logging rsts

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I have a Hurricane Electric IPv6 tunnel routing to my linux firewall
box running both iptables and ip6tables.  My ip6tables config is
pretty simplistic: accepts input and forwarding from the lan
interface, accepts icmp from the tunnel interface, and forwards
related,estabished.  During normal use the firewall is frequently
logging RST packets from 80 and 443.  I presume this is traffic from
web browsing happening on the lan.  My question is just why these
packets get dropped so often under normal operations.  Shouldn't they
be permitted as part of established connections?  I guess I can just
insert a rule to silently drop RST packets before the LOG line to keep
things quiet, I'm just not sure if it should be necessary.


:INPUT DROP [0:0]
:FORWARD DROP [1603:106671]
:OUTPUT ACCEPT [6344:552549]
-A INPUT -i lo -j ACCEPT
-A INPUT -i lan -j ACCEPT
-A INPUT -i he -p ipv6-icmp -j ACCEPT
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A INPUT -j LOG
-A FORWARD -i lan -j ACCEPT
-A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -j LOG


[32620.217272] IN=he OUT=lan MAC=[...] TUNNEL=1.2.3.4->4.3.2.1
SRC=[...]:1012 DST=[...]:999a LEN=60 TC=0 HOPLIMIT=54 FLOWLBL=0
PROTO=TCP SPT=443 DPT=34712 WINDOW=0 RES=0x00 RST URGP=0
[32623.630174] IN=he OUT=lan MAC=[...] TUNNEL=1.2.3.4->4.3.2.1
SRC=[...]:1012 DST=[...]:999a LEN=60 TC=0 HOPLIMIT=54 FLOWLBL=0
PROTO=TCP SPT=443 DPT=34712 WINDOW=0 RES=0x00 RST URGP=0
[32630.487245] IN=he OUT=lan MAC=[...] TUNNEL=1.2.3.4->4.3.2.1
SRC=[...]:1012 DST=[...]:999a LEN=60 TC=0 HOPLIMIT=54 FLOWLBL=0
PROTO=TCP SPT=443 DPT=34712 WINDOW=0 RES=0x00 RST URGP=0
[32652.293363] IN=he OUT=lan MAC=[...] TUNNEL=1.2.3.4->4.3.2.1
SRC=[...]:1014 DST=[...]:e34c LEN=60 TC=0 HOPLIMIT=54 FLOWLBL=0
PROTO=TCP SPT=80 DPT=44777 WINDOW=0 RES=0x00 RST URGP=0
[32657.887168] IN=he OUT=lan MAC=[...] TUNNEL=1.2.3.4->4.3.2.1
SRC=[...]:1014 DST=[...]:e34c LEN=60 TC=0 HOPLIMIT=54 FLOWLBL=0
PROTO=TCP SPT=80 DPT=44777 WINDOW=0 RES=0x00 RST URGP=0
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux