[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-users] IPtables "ctstate RELATED,ESTABLISHED" are not working



Maik Brauer writes:
 > after installing XEN 3.0.4-1 and setting up iptables for that, I've some 
 > problems with the ctstate traffic, which is
 > blocked from IPtables. Below a short printout is available from my 
 > /var/log/kern.log:
 > --------
 > May 13 17:05:13 debian4 kernel: IN=eth0 OUT= PHYSIN=peth0 PHYSOUT=vif0.0 
 > MAC=00:13:8f:0f:5b:c7:00:04:0e:66:da:c8:08:00 SRC=172.16.76.15 
 > DST=172.16.76.99 LEN=117 TOS=0x00 PREC=0x00 TTL=64 ID=2091 PROTO=UDP 
 > SPT=53 DPT=32769 LEN=97

I recently upgraded to Xen 3.0.4-1, and encountered the same (or very similar)
problem.

May 13 12:51:25 elysium INPUT IN=eth0 OUT= PHYSIN=peth0 PHYSOUT=vif0.0
MAC=00:0f:ea:43:13:6a:00:14:bf:94:c1:0f:08:00 SRC=199.7.66.1 DST=10.137.1.1
LEN=268 TOS=0x00 PREC=0x00 TTL=58 ID=62618 DF PROTO=UDP SPT=53 DPT=33689 LEN=248

My firewall rules are automatically generated (from a Haskell script), and
worked fine with the earlier version of Xen. The rules are a bit lengthy, so I
have appended a cut-down version of them at the end of this message (the omitted
rules deal with other ports, which should be irrelevant).

 > So to avoid that the firewall will block the traffic though the bridge I 
 > can use the command:
 > 
 > sysctl -w net.bridge.bridge-nf-call-iptables="0"

This also restores traffic for me - thank you.

 > which is working. Then everthing is fine. But this is not the real 
 > solution. It should work without this.
 > So my question is now, did I forget something or is this a known bug in XEN.

I have the same question.

 > Is anybody who is sharing this problem with me

I think I am.

Tim

---

Chain INPUT (policy ACCEPT 507 packets, 83922 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       tcp  --  any    any     anywhere             anywhere    
        tcp flags:FIN,SYN,RST,PSH,ACK,URG/FIN,SYN,RST,PSH,ACK,URG 
    0     0 DROP       tcp  --  any    any     anywhere             anywhere    
        tcp flags:FIN,SYN,RST,PSH,ACK,URG/FIN,SYN,RST,ACK,URG 
    0     0 DROP       tcp  --  any    any     anywhere             anywhere    
        tcp flags:FIN,SYN,RST,PSH,ACK,URG/FIN,PSH,URG 
    0     0 DROP       tcp  --  any    any     anywhere             anywhere    
        tcp flags:FIN,SYN,RST,PSH,ACK,URG/NONE 
    0     0 DROP       tcp  --  any    any     anywhere             anywhere    
        tcp flags:SYN,RST/SYN,RST 
    0     0 DROP       tcp  --  any    any     anywhere             anywhere    
        tcp flags:FIN,SYN/FIN,SYN 
 7129 2290K ACCEPT     all  --  any    any     anywhere             anywhere    
        state RELATED,ESTABLISHED 
    2   264 ACCEPT     tcp  --  eth0   any     anywhere             anywhere    
        tcp dpt:ssh limit: avg 3/sec burst 5 
    0     0 ACCEPT     tcp  --  eth0   any     anywhere             anywhere    
        tcp dpt:domain limit: avg 3/sec burst 5 
   68  4154 ACCEPT     udp  --  eth0   any     anywhere             anywhere    
        udp dpt:domain limit: avg 3/sec burst 5 
  266 15992 ACCEPT     all  --  lo     any     anywhere             anywhere    
        /* Accept everything on loop back (lo) */ 
    3   252 ACCEPT     icmp --  any    any     anywhere             anywhere    
        icmp echo-reply limit: avg 3/sec burst 5 
    1    88 ACCEPT     icmp --  any    any     anywhere             anywhere    
        icmp destination-unreachable limit: avg 3/sec burst 5 
    1    84 ACCEPT     icmp --  any    any     anywhere             anywhere    
        icmp echo-request limit: avg 3/sec burst 5 
    0     0 ACCEPT     icmp --  any    any     anywhere             anywhere    
        icmp time-exceeded limit: avg 3/sec burst 5 
   90 15357 LOG        all  --  any    any     anywhere             anywhere    
        LOG level warning prefix `INPUT ' 
   90 15357 DROP       all  --  any    any     anywhere             anywhere    
        

Chain FORWARD (policy ACCEPT 823 packets, 631K bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 DROP       tcp  --  any    any     anywhere             anywhere    
        tcp flags:FIN,SYN,RST,PSH,ACK,URG/FIN,SYN,RST,PSH,ACK,URG 
    0     0 DROP       tcp  --  any    any     anywhere             anywhere    
        tcp flags:FIN,SYN,RST,PSH,ACK,URG/FIN,SYN,RST,ACK,URG 
    0     0 DROP       tcp  --  any    any     anywhere             anywhere    
        tcp flags:FIN,SYN,RST,PSH,ACK,URG/FIN,PSH,URG 
    0     0 DROP       tcp  --  any    any     anywhere             anywhere    
        tcp flags:FIN,SYN,RST,PSH,ACK,URG/NONE 
    0     0 DROP       tcp  --  any    any     anywhere             anywhere    
        tcp flags:SYN,RST/SYN,RST 
    0     0 DROP       tcp  --  any    any     anywhere             anywhere    
        tcp flags:FIN,SYN/FIN,SYN 
  139 20954 ACCEPT     all  --  any    any     anywhere             anywhere    
        state RELATED,ESTABLISHED 
   44  3112 ACCEPT     all  --  any    any     anywhere             anywhere    
        PHYSDEV match --physdev-in vif0.0 
    0     0 ACCEPT     all  --  any    any     anywhere             anywhere    
        PHYSDEV match --physdev-in rat.0 
    0     0 ACCEPT     all  --  any    any     anywhere             anywhere    
        PHYSDEV match --physdev-in rat.0 
    0     0 ACCEPT     all  --  any    any     anywhere             anywhere    
        PHYSDEV match --physdev-in pro.0 
    0     0 ACCEPT     tcp  --  any    any     anywhere             anywhere    
        tcp dpt:ssh PHYSDEV match --physdev-out vif0.0 limit: avg 3/sec burst 5 
    0     0 ACCEPT     tcp  --  any    any     anywhere             anywhere    
        tcp dpt:domain PHYSDEV match --physdev-out vif0.0 limit: avg 3/sec 
burst 5 
    1    57 ACCEPT     udp  --  any    any     anywhere             anywhere    
        udp dpt:domain PHYSDEV match --physdev-out vif0.0 limit: avg 3/sec 
burst 5 
    0     0 ACCEPT     tcp  --  any    any     anywhere             anywhere    
        tcp dpt:ssh PHYSDEV match --physdev-out rat.0 limit: avg 3/sec burst 5 
    0     0 ACCEPT     tcp  --  any    any     anywhere             anywhere    
        tcp dpt:ssh PHYSDEV match --physdev-out pro.0 limit: avg 3/sec burst 5 
    0     0 ACCEPT     icmp --  any    any     anywhere             anywhere    
        icmp echo-reply limit: avg 3/sec burst 5 
    0     0 ACCEPT     icmp --  any    any     anywhere             anywhere    
        icmp destination-unreachable limit: avg 3/sec burst 5 
    3   252 ACCEPT     icmp --  any    any     anywhere             anywhere    
        icmp echo-request limit: avg 3/sec burst 5 
    0     0 ACCEPT     icmp --  any    any     anywhere             anywhere    
        icmp time-exceeded limit: avg 3/sec burst 5 
    9  1161 LOG        all  --  any    any     anywhere             anywhere    
        LOG level warning prefix `FORWARD ' 
    9  1161 DROP       all  --  any    any     anywhere             anywhere    
        

Chain OUTPUT (policy ACCEPT 470 packets, 560K bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
 7819 4710K ACCEPT     all  --  any    any     anywhere             anywhere    
        

_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.