[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-users] Problem start iptables - udp broken
On Tue, 28 Nov 2006, [ISO-8859-1] Abel Martín wrote: .... > I forgot to ask you. Are you trying to filter traffic for domU in > dom0? If you are trying to do this with iptables and Xen bridged > networking it has no sense, since a bridged device is a link layer > device and iptables works above at network and trasport layer. If you > are using Xen routed networking I have no experience with such > configuration. Oh yes... I also assumed so far eth0 sees everything. Now i read xenwiki/XenNetworking and understand...perhaps. (see question in my reply on "11/28/06, Bill Maidment") iptables-rules was not bind expilizit to an interface. ...lamp ligths on... I also tested which is, if I bind iptables expilizit an peth0. --------------------------------------------------------------------- EXTIF="peth0" $IPTABLES -i $EXTIF -A INPUT -p tcp -s 0/0 -m multiport --dport 23 -j LOG $LOG_LEVEL --log-prefix "IN test: " $IPTABLES -i $EXTIF -A INPUT -p tcp -s 0/0 -m multiport --dport 23 -j DROP $IPTABLES -i $EXTIF -A FORWARD -p tcp -s 0/0 -d 193.123.123.86 -m multiport --dport 23 -j LOG $LOG_LEVEL --log-prefix "fw nas: " $IPTABLES -i $EXTIF -A FORWARD -p tcp -s 0/0 -d 193.123.123.86 -m multiport --dport 23 -j DROP --------------------------------------------------------------------- - l0:vif2.0 and l1:eth0 captured to same time only - testcommand: $ ls -laR ~ l0:~# tcpdump -vv -n -i peth0 host nfsserver and udp 08:02:47.777591 IP (tos 0x0, ttl 255, id 38933, offset 0, flags [DF], length: 140) 193.123.123.85.2049 > 193.123.123.86.803770947: reply ok 112 getattr DIR 7 55 ids 1104/110 [|nfs] 08:02:47.778281 IP (tos 0x0, ttl 64, id 13432, offset 0, flags [DF], length: 140) 193.123.123.86.820548163 > 193.123.123.85.2049: 112 access [|nfs] 08:02:47.778517 IP (tos 0x0, ttl 255, id 38934, offset 0, flags [DF], length: 148) 193.123.123.85.2049 > 193.123.123.86.820548163: reply ok 120 access attr: DIR 755 ids 1104/110 [|nfs] 08:02:47.779239 IP (tos 0x0, ttl 64, id 13433, offset 0, flags [DF], length: 160) 193.123.123.86.837325379 > 193.123.123.85.2049: 132 readdirplus [|nfs] 08:02:47.780179 IP (tos 0x0, ttl 255, id 38935, offset 0, flags [+, DF], length: 1500) 193.123.123.85.2049 > 193.123.123.86.837325379: reply ok 1472 readdirp lus POST: DIR 755 ids 1104/110 [|nfs] 08:02:47.780198 IP (tos 0x0, ttl 255, id 38935, offset 1480, flags [DF], length: 116) 193.123.123.85 > 193.123.123.86: udp 08:02:49.368860 IP (tos 0x0, ttl 64, id 13434, offset 0, flags [DF], length: 160) 193.123.123.86.837325379 > 193.123.123.85.2049: 132 readdirplus [|nfs] 08:02:49.369606 IP (tos 0x0, ttl 255, id 38936, offset 0, flags [+, DF], length: 1500) 193.123.123.85.2049 > 193.123.123.86.837325379: reply ok 1472 readdirp lus POST: DIR 755 ids 1104/110 [|nfs] 08:02:49.369631 IP (tos 0x0, ttl 255, id 38936, offset 1480, flags [DF], length: 116) 193.123.123.85 > 193.123.123.86: udp 08:02:52.568438 IP (tos 0x0, ttl 64, id 13435, offset 0, flags [DF], length: 160) 193.123.123.86.837325379 > 193.123.123.85.2049: 132 readdirplus [|nfs] 08:02:52.569225 IP (tos 0x0, ttl 255, id 38937, offset 0, flags [+, DF], length: 1500) 193.123.123.85.2049 > 193.123.123.86.837325379: reply ok 1472 readdirp lus POST: DIR 755 ids 1104/110 [|nfs] 08:02:52.569245 IP (tos 0x0, ttl 255, id 38937, offset 1480, flags [DF], length: 116) 193.123.123.85 > 193.123.123.86: udp ## vif="vif`xm list | grep vm3 | awk '{ print $2}'`.0" l0:~# tcpdump -vv -n -i vif2.0 host nfsserver and udp 08:03:18.118795 IP (tos 0x0, ttl 64, id 16811, offset 0, flags [DF], length: 140) 193.123.123.86.1626706499 > 193.123.123.85.2049: 112 access [|nfs] 08:03:18.119052 IP (tos 0x0, ttl 255, id 42340, offset 0, flags [DF], length: 148) 193.123.123.85.2049 > 193.123.123.86.1626706499: reply ok 120 access attr: DIR 755 ids 1104/110 [|nfs] 08:03:18.119796 IP (tos 0x0, ttl 64, id 16812, offset 0, flags [DF], length: 136) 193.123.123.86.1643483715 > 193.123.123.85.2049: 108 getattr [|nfs] 08:03:18.120072 IP (tos 0x0, ttl 255, id 42341, offset 0, flags [DF], length: 140) 193.123.123.85.2049 > 193.123.123.86.1643483715: reply ok 112 getattr REG 644 ids 1104/110 [|nfs] 08:03:18.120813 IP (tos 0x0, ttl 64, id 16813, offset 0, flags [DF], length: 136) 193.123.123.86.1660260931 > 193.123.123.85.2049: 108 getattr [|nfs] 08:03:18.121081 IP (tos 0x0, ttl 255, id 42342, offset 0, flags [DF], length: 140) 193.123.123.85.2049 > 193.123.123.86.1660260931: reply ok 112 getattr REG 644 ids 1104/110 [|nfs] 08:03:18.121790 IP (tos 0x0, ttl 64, id 16814, offset 0, flags [DF], length: 136) 193.123.123.86.1677038147 > 193.123.123.85.2049: 108 getattr [|nfs] 08:03:18.122050 IP (tos 0x0, ttl 255, id 42343, offset 0, flags [DF], length: 140) 193.123.123.85.2049 > 193.123.123.86.1677038147: reply ok 112 getattr REG 644 ids 1104/110 [|nfs] 08:03:18.122710 IP (tos 0x0, ttl 64, id 16815, offset 0, flags [DF], length: 136) 193.123.123.86.1693815363 > 193.123.123.85.2049: 108 getattr [|nfs] 08:03:18.122969 IP (tos 0x0, ttl 255, id 42344, offset 0, flags [DF], length: 140) 193.123.123.85.2049 > 193.123.123.86.1693815363: reply ok 112 getattr REG 755 ids 1104/110 [|nfs] 08:03:18.123604 IP (tos 0x0, ttl 64, id 16816, offset 0, flags [DF], length: 136) 193.123.123.86.1710592579 > 193.123.123.85.2049: 108 getattr [|nfs] 0) 193.123.123.85.2049 > 193.123.123.86.1710592579: reply ok 112 getattr REG 644 ids 1104/110 [|nfs] 08:03:18.125002 IP (tos 0x0, ttl 64, id 16817, offset 0, flags [DF], length: 136) 193.123.123.86.1727369795 > 193.123.123.85.2049: 108 getattr [|nfs] 08:03:18.125249 IP (tos 0x0, ttl 255, id 42346, offset 0, flags [DF], length: 140) 193.123.123.85.2049 > 193.123.123.86.1727369795: reply ok 112 getattr REG 644 ids 1104/110 [|nfs] 08:03:18.125899 IP (tos 0x0, ttl 64, id 16818, offset 0, flags [DF], length: 136) 193.123.123.86.1744147011 > 193.123.123.85.2049: 108 getattr [|nfs] 08:03:18.126161 IP (tos 0x0, ttl 255, id 42347, offset 0, flags [DF], length: 140) 193.123.123.85.2049 > 193.123.123.86.1744147011: reply ok 112 getattr REG 644 ids 1104/110 [|nfs] 08:03:18.126794 IP (tos 0x0, ttl 64, id 16819, offset 0, flags [DF], length: 136) 193.123.123.86.1760924227 > 193.123.123.85.2049: 108 getattr [|nfs] 08:03:18.127053 IP (tos 0x0, ttl 255, id 42348, offset 0, flags [DF], length: 140) 193.123.123.85.2049 > 193.123.123.86.1760924227: reply ok 112 getattr REG 644 ids 1104/110 [|nfs] 08:03:18.127759 IP (tos 0x0, ttl 64, id 16820, offset 0, flags [DF], length: 136) 193.123.123.86.1777701443 > 193.123.123.85.2049: 108 getattr [|nfs] 08:03:18.128021 IP (tos 0x0, ttl 255, id 42349, offset 0, flags [DF], length: 140) 193.123.123.85.2049 > 193.123.123.86.1777701443: reply ok 112 getattr REG 644 ids 1104/110 [|nfs] 08:03:18.128688 IP (tos 0x0, ttl 64, id 16821, offset 0, flags [DF], length: 136) 193.123.123.86.1794478659 > 193.123.123.85.2049: 108 getattr [|nfs] 08:03:18.128950 IP (tos 0x0, ttl 255, id 42350, offset 0, flags [DF], length: 140) 193.123.123.85.2049 > 193.123.123.86.1794478659: reply ok 112 getattr REG 644 ids 1104/110 [|nfs] 08:03:18.129660 IP (tos 0x0, ttl 64, id 16822, offset 0, flags [DF], length: 136) 193.123.123.86.1811255875 > 193.123.123.85.2049: 108 getattr [|nfs] 08:03:18.129919 IP (tos 0x0, ttl 255, id 42351, offset 0, flags [DF], length: 140) 193.123.123.85.2049 > 193.123.123.86.1811255875: reply ok 112 getattr REG 644 ids 1104/110 [|nfs] 08:03:18.131141 IP (tos 0x0, ttl 64, id 16823, offset 0, flags [DF], length: 136) 193.123.123.86.1828033091 > 193.123.123.85.2049: 108 getattr [|nfs] l1:~# tcpdump -vv -n -i eth0 host nfsserver and udp 08:03:18.118610 IP (tos 0x0, ttl 255, id 42339, offset 0, flags [DF], length: 140) 193.123.123.85.2049 > 193.123.123.86.1609929283: reply ok 112 getattr DIR 755 ids 1104/110 [|nfs] 08:03:18.118752 IP (tos 0x0, ttl 64, id 16811, offset 0, flags [DF], length: 140) 193.123.123.86.1626706499 > 193.123.123.85.2049: 112 access [|nfs] 08:03:18.119404 IP (tos 0x0, ttl 255, id 42340, offset 0, flags [DF], length: 148) 193.123.123.85.2049 > 193.123.123.86.1626706499: reply ok 120 access attr: DIR 755 ids 1104/110 [|nfs] 08:03:18.119745 IP (tos 0x0, ttl 64, id 16812, offset 0, flags [DF], length: 136) 193.123.123.86.1643483715 > 193.123.123.85.2049: 108 getattr [|nfs] 08:03:18.120688 IP (tos 0x0, ttl 64, id 16813, offset 0, flags [DF], length: 136) 193.123.123.86.1660260931 > 193.123.123.85.2049: 108 getattr [|nfs] 08:03:18.121740 IP (tos 0x0, ttl 64, id 16814, offset 0, flags [DF], length: 136) 193.123.123.86.1677038147 > 193.123.123.85.2049: 108 getattr [|nfs] 08:03:18.122663 IP (tos 0x0, ttl 64, id 16815, offset 0, flags [DF], length: 136) 193.123.123.86.1693815363 > 193.123.123.85.2049: 108 getattr [|nfs] 08:03:18.123557 IP (tos 0x0, ttl 64, id 16816, offset 0, flags [DF], length: 136) 193.123.123.86.1710592579 > 193.123.123.85.2049: 108 getattr [|nfs] 08:03:18.377483 IP (tos 0x0, ttl 64, id 16828, offset 0, flags [DF], length: 160) 193.123.123.86.1895141955 > 193.123.123.85.2049: 132 readdirplus [|nfs] 08:03:18.865407 IP (tos 0x0, ttl 64, id 16829, offset 0, flags [DF], length: 160) 193.123.123.86.1895141955 > 193.123.123.85.2049: 132 readdirplus [|nf --------------------------------------------------------------------------- - If one has very much time, then one sees also from time to time any packets in both directions.... -> udp-packets not blocked generally. - Why the knot only solved after that to remove the module ip_conntrack? - to reproduce this problem is sufficient: # modprobe ip_conntrack > > Or maybe you are trying to run iptables on domU... Please, provide this info. > unpractically. Server is in productive use. (i must also to compile modules and new a kernel and reboot all VM) regards Torsten launoc _______________________________________________ Xen-users mailing list Xen-users@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-users
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |