 DF PROTO=TCP
SPT=443 DPT=42878 WINDOW=46 RES=0x00 ACK FIN URGP=0
            Mar 16 10:25:33 brasilia kernel:
INCOMING_svn.NWRKA.com____ IN=eth0 OUT=
MAC=52:54:00:58:25:73:ba:e0:8f:f0:e1:2c:08:00 SRC=192.168.6.1
DST=192.168.6.33 LEN=52 TOS=0x10 PREC=0x00 TTL=64 ID=10199 DF
PROTO=TCP SPT=42878 DPT=443 WINDOW=46 RES=0x00 ACK URGP=0

    === telnet svn.NWRKA.com 443, initiated from general internet, evidence seen
        in /var/log/messages on physical and virtual hosts ... all OK ===

        === physical host iptables "-j LOG" stuff ===

            Mar 16 10:26:41 porta01 kernel:
P_incoming_svn.NWRKA.com____ IN=eth0 OUT=
MAC=PHYS_HOST_MAC_ADDR:00:0c:db:fc:71:00:08:00 SRC=67.188.154.219
DST=xx.yy.zzz.233 LEN=64 TOS=0x00 PREC=0x20 TTL=52 ID=4145 DF
PROTO=TCP SPT=60012 DPT=443 WINDOW=65535 RES=0x00 SYN URGP=0
            Mar 16 10:26:41 porta01 kernel:
P_INCOMING_svn.NWRKA.com____ IN=eth0 OUT=virbr6 SRC=67.188.154.219
DST=192.168.6.33 LEN=64 TOS=0x00 PREC=0x20 TTL=51 ID=4145 DF PROTO=TCP
SPT=60012 DPT=443 WINDOW=65535 RES=0x00 SYN URGP=0
            Mar 16 10:26:41 porta01 kernel:
P_OUTGOING_svn.NWRKA.com____ IN=virbr6 OUT=eth0 PHYSIN=vnet0
SRC=192.168.6.33 DST=67.188.154.219 LEN=60 TOS=0x00 PREC=0x00 TTL=63
ID=0 DF PROTO=TCP SPT=443 DPT=60012 WINDOW=5792 RES=0x00 ACK SYN
URGP=0
            Mar 16 10:26:41 porta01 kernel:
P_INCOMING_svn.NWRKA.com____ IN=eth0 OUT=virbr6 SRC=67.188.154.219
DST=192.168.6.33 LEN=52 TOS=0x00 PREC=0x20 TTL=51 ID=46882 DF
PROTO=TCP SPT=60012 DPT=443 WINDOW=65535 RES=0x00 ACK URGP=0
            Mar 16 10:26:43 porta01 kernel:
P_INCOMING_svn.NWRKA.com____ IN=eth0 OUT=virbr6 SRC=67.188.154.219
DST=192.168.6.33 LEN=52 TOS=0x00 PREC=0x20 TTL=51 ID=37377 DF
PROTO=TCP SPT=60012 DPT=443 WINDOW=65535 RES=0x00 ACK FIN URGP=0
            Mar 16 10:26:43 porta01 kernel:
P_OUTGOING_svn.NWRKA.com____ IN=virbr6 OUT=eth0 PHYSIN=vnet0
SRC=192.168.6.33 DST=67.188.154.219 LEN=52 TOS=0x00 PREC=0x00 TTL=63
ID=21898 DF PROTO=TCP SPT=443 DPT=60012 WINDOW=46 RES=0x00 ACK URGP=0
            Mar 16 10:26:43 porta01 kernel:
P_OUTGOING_svn.NWRKA.com____ IN=virbr6 OUT=eth0 PHYSIN=vnet0
SRC=192.168.6.33 DST=67.188.154.219 LEN=52 TOS=0x00 PREC=0x00 TTL=63
ID=21899 DF PROTO=TCP SPT=443 DPT=60012 WINDOW=46 RES=0x00 ACK FIN
URGP=0
            Mar 16 10:26:43 porta01 kernel:
P_INCOMING_svn.NWRKA.com____ IN=eth0 OUT=virbr6 SRC=67.188.154.219
DST=192.168.6.33 LEN=52 TOS=0x00 PREC=0x20 TTL=51 ID=8259 DF PROTO=TCP
SPT=60012 DPT=443 WINDOW=65535 RES=0x00 ACK URGP=0
            Mar 16 10:26:43 porta01 kernel:
P_INCOMING_svn.NWRKA.com____ IN=eth0 OUT=virbr6 SRC=67.188.154.219
DST=192.168.6.33 LEN=52 TOS=0x00 PREC=0x20 TTL=51 ID=51473 DF
PROTO=TCP SPT=60012 DPT=443 WINDOW=65535 RES=0x00 ACK URGP=0

        === virtual host iptables "-j LOG" stuff ===

            Mar 16 10:26:40 brasilia kernel:
incoming_svn.NWRKA.com____ IN=eth0 OUT=
MAC=52:54:00:58:25:73:ba:e0:8f:f0:e1:2c:08:00 SRC=67.188.154.219
DST=192.168.6.33 LEN=64 TOS=0x00 PREC=0x20 TTL=51 ID=4145 DF PROTO=TCP
SPT=60012 DPT=443 WINDOW=65535 RES=0x00 SYN URGP=0
            Mar 16 10:26:40 brasilia kernel:
INCOMING_svn.NWRKA.com____ IN=eth0 OUT=
MAC=52:54:00:58:25:73:ba:e0:8f:f0:e1:2c:08:00 SRC=67.188.154.219
DST=192.168.6.33 LEN=64 TOS=0x00 PREC=0x20 TTL=51 ID=4145 DF PROTO=TCP
SPT=60012 DPT=443 WINDOW=65535 RES=0x00 SYN URGP=0
            Mar 16 10:26:40 brasilia kernel:
OUTGOING_svn.NWRKA.com____ IN= OUT=eth0 SRC=192.168.6.33
DST=67.188.154.219 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=TCP
SPT=443 DPT=60012 WINDOW=5792 RES=0x00 ACK SYN URGP=0
            Mar 16 10:26:40 brasilia kernel:
INCOMING_svn.NWRKA.com____ IN=eth0 OUT=
MAC=52:54:00:58:25:73:ba:e0:8f:f0:e1:2c:08:00 SRC=67.188.154.219
DST=192.168.6.33 LEN=52 TOS=0x00 PREC=0x20 TTL=51 ID=46882 DF
PROTO=TCP SPT=60012 DPT=443 WINDOW=65535 RES=0x00 ACK URGP=0
            Mar 16 10:26:42 brasilia kernel:
INCOMING_svn.NWRKA.com____ IN=eth0 OUT=
MAC=52:54:00:58:25:73:ba:e0:8f:f0:e1:2c:08:00 SRC=67.188.154.219
DST=192.168.6.33 LEN=52 TOS=0x00 PREC=0x20 TTL=51 ID=37377 DF
PROTO=TCP SPT=60012 DPT=443 WINDOW=65535 RES=0x00 ACK FIN URGP=0
            Mar 16 10:26:42 brasilia kernel:
OUTGOING_svn.NWRKA.com____ IN= OUT=eth0 SRC=192.168.6.33
DST=67.188.154.219 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=21898 DF
PROTO=TCP SPT=443 DPT=60012 WINDOW=46 RES=0x00 ACK URGP=0
            Mar 16 10:26:42 brasilia kernel:
OUTGOING_svn.NWRKA.com____ IN= OUT=eth0 SRC=192.168.6.33
DST=67.188.154.219 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=21899 DF
PROTO=TCP SPT=443 DPT=60012 WINDOW=46 RES=0x00 ACK FIN URGP=0
            Mar 16 10:26:42 brasilia kernel:
INCOMING_svn.NWRKA.com____ IN=eth0 OUT=
MAC=52:54:00:58:25:73:ba:e0:8f:f0:e1:2c:08:00 SRC=67.188.154.219
DST=192.168.6.33 LEN=52 TOS=0x00 PREC=0x20 TTL=51 ID=8259 DF PROTO=TCP
SPT=60012 DPT=443 WINDOW=65535 RES=0x00 ACK URGP=0
            Mar 16 10:26:42 brasilia kernel:
INCOMING_svn.NWRKA.com____ IN=eth0 OUT=
MAC=52:54:00:58:25:73:ba:e0:8f:f0:e1:2c:08:00 SRC=67.188.154.219
DST=192.168.6.33 LEN=52 TOS=0x00 PREC=0x20 TTL=51 ID=51473 DF
PROTO=TCP SPT=60012 DPT=443 WINDOW=65535 RES=0x00 ACK URGP=0

=== demo of interaction 'telnet www.NETWORKB.com 443' ===

    === telnet www.NETWORKB.com 443, initiated from physical host, evidence seen
        in /var/log/messages on virtual host ... all OK ===

            Mar 16 10:28:46 brasilia kernel:
incoming_www.NETWORKB.com_ IN=eth3 OUT=
MAC=52:54:00:81:0d:ce:e6:02:14:9c:b0:0c:08:00 SRC=192.168.9.1
DST=192.168.9.32 LEN=60 TOS=0x10 PREC=0x00 TTL=64 ID=36167 DF
PROTO=TCP SPT=37428 DPT=443 WINDOW=5840 RES=0x00 SYN URGP=0
            Mar 16 10:28:46 brasilia kernel:
INCOMING_www.NETWORKB.com_ IN=eth3 OUT=
MAC=52:54:00:81:0d:ce:e6:02:14:9c:b0:0c:08:00 SRC=192.168.9.1
DST=192.168.9.32 LEN=60 TOS=0x10 PREC=0x00 TTL=64 ID=36167 DF
PROTO=TCP SPT=37428 DPT=443 WINDOW=5840 RES=0x00 SYN URGP=0
            Mar 16 10:28:46 brasilia kernel:
OUTGOING_www.NETWORKB.com_ IN= OUT=eth3 SRC=192.168.9.32
DST=192.168.9.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=TCP
SPT=443 DPT=37428 WINDOW=5792 RES=0x00 ACK SYN URGP=0
            Mar 16 10:28:46 brasilia kernel:
INCOMING_www.NETWORKB.com_ IN=eth3 OUT=
MAC=52:54:00:81:0d:ce:e6:02:14:9c:b0:0c:08:00 SRC=192.168.9.1
DST=192.168.9.32 LEN=52 TOS=0x10 PREC=0x00 TTL=64 ID=36168 DF
PROTO=TCP SPT=37428 DPT=443 WINDOW=46 RES=0x00 ACK URGP=0
            Mar 16 10:28:48 brasilia kernel:
INCOMING_www.NETWORKB.com_ IN=eth3 OUT=
MAC=52:54:00:81:0d:ce:e6:02:14:9c:b0:0c:08:00 SRC=192.168.9.1
DST=192.168.9.32 LEN=52 TOS=0x10 PREC=0x00 TTL=64 ID=36169 DF
PROTO=TCP SPT=37428 DPT=443 WINDOW=46 RES=0x00 ACK FIN URGP=0
            Mar 16 10:28:48 brasilia kernel:
OUTGOING_www.NETWORKB.com_ IN= OUT=eth3 SRC=192.168.9.32
DST=192.168.9.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=22407 DF PROTO=TCP
SPT=443 DPT=37428 WINDOW=46 RES=0x00 ACK FIN URGP=0
            Mar 16 10:28:48 brasilia kernel:
INCOMING_www.NETWORKB.com_ IN=eth3 OUT=
MAC=52:54:00:81:0d:ce:e6:02:14:9c:b0:0c:08:00 SRC=192.168.9.1
DST=192.168.9.32 LEN=52 TOS=0x10 PREC=0x00 TTL=64 ID=36170 DF
PROTO=TCP SPT=37428 DPT=443 WINDOW=46 RES=0x00 ACK URGP=0

    === telnet www.NETWORKB.com 443, initiated from general internet,
evidence seen
        in /var/log/messages on physical and virtual hosts ...
PROBLEMS!!! ... VIRTUAL HOST
        SEES INITIATING PACKETS BUT NEVER ACCEPTS OR RESPONDS TO THEM.
 I DO CTRL-C ON
        TELNET SESSION TO TERMINATE ON CLIENT SIDE. ===

        === physical host iptables "-j LOG" stuff ===

            Mar 16 10:30:55 porta01 kernel:
P_incoming_www.NETWORKB.com_ IN=eth0 OUT=
MAC=PHYS_HOST_MAC_ADDR:00:0c:db:fc:71:00:08:00 SRC=67.188.154.219
DST=xx.yy.zzz.232 LEN=64 TOS=0x00 PREC=0x20 TTL=52 ID=60550 DF
PROTO=TCP SPT=60023 DPT=443 WINDOW=65535 RES=0x00 SYN URGP=0
            Mar 16 10:30:55 porta01 kernel:
P_INCOMING_www.NETWORKB.com_ IN=eth0 OUT=virbr9 SRC=67.188.154.219
DST=192.168.9.32 LEN=64 TOS=0x00 PREC=0x20 TTL=51 ID=60550 DF
PROTO=TCP SPT=60023 DPT=443 WINDOW=65535 RES=0x00 SYN URGP=0
            Mar 16 10:30:56 porta01 kernel:
P_INCOMING_www.NETWORKB.com_ IN=eth0 OUT=virbr9 SRC=67.188.154.219
DST=192.168.9.32 LEN=64 TOS=0x00 PREC=0x20 TTL=51 ID=26873 DF
PROTO=TCP SPT=60023 DPT=443 WINDOW=65535 RES=0x00 SYN URGP=0
            Mar 16 10:30:57 porta01 kernel:
P_INCOMING_www.NETWORKB.com_ IN=eth0 OUT=virbr9 SRC=67.188.154.219
DST=192.168.9.32 LEN=64 TOS=0x00 PREC=0x20 TTL=51 ID=41172 DF
PROTO=TCP SPT=60023 DPT=443 WINDOW=65535 RES=0x00 SYN URGP=0
            Mar 16 10:30:58 porta01 kernel:
P_INCOMING_www.NETWORKB.com_ IN=eth0 OUT=virbr9 SRC=67.188.154.219
DST=192.168.9.32 LEN=64 TOS=0x00 PREC=0x20 TTL=51 ID=33439 DF
PROTO=TCP SPT=60023 DPT=443 WINDOW=65535 RES=0x00 SYN URGP=0
            Mar 16 10:30:59 porta01 kernel:
P_INCOMING_www.NETWORKB.com_ IN=eth0 OUT=virbr9 SRC=67.188.154.219
DST=192.168.9.32 LEN=64 TOS=0x00 PREC=0x20 TTL=51 ID=23214 DF
PROTO=TCP SPT=60023 DPT=443 WINDOW=65535 RES=0x00 SYN URGP=0

         NOTE:  ^^^ up here, repeated incoming packets destined to
port 443 on specific physical host interface and being mapped to
virtual host ...
         seemingly just like for other interfaces

        === virtual host iptables "-j LOG" stuff ===

            Mar 16 10:30:53 brasilia kernel:
incoming_www.NETWORKB.com_ IN=eth3 OUT=
MAC=52:54:00:81:0d:ce:e6:02:14:9c:b0:0c:08:00 SRC=67.188.154.219
DST=192.168.9.32 LEN=64 TOS=0x00 PREC=0x20 TTL=51 ID=60550 DF
PROTO=TCP SPT=60023 DPT=443 WINDOW=65535 RES=0x00 SYN URGP=0
            Mar 16 10:30:54 brasilia kernel:
incoming_www.NETWORKB.com_ IN=eth3 OUT=
MAC=52:54:00:81:0d:ce:e6:02:14:9c:b0:0c:08:00 SRC=67.188.154.219
DST=192.168.9.32 LEN=64 TOS=0x00 PREC=0x20 TTL=51 ID=26873 DF
PROTO=TCP SPT=60023 DPT=443 WINDOW=65535 RES=0x00 SYN URGP=0
            Mar 16 10:30:55 brasilia kernel:
incoming_www.NETWORKB.com_ IN=eth3 OUT=
MAC=52:54:00:81:0d:ce:e6:02:14:9c:b0:0c:08:00 SRC=67.188.154.219
DST=192.168.9.32 LEN=64 TOS=0x00 PREC=0x20 TTL=51 ID=41172 DF
PROTO=TCP SPT=60023 DPT=443 WINDOW=65535 RES=0x00 SYN URGP=0
            Mar 16 10:30:56 brasilia kernel:
incoming_www.NETWORKB.com_ IN=eth3 OUT=
MAC=52:54:00:81:0d:ce:e6:02:14:9c:b0:0c:08:00 SRC=67.188.154.219
DST=192.168.9.32 LEN=64 TOS=0x00 PREC=0x20 TTL=51 ID=33439 DF
PROTO=TCP SPT=60023 DPT=443 WINDOW=65535 RES=0x00 SYN URGP=0
            Mar 16 10:30:57 brasilia kernel:
incoming_www.NETWORKB.com_ IN=eth3 OUT=
MAC=52:54:00:81:0d:ce:e6:02:14:9c:b0:0c:08:00 SRC=67.188.154.219
DST=192.168.9.32 LEN=64 TOS=0x00 PREC=0x20 TTL=51 ID=23214 DF
PROTO=TCP SPT=60023 DPT=443 WINDOW=65535 RES=0x00 SYN URGP=0

         NOTE:  ^^^ up here, repeated incoming packets successfully
mapped to port 443 on virtual host,
         but virtual host doesn't send anything back!!  And at the
virtual host level this is ALMOST like
         the internally-initiated successful telnet session, EXCEPT:
           * for internally-initiated version there's a SRC=192.168.9.1
           * for general internet version there's a SRC=67.188.154.219
... from outside the physical host,
             but that works just fine for the interfaces on the
192.168.6.* ... could the default-route
             to 192.168.6.1 in the virtual host's routing tables be the culprit?

=== END OF DATA DUMP ===

In the very last demo of the 6 demos we see GENERAL_INTERNET (67.188.154.219) ->
PHYS_HOST_interface/port (xx.yy.zzz.232) -> routing ->
out-through-subnet-gateway-write-to (192.168.9.1) ->
VIRTUAL_HOST_interface/port (192.168.9.32) -> BLACK-HOLE.

The analogous interactions with the other virtual interfaces from the
general internet show no problem.
Also, the 192.168.9.32 works just fine when the telnet session is
initiated "internally" from the
physical host.  So what's the deal?  As far as I can see everything
should just work in all 6 cases,
not just 5 of the 6.

Please help!  Thanks.

Nathan Watson
nfwatson@xxxxxxxxx
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux