Mike,

Thanks for the rapid reply! I'd like to say I'm a big fan of your Linux 
Firewalls book. I have learned so much about network security from this book. 
Well done.

> On Mar 22, 2013, Will D. Spann wrote: >> I've been trying out the --NAT-local 
> functionality with v2.0.3 (on Linux 
>> Mint) & v2.0.0-rc1 (on OpenWRT), and I've observed that 
>> ENABLE_IPT_FORWARDING 
>> must be enabled in fwknopd.conf, otherwise the FWKNOP_PREROUTING chain is 
>> not 
>> created in the 'nat' table (under iptables). This seems to effectively 
>> prevent --NAT-local usage from working at all, as the necessary DNAT rule is 
>> not generated.
>> 
>> From my reading of the fwknopd documentation, it seems that having 
>> ENABLE_IPT_LOCAL_NAT enabled should be sufficient to enable --NAT-local 
>> functionality. (I understand that ENABLE_IPT_FORWARDING is required forĀ 
>> --NAT-access access to machines behind the firewall running fwknopd.) Am I 
>> misunderstanding the meaning of these options, or could this be a bug? I 
>> have 
>> not yet tested this in v2.0.4, but I didn't find any mention of this problem 
>> in the changelog.
> Indeed the ENABLE_IPT_FORWARDING config is required for all NAT
> operations, and here is the relevant code:
> http://www.cipherdyne.org/cgi-bin/gitweb.cgi?p=fwknop.git;a=blob;f=server/incoming_spa.c;h=67929c20a36956fc54391ab0d3b15c25f540e2ae;hb=7bd0da29c42768ca5a8f48a8d1813c12dff363d4#l649
>  > The server is written to be restrictive in terms of what clients can
> request, and in this case even though --NAT-local implies that the local
> system running fwknopd is being accessed, the NAT table must be interacted
> with and therefore ENABLE_IPT_FORWARDING must be enabled.  It's sort of
> the general gate to determine whether any NAT capabilities are offered to
> valid SPA clients.

Ah, thanks for clarifying. I didn't realize ENABLE_IPT_LOCAL_NAT was dependent 
on ENABLE_IPT_FORWARDING. I suppose this makes sense, as you point out that in 
both
--NAT-local & --NAT-access usages iptables' 'nat' table needs to be modified to 
add the DNAT rule.
> One thing that will be changing in future releases is that more NAT
> capabilities will be integrated with the access.conf file in order to
> offer more granular control on a per access stanza basis.

That would be a terrific feature. It would be nice to be able to allow 
--NAT-local access, but disallow NAT forwarding access. Is this currently 
possible, on a global basis?

In particular, I'd like to use the ghost service approach (w/ --NAT-port) for 
one service (nice blog article btw), and the --NAT-rand-port functionality for 
another, where both services are running on the firewall. However, I don't need 
to support forwarding to any servers behind the firewall, since I am using a 
VPN for that, and would actually prefer to disallow this if possible.
> Thanks, > --Mike

Thanks,

--
Will D. Spann
W. Spann Systems Consulting

P.S., I've recently started following the fwknop project on GitHub. I think the 
HMAC functionality you're currently adding will be a great addition. Also, the 
support for randomly-generated Rijndael keys will be a nice security 
enhancement. I'm looking forward to the v2.5 release. >> Thanks,
>> 
>> Will D. Spann
------------------------------------------------------------------------------
Everyone hates slow websites. So do we.
Make your web apps faster with AppDynamics
Download AppDynamics Lite for free today:
http://p.sf.net/sfu/appdyn_d2d_mar
_______________________________________________
Fwknop-discuss mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/fwknop-discuss

Reply via email to