OpenVZ Forum


Home » Mailing lists » Users » Netfilter connection tracking not working in VE?
Netfilter connection tracking not working in VE? [message #28042] Thu, 06 March 2008 09:44 Go to next message
Frederik is currently offline  Frederik
Messages: 5
Registered: November 2007
Junior Member
Hi,

I am using Shorewall to set up a firewall in a VE. Now the problem is 
that outgoing connections do not work, although I accept traffic from the 
firewall to the network zone. I contacted the shorewall developer, and he 
took a look at my configuration and he thinks that something is going 
wrong in the kernel's connection tracking system. It seems indeed the 
incoming packets responding to the outgoing packets, do not match the 
state RELATED,ESTABLISHED rules which should accept them. Disabling the 
firewall in the VE, or creating rules which accept the incoming packets, 
makes it work, but of course this should not be necessary with the 
RELATED,ESTABLISHED rule.

Some information on the hardware host (running Debian Lenny):
http://artipc10.vub.ac.be/openvz/hnode.txt

And on the VE (running Debian Etch):
http://artipc10.vub.ac.be/openvz/ve.txt

As you can see in the shorewall show output, no packets matched the 
RELATED,ESTABLISHED rule in the net2fw rule, but instead packets are 
matched by the fallback rule forwarding them to the Drop chain, and they 
eventually seem to be dropped in the DropInvalid chain because of state 
INVALID.

There's a Shorewall firewall on the hardware host too, but that one 
accepts all relevant traffic: everything works with the firewall on the 
hardware node enabled and the firewall in the VE disabled.

A related question, where can I find the logs of the firewall in the VE? 
dmesg in the VE is empty and nothing is logged in /var/log, while the 
logs in the hardware node only seem to reflect the firewall on the 
hardware node.

-- 
Frederik
Re: Netfilter connection tracking not working in VE? [message #28043 is a reply to message #28042] Thu, 06 March 2008 11:21 Go to previous messageGo to next message
lst_hoe01 is currently offline  lst_hoe01
Messages: 15
Registered: February 2007
Junior Member
Zitat von Frederik <freggy@gmail.com>:

> Hi,
>
> I am using Shorewall to set up a firewall in a VE. Now the problem is
> that outgoing connections do not work, although I accept traffic from the
> firewall to the network zone. I contacted the shorewall developer, and he
> took a look at my configuration and he thinks that something is going
> wrong in the kernel's connection tracking system. It seems indeed the
> incoming packets responding to the outgoing packets, do not match the
> state RELATED,ESTABLISHED rules which should accept them. Disabling the
> firewall in the VE, or creating rules which accept the incoming packets,
> makes it work, but of course this should not be necessary with the
> RELATED,ESTABLISHED rule.
>
> Some information on the hardware host (running Debian Lenny):
> http://artipc10.vub.ac.be/openvz/hnode.txt
>
> And on the VE (running Debian Etch):
> http://artipc10.vub.ac.be/openvz/ve.txt
>
> As you can see in the shorewall show output, no packets matched the
> RELATED,ESTABLISHED rule in the net2fw rule, but instead packets are
> matched by the fallback rule forwarding them to the Drop chain, and they
> eventually seem to be dropped in the DropInvalid chain because of state
> INVALID.
>
> There's a Shorewall firewall on the hardware host too, but that one
> accepts all relevant traffic: everything works with the firewall on the
> hardware node enabled and the firewall in the VE disabled.
>
> A related question, where can I find the logs of the firewall in the VE?
> dmesg in the VE is empty and nothing is logged in /var/log, while the
> logs in the hardware node only seem to reflect the firewall on the
> hardware node.

The available features of iptables depend on the kernel modules  
loaded. By default it is not possible to load additional kernel  
modules on demand inside the VE. Older kernels even need to enable  
firewall inside the VE to get it work but i don't know for which  
version this have changed. So double check if the necessary modules  
are loaded at startup and if the kernel log /proc/kmesg is available  
inside the VE.

Regards

Andreas


-- 
All your trash belong to us ;-)  www.spamschlucker.org
To: stephan@spamschlucker.org
Re: Netfilter connection tracking not working in VE? [message #28044 is a reply to message #28043] Thu, 06 March 2008 11:43 Go to previous message
Frederik is currently offline  Frederik
Messages: 5
Registered: November 2007
Junior Member
On Thu, 06 Mar 2008 12:21:03 +0100, MailingListe wrote:

>> As you can see in the shorewall show output, no packets matched the
>> RELATED,ESTABLISHED rule in the net2fw rule, but instead packets are
>> matched by the fallback rule forwarding them to the Drop chain, and
>> they eventually seem to be dropped in the DropInvalid chain because of
>> state INVALID.
 
> The available features of iptables depend on the kernel modules loaded.
> By default it is not possible to load additional kernel modules on
> demand inside the VE. Older kernels even need to enable firewall inside
> the VE to get it work but i don't know for which version this have
> changed. So double check if the necessary modules are loaded at startup

I think shorewall checks this at start-up, and AFAIK this looks good.

>From /var/log/shorewall-init.log on VE:
Shorewall has detected the following iptables/netfilter capabilities:
   NAT: Not available
   Packet Mangling: Available
   Multi-port Match: Available
   Extended Multi-port Match: Available
   Connection Tracking Match: Available
   Packet Type Match: Available
   Policy Match: Available
   Physdev Match: Available
   Physdev-is-bridged Support: Available
   Packet length Match: Available
   IP range Match: Available
   Recent Match: Available
   Owner Match: Available
   Ipset Match: Not available
   CONNMARK Target: Available
   Extended CONNMARK Target: Available
   Connmark Match: Available
   Extended Connmark Match: Available
   Raw Table: Not available
   IPP2P Match: Not available
   CLASSIFY Target: Available
   Extended REJECT: Available
   Repeat match: Available
   MARK Target: Available
   Extended MARK Target: Available
   Mangle FORWARD Chain: Available
   Comments: Available
   Address Type Match: Available
   TCPMSS Match: Available
   Hashlimit Match: Available
   NFQUEUE Target: Available


> and if the kernel log /proc/kmesg is available inside the VE.

It exists:
# ls -lh /proc/kmsg 
-r-------- 1 root root 0 Mar  6 12:28 /proc/kmsg

klogd is started, but I cannot find anything in the logs when nmapping 
the host.

Actually now I found out why looking at the shorewall show output after 
nampping: when the firewall is enabled, all packets which are correctly 
dropped, are not dropped (and hence logged) because of my shorewall 
policy, but because they end up matching the state INVALID rule, which 
drops without logging. So this is actually exactly the same problem as 
above.

-- 
Frederik
Previous Topic: openvz support for 2.4.21-47.EL
Next Topic: RE: MedHelp 7988156
Goto Forum:
  


Current Time: Fri Sep 13 13:19:18 GMT 2024

Total time taken to generate the page: 0.07589 seconds