Re: Change source or destination for packets arriving locally (for Direct Server Return)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




Please, avoid top-posting, thanks :-)

There is information about debugging in the wiki [0], and is rather easy to use.

[0] https://wiki.nftables.org/wiki-nftables/index.php/Ruleset_debug/tracing

Okay :)

I added all the debug logs I can think of:

table ip filter {
	chain filter-prerouting-0 {
		type filter hook prerouting priority 0; policy accept;
		ip protocol icmp nftrace set 1
	}

	chain test2 {
	    type filter hook forward priority 0; policy accept;
	    ip protocol icmp nftrace set 1
	}

	chain test-200 {
	    type filter hook prerouting priority 200; policy accept;
	    ip protocol icmp nftrace set 1
	}

	chain test-m500 {
	    type nat hook prerouting priority -500; policy accept;
	    ip protocol icmp nftrace set 1
	}

	chain test-500 {
	    type filter hook prerouting priority 500; policy accept;
	    ip protocol icmp nftrace set 1
	}

	chain forward-0 {
	    type filter hook forward priority 0; policy accept;
	    ip protocol icmp nftrace set 1
	}

	chain forward-m500 {
    		type filter hook forward priority -500; policy accept;
	    ip protocol icmp nftrace set 1
	}
}

and the packets go missing between test-500 and forward-m500 also the test-m500 chain is never hit (nat).

Sorry for the names, I tried to rename them with:

nft rename chain ip filter test filter-prerouting-0

<cmdline>:1:1-47: Error: Could not process rule: No such file or directory
rename chain ip filter test filter-prerouting-0
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

nft monitor logs:

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
daddr 18:a9:05:79:73:6e ip saddr 10.21.13.5 ip daddr 10.253.10.12 ip dscp cs0 ip ecn not-ect ip ttl 63 ip id 24831 ip length 84 icmp type echo-request icmp code 0 icmp id 21685 icmp sequence 1 trace id 42c618bd ip filter test2 rule ip protocol icmp nftrace set 1 (verdict continue)
trace id 42c618bd ip filter test2 verdict continue
trace id 42c618bd ip filter test2
trace id 42c618bd ip filter forward-0 packet: iif eth0 oif kube-bridge ether saddr 9c:8e:99:0f:7e:46 ether daddr 18:a9:05:79:73:6e ip saddr 10.21.13.5 ip daddr 10.253.10.12 ip dscp cs0 ip ecn not-ect ip ttl 63 ip id 24831 ip length 84 icmp type echo-request icmp code 0 icmp id 21685 icmp sequence 1 trace id 42c618bd ip filter forward-0 rule ip protocol icmp nftrace set 1 (verdict continue)
trace id 42c618bd ip filter forward-0 verdict continue
trace id 42c618bd ip filter forward-0
trace id a1f8a919 ip filter test packet: iif kube-bridge ether saddr 0a:58:0a:fd:0a:0c ether daddr 0a:58:0a:fd:0a:01 ip saddr 10.253.254.236 ip daddr 10.21.13.5 ip dscp cs0 ip ecn not-ect ip ttl 64 ip id 18916 ip length 84 icmp type echo-reply icmp code 0 icmp id 21685 icmp sequence 1 trace id a1f8a919 ip filter test rule ip protocol icmp nftrace set 1 (verdict continue)
trace id a1f8a919 ip filter test verdict continue
trace id a1f8a919 ip filter test
trace id a1f8a919 ip filter test-200 packet: iif kube-bridge ether saddr 0a:58:0a:fd:0a:0c ether daddr 0a:58:0a:fd:0a:01 ip saddr 10.253.254.236 ip daddr 10.21.13.5 ip dscp cs0 ip ecn not-ect ip ttl 64 ip id 18916 ip length 84 icmp type echo-reply icmp code 0 icmp id 21685 icmp sequence 1 trace id a1f8a919 ip filter test-200 rule ip protocol icmp nftrace set 1 (verdict continue)
trace id a1f8a919 ip filter test-200 verdict continue
trace id a1f8a919 ip filter test-200
trace id a1f8a919 ip filter test-500 packet: iif kube-bridge ether saddr 0a:58:0a:fd:0a:0c ether daddr 0a:58:0a:fd:0a:01 ip saddr 10.253.254.236 ip daddr 10.21.13.5 ip dscp cs0 ip ecn not-ect ip ttl 64 ip id 18916 ip length 84 icmp type echo-reply icmp code 0 icmp id 21685 icmp sequence 1 trace id a1f8a919 ip filter test-500 rule ip protocol icmp nftrace set 1 (verdict continue)
trace id a1f8a919 ip filter test-500 verdict continue
trace id a1f8a919 ip filter test-500
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^


any idea where I could poke, what I could start to figure out why the packets are dropped in the kernel?
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux