Re: Iptables State Table

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 





netfilter@xxxxxxxxxxxxxx wrote:

On Thu, 07 Jul 2011 16:12 +0100, "Jonathan Tripathy"
<jonnyt@xxxxxxxxxxx> wrote:

netfilter@buglecreek">netfilter@xxxxxxxxxxxxxx wrote:
Given the following simplified rules:
iptables -A INPUT -i eth0 -m state --state ESTABLISHED,RELATED -j ACCEPT
iptables -A OUTPUT -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT

When the system boots, various daemons create persistent connections
that stay established indefinitely to authentication servers like the
following:
clientSytem:44444 ----->  authServer:389
This creates an entry in the iptables state table which works fine. But, occasionally the state table gets cleared out. Usually by
something simple like someone restarting iptables. Once that happens the
established connection is still there, but when the authServer sends a
packet back to the clientSystem the packet is viewed as new and
eventually gets dropped since their is nothing in the state table.  The
only way I can think of allowing for this is to create a rule that
allows new connections from the authServer:389 to the clientSystem:any. Is there a better way?
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Shouldn't the software in question detect a connection drop and then re-attempt to connect to the server?

The connection never drops.  Netstat shows the connection as
ESTABLISHED, but the iptables state table does not have the connection
since it was cleared.  So, if there were no iptables running the
connection would carry on normal comms. Since there are rules that only
allow established connections the packet gets dropped due to the
clearing of the state table. Hope that makes sense.

Yes, I understand what's happening :)

What I am confused about though is why netstat is showing the state as still ESTABLISHED. Surely if the packets can't get through the filter, this should be class as an effective connection drop, so the software should restart the connection?

Most good firewalls (not just iptables) include a feature to reset the state table. I know that if I reset the state table in my firewall, all connections are effectively dropped and the individual bits of software running throughout the LAN will re-connect.
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux