Re: Reject non-ipsec traffic

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, Jul 20, 2011 at 4:30 PM, Jan Engelhardt <jengelh@xxxxxxxxxx> wrote:
>
> On Wednesday 2011-07-20 22:13, Ryan Whelan wrote:
>>On Wed, Jul 20, 2011 at 3:56 PM, Jan Engelhardt <jengelh@xxxxxxxxxx> wrote:
>>> On Wednesday 2011-07-20 21:20, Ryan Whelan wrote:
>>>
>>>>I have IPSec setup between 2 hosts and would like to stop all
>>>>inter-host traffic thats not secured with IPSec (They have a GRE
>>>>tunnel between them, and I want to be sure the GRE traffic fails to
>>>>transmit if the IPSec daemon fails)
>>>>
>>>>iptables -A OUTPUT -p udp --dport 500 -d hostB.example.com -j ACCEPT
>>>>iptables -A OUTPUT -p tcp --dport 500 -d hostB.example.com -j ACCEPT
>>>>iptables -A OUTPUT -p esp -d hostB.example.com -j ACCEPT
>>>>iptables -A OUTPUT -d hostB.example.com -j REJECT
>>>>
>>>>The reject rule is rejecting all traffic to that host[...]
>>>>If i remove that rule, everything works and i
>>>>see the packets get counted on the ESP protocol rule.  I thought the
>>>>rules were processes in order until a match was found. Clearly I'm
>>>>wrong.
>>>
>>> They are indeed processed in order, and until a match is found --
>>> and match _was_ found (packet which has dst=hostB, which is not
>>> ESP, and which does not have tcpudp-500 in its headers).
>>>
>>> A `ping hostB` would match the criteria of this 4th rules, as would
>>> opening http://hostB.example.com in a browser, for example.
>>
>>but if i remove that the last rule, the 3 rule starts counting matches
>>(the ESP protocol rule).
>
> Sure, because once you are not dropping the original packet in rule
> 4, it has a chance to get encrypted, show up as ESP, and match rule
> 3.
>

So the outbound traffic is being processed by netfilter before getting
wrapped by IPSec?
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux