OpenVZ Forum


Home » Mailing lists » Users » Netfilter connection tracking not working in VE?
Re: Netfilter connection tracking not working in VE? [message #28043 is a reply to message #28042] Thu, 06 March 2008 11:21 Go to previous messageGo to previous message
lst_hoe01 is currently offline  lst_hoe01
Messages: 15
Registered: February 2007
Junior Member
Zitat von Frederik <freggy@gmail.com>:

> Hi,
>
> I am using Shorewall to set up a firewall in a VE. Now the problem is
> that outgoing connections do not work, although I accept traffic from the
> firewall to the network zone. I contacted the shorewall developer, and he
> took a look at my configuration and he thinks that something is going
> wrong in the kernel's connection tracking system. It seems indeed the
> incoming packets responding to the outgoing packets, do not match the
> state RELATED,ESTABLISHED rules which should accept them. Disabling the
> firewall in the VE, or creating rules which accept the incoming packets,
> makes it work, but of course this should not be necessary with the
> RELATED,ESTABLISHED rule.
>
> Some information on the hardware host (running Debian Lenny):
> http://artipc10.vub.ac.be/openvz/hnode.txt
>
> And on the VE (running Debian Etch):
> http://artipc10.vub.ac.be/openvz/ve.txt
>
> As you can see in the shorewall show output, no packets matched the
> RELATED,ESTABLISHED rule in the net2fw rule, but instead packets are
> matched by the fallback rule forwarding them to the Drop chain, and they
> eventually seem to be dropped in the DropInvalid chain because of state
> INVALID.
>
> There's a Shorewall firewall on the hardware host too, but that one
> accepts all relevant traffic: everything works with the firewall on the
> hardware node enabled and the firewall in the VE disabled.
>
> A related question, where can I find the logs of the firewall in the VE?
> dmesg in the VE is empty and nothing is logged in /var/log, while the
> logs in the hardware node only seem to reflect the firewall on the
> hardware node.

The available features of iptables depend on the kernel modules  
loaded. By default it is not possible to load additional kernel  
modules on demand inside the VE. Older kernels even need to enable  
firewall inside the VE to get it work but i don't know for which  
version this have changed. So double check if the necessary modules  
are loaded at startup and if the kernel log /proc/kmesg is available  
inside the VE.

Regards

Andreas


-- 
All your trash belong to us ;-)  www.spamschlucker.org
To: stephan@spamschlucker.org
 
Read Message
Read Message
Read Message
Previous Topic: openvz support for 2.4.21-47.EL
Next Topic: RE: MedHelp 7988156
Goto Forum:
  


Current Time: Tue Oct 15 17:22:20 GMT 2024

Total time taken to generate the page: 0.04820 seconds