[lug] iptables help
Lee Woodworth
blug-mail at duboulder.com
Sun Oct 21 23:38:45 MDT 2012
Then maybe its at lower level in the stack. I once had a case of disappearing
packets getting forwarded to a vm because of arp/arp proxy issues. Probably
time to use tcpdump.
On 10/21/12 14:14, Dan Ferris wrote:
> I think --to and --to-destination are the same thing.
>
> I have forwarding turned on for all interfaces globally by doing echo 1
> > /proc/sys/net/ipv4/ip_forward
>
> I don't have any rules in the forward chain of the filter table. There's
> no point, it's set to globally accept.
>
> Weird...
>
> Dan
>
> On 10/21/2012 12:44 AM, Lee Woodworth wrote:
>> 1) I've been using --to-destination in DNAT rules.
>>
>> 2) Does enabling forwarding on a pair of interfaces automatically cause packets
>> between them to be forwarded? If not, then maybe you need forwards in
>> the FORWARD chain of the filter table.
>>
>> I happen to have:
>>
>> /proc/sys/net/ipv4/conf/<if1>/forwarding = 1
>> /proc/sys/net/ipv4/conf/<if2>/forwarding = 1
>>
>> *filter
>> -A FORWARD -i <if1> -o <if2> -p tcp -d <int-addr> --dport <port> -j ACCEPT
>> -A FORWARD -i <if2> -o <if1> -p tcp -s <int-addr> --sport <port> -j ACCEPT
>>
>> *nat
>> -A PREROUTING -i <if1> -p tcp -d <ext-addr> --dport <port> -j DNAT
>> --to-destination <int-addr>:<port>
>>
>> Which works in our environment.
>>
>>
>> On 10/20/12 22:59, Dan Ferris wrote:
>>> Does anyone know offhand why in the name of holy khutulu something this
>>> simple won't just work:
>>>
>>> iptables -t nat -A PREROUTING -i eth0 -p tcp --dport 443 -j DNAT --to
>>> 127.0.0.1:4443
>>>
>>> ip_forward is turned on. I even added a route in the routing table:
>>>
>>> route -n
>>> Kernel IP routing table
>>> Destination Gateway Genmask Flags Metric Ref Use Iface
>>> 0.0.0.0 192.168.108.1 0.0.0.0 UG 100 0 0 eth0
>>> 127.0.0.0 0.0.0.0 255.0.0.0 U 0 0 0 lo
>>> 192.168.108.0 0.0.0.0 255.255.252.0 U 0 0 0 eth0
>>>
>>> No firewall rules at all:
>>>
>>> Chain INPUT (policy ACCEPT 75M packets, 5387M bytes)
>>> pkts bytes target prot opt in out source destination
>>>
>>> Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
>>> pkts bytes target prot opt in out source destination
>>>
>>> Chain OUTPUT (policy ACCEPT 72M packets, 55G bytes)
>>> pkts bytes target prot opt in out source destination
>>>
>>> Yet no matter what I do, the process listening on lo never sees any of
>>> the redirected traffic.
>>>
>>> It's so irritating something so stupidly easy isn't working. Not to
>>> mention I feel like an idiot.
>>>
>>> If anyone has some brilliant ideas, I'm open to suggestions.
>>>
>>> Dan
>>> _______________________________________________
>>> Web Page: http://lug.boulder.co.us
>>> Mailing List: http://lists.lug.boulder.co.us/mailman/listinfo/lug
>>> Join us on IRC: irc.hackingsociety.org port=6667 channel=#hackingsociety
>> _______________________________________________
>> Web Page: http://lug.boulder.co.us
>> Mailing List: http://lists.lug.boulder.co.us/mailman/listinfo/lug
>> Join us on IRC: irc.hackingsociety.org port=6667 channel=#hackingsociety
>
> _______________________________________________
> Web Page: http://lug.boulder.co.us
> Mailing List: http://lists.lug.boulder.co.us/mailman/listinfo/lug
> Join us on IRC: irc.hackingsociety.org port=6667 channel=#hackingsociety
More information about the LUG
mailing list