Re: [LARTC] Very sorry about the triple post (grrrr Outlook Express)

2004-01-06 Thread Steve M Bibayoff
Hello,

for the umpteen time Patrick Turley [EMAIL PROTECTED] sent:

 eom

Too bad this wasn't on the, then I could set by watch to it.

Steve

___
LARTC mailing list / [EMAIL PROTECTED]
http://mailman.ds9a.nl/mailman/listinfo/lartc HOWTO: http://lartc.org/


Re: [LARTC] GRE tunnel wierdness

2002-09-25 Thread Steve M Bibayoff

David Lamparter [EMAIL PROTECTED] wrote:

 I don't know where this ping effect comes from, 
 
 east:
 # ip tunnel add netb mode gre remote a.b.c.e local f.g.h.i ttl 255
 # ip link set netb up
 # ip addr add 192.168.0.254/32 peer 192.168.1.0/24 dev netb
 
 west:
 # ip tunnel add neta mode gre remote f.g.h.i local a.b.c.e ttl 255
 # ip link set neta up
 # ip addr add 192.168.1.254/32 peer 192.168.0.0/24 dev neta
 
 - *Or* another possibility:
 east:
 # ip tunnel add netb mode gre remote a.b.c.e local f.g.h.i ttl 255
 # ip link set netb up
 # ip addr add 192.168.2.1/30 dev netb
 # ip route add 192.168.1.0/24 via 192.168.2.2 dev netb
 
 west:
 # ip tunnel add neta mode gre remote f.g.h.i local a.b.c.e ttl 255
 # ip link set neta up
 # ip addr add 192.168.2.2/30 dev neta
 # ip route add 192.168.0.0/24 via 192.168.2.1 dev neta

Tried both of these, am still seeing this weird ping affect. If no
traffic travels over the tunnel for a while (5 minutes) I can't get
from .0/24 neta(east) to .1/24 netb(west) till after I send some traffic 
from west to east first. Once I do that, everything else works fine.

Is there soemthing, that someone could think of, that I should check?

TIA

Steve




___
LARTC mailing list / [EMAIL PROTECTED]
http://mailman.ds9a.nl/mailman/listinfo/lartc HOWTO: http://lartc.org/



Re: [LARTC] GRE tunnel wierdness

2002-09-25 Thread Steve M Bibayoff

David Lamparter [EMAIL PROTECTED] wrote:

 Do you have NAT / mangling / etc. running somewhere? The connection 
 tracking timeout is 500 s afaik, maybe GRE is NATed on one of your 
 gateways?
 A possible explanation would be that east does SNAT on GRE packets 
 or 
 west does DNAT on GRE ... so when east tries to reach west, the 
 packet 
 is SNAT'ed or DNAT'ed and therefore doesn't reach west, but when 
 west 
 tries to reach east, connection tracking information is set up on 
 both 
 routers so it works ... until the timeout expires.

That's is it. It actually happens when going from west to east, I just
never noticed it before.

Thanks for the clue.

Steve

ps. I know this isn't the appropiate list, but could someone see what
iptable rule needs to be changed to make this not happen(rules generated
from script found at: http://www.asgardsrealm.net/linux/firewall ).

[root@east root]# iptables -L
Chain INPUT (policy DROP)
target prot opt source   destination 
ACCEPT ipv6-auth--  anywhere anywhere   
ACCEPT ipv6-crypt--  anywhere anywhere   
ACCEPT icmp --  anywhere anywhere   
ACCEPT all  --  anywhere anywhere   state
RELATED,ESTABLISHED 
ACCEPT all  --  east.somenet.comeast.somenet.com  
ACCEPT tcp  --  anywhere anywhere   tcp dpt:http 
ACCEPT udp  --  anywhere anywhere   udp dpt:http 
ACCEPT tcp  --  anywhere anywhere   tcp
dpt:re-mail-ck 
ACCEPT udp  --  anywhere anywhere   udp
dpt:re-mail-ck 
ACCEPT tcp  --  anywhere anywhere   tcp dpt:51 
ACCEPT udp  --  anywhere anywhere   udp dpt:51 
ACCEPT tcp  --  anywhere anywhere   tcp dpt:47 
ACCEPT udp  --  anywhere anywhere   udp dpt:47 
ACCEPT udp  --  anywhere anywhere   udp dpt:isakmp 
ACCEPT tcp  --  anywhere anywhere   tcp dpt:ssh 
ACCEPT tcp  --  anywhere anywhere   tcp dpt:smtp 
ACCEPT tcp  --  anywhere anywhere   tcp dpt:http 
ACCEPT tcp  --  anywhere anywhere   tcp dpt:https 
ACCEPT all  --  anywhere anywhere   
LOGall  --  anywhere anywhere   LOG level
info prefix `FIREWALL: Filter-INPUT ' 

Chain FORWARD (policy DROP)
target prot opt source   destination 
ACCEPT all  --  192.168.1.0/24   192.168.0.0/24 
ACCEPT all  --  192.168.0.0/24   192.168.1.0/24 
ACCEPT all  --  anywhere anywhere   state
RELATED,ESTABLISHED 
ACCEPT all  --  192.168.2.0/24   anywhere   
ACCEPT all  --  192.168.1.0/24   anywhere   
ACCEPT all  --  192.168.0.0/24   anywhere   
LOGall  --  anywhere anywhere   LOG level
info prefix `FIREWALL: Filter-FORWARD ' 

Chain OUTPUT (policy DROP)
target prot opt source   destination 
ACCEPT all  --  anywhere anywhere   state
RELATED,ESTABLISHED 
ACCEPT all  --  192.168.0.0/24   anywhere   
ACCEPT all  --  192.168.1.0/24   anywhere   
ACCEPT all  --  192.168.2.0/24   anywhere   
ACCEPT all  --  east.somenet.comeast.somenet.com  
ACCEPT all  --  anywhere anywhere   
ACCEPT all  --  somenet.com somenet.com   
LOGall  --  anywhere anywhere   LOG level
info prefix `FIREWALL: Filter-OUTPUT ' 

___
LARTC mailing list / [EMAIL PROTECTED]
http://mailman.ds9a.nl/mailman/listinfo/lartc HOWTO: http://lartc.org/



[LARTC] GRE tunnel wierdness

2002-09-24 Thread Steve M Bibayoff

I haveing something wierd going on, can't seem to figure why. I have two
private networks (neta  netb), being masq'ed behind RH 7.3
machines(east  west). I also have iptables running on both machines. I
could ping from west to east anytime with no problem, but when I try to
ping from east to west, it doesn't go through unless I first ping from
west to east (hoepfully this is understandable the way I'm descibing
it). Here is my setup:
   --      --
neta---|east|---|dsl router|--internet---|dsl router|--|west|--netb
   --      --

internal infaces on linux boxes eth0 on x.x.x.1neta=192.168.0.0/24
netb=192.168.1.0/24ip rules on east:
# ip tunnel add netb mode gre remote a.b.c.e local f.g.h.i ttl 255
# ip link set netb up arp on
# ip addr add 192.168.0.254/24 dev netb
# ip route add 192.168.1.0/24 dev netb
ip rules on west:
# ip tunnel add neta mode gre remote f.g.h.i local a.b.c.e ttl 255
# ip link set neta up arp on
# ip addr add 192.168.1.254/24 dev neta
# ip route add 192.168.0.0/24 dev neta
[east]# route -n
Kernel IP routing table
DestinationGatewayGenmask Flags Metric RefUse Iface
a.b.c.w0.0.0.0255.255.255.248 U 0  00 eth0
192.168.1.00.0.0.0255.255.255.0   U 0  00 netb
192.168.0.00.0.0.0255.255.255.0   U 0  00 eth1
192.168.0.00.0.0.0255.255.255.0   U 0  00 netb
127.0.0.0  0.0.0.0255.0.0.0   U 0  00 lo
0.0.0.0a.b.c.x0.0.0.0 UG0  00 eth0
[west]# route -n
Kernel IP routing table
DestinationGatewayGenmask Flags Metric RefUse Iface
f.g.h.y0.0.0.0255.255.255.248 U 0  00 eth0
192.168.1.00.0.0.0255.255.255.0   U 0  00 eth1
192.168.1.00.0.0.0255.255.255.0   U 0  00 neta
192.168.0.00.0.0.0255.255.255.0   U 0  00 neta
127.0.0.0  0.0.0.0255.0.0.0   U 0  00 lo
0.0.0.0f.g.h.z0.0.0.0 UG0  00 eth0
Iptables are the same on both boxes except on east I open allow ports 25
80 443 and specifically block port 1003.

If I'm listening on west at neta when I first try to ping anyone on
netb, nothing is coming though unless I have just pinged from netb to
neta first.

Hopefully this isn't too confusing or long winded.

TIA

Steve


___
LARTC mailing list / [EMAIL PROTECTED]
http://mailman.ds9a.nl/mailman/listinfo/lartc HOWTO: http://lartc.org/