Re: SYN packet "disappears"

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Friday, 28 April 2017 11:00:57 AM AEST Robert White wrote:
> On 04/27/17 05:21, Kevin wrote:
> > (... DROP rules and a tun+ device but virtually no rules that ACCEPT the
> > packet so it can get into the tun+ device ...)
> So you've got these policies...
> 
> > $IPT -t filter   --policy INPUT       DROP
> > $IPT -t filter   --policy FORWARD     DROP
> > $IPT -t filter   --policy OUTPUT      DROP
> 
> And you've got these post TUN/TAP decode rules
> 
> > $IPT -A INPUT   -i tun+ -s 999.999.999.999 -j ACCEPT
> > $IPT -A FORWARD -i tun+ -s 999.999.999.999 -j ACCEPT
> > $IPT -A OUTPUT  -o tun+ -d 999.999.999.999 -j ACCEPT
> 
> But you've got no
> 
> $IPT -A INPUT -i ethX (Whatever the tunnel needs) -j ACCEPT

As I indicated in my original message, the rules I included were only the 
initial rules in my configuration. My question was not so much why my VPN was 
not working as expected by what happened to the packet. Why were the no log 
entries on the mangle and filter input chains?

As per my previous message, that has been explained. I did not know about the 
rp-filter mechanism. Those expected log entries now appear.

And, for the record, I did try with all chain policies as ACCEPT.

Cheers,
Kevin
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux