[SLUG] route traffic through multiple interfaces

2008-09-04 Thread Chris Zhang
Hi list,


Suppose I have two NICs on one host, NIC A and NIC B. Is it possible to get
all traffic to use A, and then route them through B, and finally to outside?
without the aid of iptables or anything similar, e.g. just changing the
routing table? Suppose ip forwarding works.


Just out of curiosity, does anyone know how iPhone restricts VOIP traffic
over 3G technically? Suppose one can make a tunnel, e.g. IPSec, PPTP (which
iPhone has native support), to a VPN endpoint, e.g. home computer through
3G. Is it possible to then run a VOIP app inside the tunnel?


Thanks,


Chris
-- 
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html


Re: [SLUG] route traffic through multiple interfaces

2008-09-04 Thread Alex Samad
On Thu, Sep 04, 2008 at 08:50:39PM +1000, Chris Zhang wrote:
 Hi list,
 
 
 Suppose I have two NICs on one host, NIC A and NIC B. Is it possible to get
 all traffic to use A, and then route them through B, and finally to outside?
 without the aid of iptables or anything similar, e.g. just changing the
 routing table? Suppose ip forwarding works.

not sure what you mean, but will take a stab

if you had 

A) eth0 192.168.1.1/24 gw 192.168.1.254
B) eth1 192.168.2.1/24 gw 192.168.2.254

you want something like

ip r a default via 192.168.2.254 src 192.168.1.1

so this say's all applications that attempt to open a socket without
binding to and address will get 192.168.1.1 (NIC A's address), but will
route out NIC B

not sure if it will work, might take a bit more work 

 
 
 Just out of curiosity, does anyone know how iPhone restricts VOIP traffic
 over 3G technically? Suppose one can make a tunnel, e.g. IPSec, PPTP (which
 iPhone has native support), to a VPN endpoint, e.g. home computer through
 3G. Is it possible to then run a VOIP app inside the tunnel?
 
 
 Thanks,
 
 
 Chris
 -- 
 SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
 Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html
 

-- 
This foreign policy stuff is a little frustrating. 

- George W. Bush
04/23/2002
as quoted by the New York Daily News


signature.asc
Description: Digital signature
-- 
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html

[SLUG] RUXCON 2008 Final Call For Papers

2008-09-04 Thread cfp
RUXCON 2008 FINAL CALL FOR PAPERS

Ruxcon would like to announce the final call for papers for the fifth annual
Ruxcon conference.

This year the conference will take place over the weekend of
29th to the 30th of November.

As with previous years, Ruxcon will be held at the University of
Technology, Sydney, Australia.

The deadline for submissions is the 15th of November.

* What is Ruxcon?

 Ruxcon strives to be Australia's most technical and interesting
 computer security conference. We're back for the fifth year
 and intend on bringing you another high quality conference.

 The conference is held over two days in a relaxed atmosphere,
 allowing attendees to enjoy themselves whilst expanding their
 knowledge of security.

 Live presentations and activities will cover a full range of
 defensive and offensive security topics, varying from unpublished
 research to required reading for the public security community.

 For more information, please visit http://www.ruxcon.org.au

* Presentation Information

 Presentations are set to run for 50 minutes, and will be of a formal
 nature, with slides and a speech.

* Presentation Submissions

 Ruxcon would like to invite people who are interested in security to
 submit a presentation.

 Topics of interest include, but are not limited to:

o Code analysis
o Exploitation techniques
o Network scanning and analysis
o Cryptography
o Malware Analysis
o Reverse engineering
o Forensics and Anti-forensics
o Social engineering
o Web application security
o Database security
o Legal aspects of computer security and surrounding issues
o Law enforcement activities
o Telecommunications security (mobile, GSM, VOIP, etc.)

 Submissions should thoroughly outline your desired presentation
 subject. Accompanying your submission should be the slides
 you intend to use or a detailed paper explaining your subject.

 If you have any enquiries about submissions, or would like to make a
 submission, please send an e-mail to presentations @ ruxcon dot org
 dot au

 The deadline for submissions is the 15th of November.

 If approved we will additionally require:

i.  A brief personal biography (between 2-5 paragraphs in
   length), including: skill set, experience, and credentials.

ii. A description on your presentation or workshop (between 2-5
paragraphs in length).

* Contact Details

Presentation Submissions:  presentations @ ruxcon dot org dot au
General Enquiries: staff @ ruxcon dot org dot au



-- 
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html


Re: [SLUG] route traffic through multiple interfaces

2008-09-04 Thread Chris Zhang
On Thu, Sep 4, 2008 at 10:49 PM, Alex Samad [EMAIL PROTECTED] wrote:

 On Thu, Sep 04, 2008 at 08:50:39PM +1000, Chris Zhang wrote:
  Hi list,
 
 
  Suppose I have two NICs on one host, NIC A and NIC B. Is it possible to
 get
  all traffic to use A, and then route them through B, and finally to
 outside?
  without the aid of iptables or anything similar, e.g. just changing the
  routing table? Suppose ip forwarding works.

 not sure what you mean, but will take a stab

 if you had

 A) eth0 192.168.1.1/24 gw 192.168.1.254
 B) eth1 192.168.2.1/24 gw 192.168.2.254

 you want something like

 ip r a default via 192.168.2.254 src 192.168.1.1


I did the aforementioned as a test, I had to remove the current gateway
before I ran this otherwise it complains about an existent route.

After this is done, I tried to access www.google.com, with 'links
www.google.com'

netstat -tapn | grep 80
tcp0  1 192.168.1.1:45154   74.125.19.99:80
SYN_SENT2132/links

'route -n' gives identical information as before.

It doesn't look like traffic is going through 192.168.2.1 first. I don't
have 192.168.1.254 as the gateway here. But it shouldn't matter, the idea is
not to pass traffic to it but pass them to 192.168.2.1 instead.

This is one step closer, at least it is using 192.168.1.1 address.


Thanks Alex.


 so this say's all applications that attempt to open a socket without
 binding to and address will get 192.168.1.1 (NIC A's address), but will
 route out NIC B

 not sure if it will work, might take a bit more work

 
 
  Just out of curiosity, does anyone know how iPhone restricts VOIP traffic
  over 3G technically? Suppose one can make a tunnel, e.g. IPSec, PPTP
 (which
  iPhone has native support), to a VPN endpoint, e.g. home computer through
  3G. Is it possible to then run a VOIP app inside the tunnel?
 
 
  Thanks,
 
 
  Chris
  --
  SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
  Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html
 

 --
 This foreign policy stuff is a little frustrating. 

- George W. Bush
 04/23/2002
 as quoted by the New York Daily News

 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.9 (GNU/Linux)

 iEYEARECAAYFAki/2UAACgkQkZz88chpJ2PEUQCfQghSOO2MtJPLOciEDdySceud
 tA4AmwThccwoS6RHR6XrPU2TKsSmCuKO
 =XaLC
 -END PGP SIGNATURE-

 --
 SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
 Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html

-- 
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html


Re: [SLUG] route traffic through multiple interfaces

2008-09-04 Thread Daniel Pittman
Chris Zhang [EMAIL PROTECTED] writes:

As Alex asked, your problem description is unclear.  Since I have some
different questions to what he asked, and you answered, I include them:

 Suppose I have two NICs on one host, NIC A and NIC B. Is it possible
 to get all traffic to use A, 

When you say to use A, what specifically do you mean:

 * to use the IP address that you assigned to NIC A[1]
 * to leave the computer and hit the wire out NIC A
 * something else?

 and then route them through B, 

My best guess here is that you expect the packet to:

 1. Exit to the wire via NIC A
 2. Return to the host via NIC B
 3. Exit to the outside world via some unmentioned, third, interface

Is that correct?

 and finally to outside?  without the aid of iptables or anything
 similar, e.g. just changing the routing table? Suppose ip forwarding
 works.

Why the restriction?

Is this, specifically, because you want to achieve some VoIP and
tunnelling related goal with the iPhone, and it only provides a standard
routing stack?

I ask, because the Linux IP stack is extremely flexible and can do a
wide range of things that a more traditional BSD stack, well, can't.


Anyway, assuming that my best guess is, in fact, correct -- which 
I think it probably is from the iPhone bit below -- then, no.

What you are asking is impossible without the addition of NAT, packet
marking, or some other method to identify the packet beyond what you get
in the standard facility.

The routing table doesn't include a lot of if for an individual
packet, and retains no state -- you can't say if this is the second
time I have seen ...


 Just out of curiosity, does anyone know how iPhone restricts VOIP
 traffic over 3G technically?

It is done for profit, and by the request of customers.  (The real
customers, the telecoms companies, not you and the other end users who
hold the physical device...)

 Suppose one can make a tunnel, e.g. IPSec, PPTP (which iPhone has
 native support), to a VPN endpoint, e.g. home computer through
 3G. Is it possible to then run a VOIP app inside the tunnel?

Not if Apple and their customers have any say in the matter, no.  Not
reliably, in the long term, because it some something other than what
Apple have approved of your doing with their iPhone.[2]

Regards,
Daniel

Footnotes: 
[1]  ...which, under Linux, is actually a property of the computer, not
 the network card, and is equally valid as an outbound address for
 any interface, technically speaking.

[2]  Since you don't actually have any particular control of the device
 I wouldn't really call you the owner of it.  You may have paid for
 it, but Apple still run the show...

-- 
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html


Re: [SLUG] route traffic through multiple interfaces

2008-09-04 Thread Daniel Pittman
Chris Zhang [EMAIL PROTECTED] writes:
 On Fri, Sep 5, 2008 at 11:16 AM, Daniel Pittman [EMAIL PROTECTED] wrote:
 Chris Zhang [EMAIL PROTECTED] writes:

 You were correct in guessing what I was after. I am trying to get VOIP
 working over 3G.

 My understanding is that there are at least two places this can be
 prevented.

 Firstly, the app(e.g. Truphone) won't let you connect unless you have
 a working WIFI connection. This is why I was asking for NATting
 possibility(I didn't describe it properly). - Assign wifi interface
 with an IP (192.168.1.1/24) and forward all traffic to 3G interface
 with a public IP.

 Since 'ipfw' won't work the way it does in a normal BSD, the only
 thing I thought would be changing the routing table, which you pointed
 out not possible.

I wouldn't expect so, but I don't know the BSD / Apple IP stack nearly
as well as the Linux stack, so it /may/ be able to implement suitable
policy routing or NAT for you...

I wouldn't hold my breath though.  Like buying a games console, Apple
products are no user serviceable parts systems: use it their way, or
face a life of hoping that you keep ahead of their efforts to stop you.

 The other place where VOIP might get blocked is from the ISP,
 e.g. filtering on 3G network. My thought was to setup a tunnel and
 encrypt VOIP inside that tunnel. It should in theory bypass ISP
 restriction shouldn't it?

Yes, assuming that they will pass the tunnelled VPN traffic.  It is
worth noting that you are probably going to be violating your
contractual agreement with the ISP at this point, and that they *will*
kick you off the contract -- or worse -- for this.

Like the device, if you really want to run VoIP from the phone it
probably pays to go ahead and find a contract that meets your needs up
front than to try an end-run around the ISP / vendor.


 Alternatively, I am not sure if VOIP works over a socks proxy. This
 requires iPhone being a socks client, which it doesn't support, nor
 have I found any thrid party apps that can do this.

Of course not -- Apple have already pulled at least one application from
their store that made the device act as a wireless to 3G router, and
have a policy that this will *not* happen.

A SOCKS proxy would face the same fate: not on the approved list, so no
ability to run it.  Look forward to breaking the security on the phone,
then watching the anti-piracy parts of Apple get nastier to what you
do, if you really intend to use this.


 Last resort would prob. be ssh tunnelling. but I doubt this would work
 since the ports VOIP uses are in 10,000 ~ 20,000 range? 

That depends on your client, but you really do *NOT* want to push UDP
over TCP, which ssh tunnelling is.

[...]

 This is the idea, except for the packets won't go out to wire. Traffic
 = NIC A's IP = NIC B's IP = NIC B's gateway. This is, as you
 pointed out, NATing, I am convinced it is not possible without
 iptables or such.

Correct: this is not something that a regular routing table can do.
There /might/ be an equivalent of the fast NAT feature of the Linux
routing table available to you, but I don't hold much hope...

Regards,
Daniel
-- 
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html