Hi Tom,

I've reproduced the issue with TCPdump running on Windows server in loc
(192.168.1.0/24) and remote client (with IP 192.168.200.32).
The client with working CIFS is also in loc (192.168.1.0/24).
I have not configured a new zone or anything else related to the VPN
connection.

Here's the dump from client:
thomas@pc5-desktop:~$ sudo tcpdump -i eth0 -n -s0  host win10 and port 445
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
00:16:15.249437 IP 192.168.200.32.60098 > 192.168.1.123.445: Flags [S],
seq 3478483138, win 29200, options [mss 1460,sackOK,TS val 681979375 ecr
0,nop,wscale 7], length 0
00:16:16.277772 IP 192.168.200.32.60098 > 192.168.1.123.445: Flags [S],
seq 3478483138, win 29200, options [mss 1460,sackOK,TS val 681980404 ecr
0,nop,wscale 7], length 0
00:16:18.293764 IP 192.168.200.32.60098 > 192.168.1.123.445: Flags [S],
seq 3478483138, win 29200, options [mss 1460,sackOK,TS val 681982420 ecr
0,nop,wscale 7], length 0

And this is the dump from Windows server:
c:\Users\thomas\Downloads>windump -D
1.\Device\NPF_{85F60C6D-9764-410D-B8D6-C492F4C80984} (Red Hat)

c:\Users\thomas\Downloads>WinDump.exe -i 1 -n -s 0 port 445
WinDump.exe: listening on \Device\NPF_{85F60C6D-9764-410D-B8D6-C492F4C80984}
00:16:16.277567 IP 192.168.200.32.60098 > 192.168.1.123.445: S
3478483138:3478483138(0) win 29200 <mss 1382,sackOK,timestamp 681979375
0,nop,wscale 7>
00:16:17.299901 IP 192.168.200.32.60098 > 192.168.1.123.445: S
3478483138:3478483138(0) win 29200 <mss 1382,sackOK,timestamp 681980404
0,nop,wscale 7>
00:16:19.315761 IP 192.168.200.32.60098 > 192.168.1.123.445: S
3478483138:3478483138(0) win 29200 <mss 1382,sackOK,timestamp 681982420
0,nop,wscale 7>

I have also reconfigured /etc/shorewall/policy as follows:
#SOURCE DEST    POLICY  LOG LEVEL       BURST:LIMIT
net     all     DROP    info
loc     all     REJECT  warning
fb      dmz     REJECT  warning
fb      loc     REJECT  warning
dmz     all     REJECT  warning
vpn     all     REJECT  warning
$FW     all     ACCEPT
# THE FOLLOWING POLICY MUST BE LAST
all     all     REJECT  info


What else would be needed for error analysis?

THX


Am 11.02.2018 um 20:31 schrieb Tom Eastep:
> On 02/11/2018 06:19 AM, Thomas wrote:
>> Hi,
>>
>> I have a working Shorewall firewall connection.
>> Just recently I setup a VPN connection between two FRITZ!Box networks
>> <https://en.avm.de/service/fritzbox/fritzbox-7390/knowledge-base/publication/show/5_Setting-up-a-VPN-connection-between-two-FRITZ-Box-networks/>:
>> netA + netB
>> Hereby I can connect to a PC in netB from any PC in netA using SSH.
>> However, I cannot connect to a Windows server in netB from a PC in netA
>> using Samba CIFS.
>>
>> I have created a TCPdump on Windows server when trying to establish
>> connection from client: /tcpdump_cifs_server_failure.txt/
>>
>> And I have created a TCPdump on the Linux client (in netA) when trying
>> to establish connection: /tcpdump_cifs_client.txt/
>>
>> In addition I have created shorewall dump and attached to this email.
>>
>> To verify if the CIFS connection is working, I connected from client in
>> netB to Windows server, and this was successfull. The relevant TCPdump
>> is attached, too: /tcpdump_cifs_server_working.txt/
>>
>> My assumption was that Shorewall is filtering CIFS (port 445), but I'm
>> not sure how to verify this.
>> Is it necessary to define rules for to connect to servers in netB?
> In general, if the applicable Shorewall policy is not ACCEPT, then
> rules must be specified to allow *ANY* traffic to be passed through
> a Shorewall-based firewall.
>
>> Please advise how to proceed here for solving this issue?
> There are a couple of unknowns in this problem report:
>
> a) You don't mention how the client and server relate to the Shorewall
>    box. In other words, in which zone is the client and in which zone
>    is the server?
>
> b) The tcpdumps didn't specify the -n option, so rather than IP
>    addresses, the dumps contain DNS names. Consequently they aren't
>    helpful in answering the question in a), and from a troubleshooting
>    point of view, they are not helpful.
>
> Your Shorewall configuration has REJECT policies that don't specify a
> log level. There are a large number of connections being rejected, but
> we can't see what those connections are because they are not being
> logged. That is probably not relevant in this case, as the tcpdump in
> tcpdump_cifs_server_failure.txt suggests that the SYN packets are being
> dropped rather than rejected. The packets that the dump shows being
> dropped are broadcast packets, which indicates to me that it is not the
> Shorewall-generated ruleset that is dropping the packets (assuming that
> you tried to connect after the rulset was reset ( 4. Feb 15:07:50 CET
> 2018) and when the Shorewall dump was taken (4. Feb 15:07:49 CET 2018).
>
> -Tom
>
>
> ------------------------------------------------------------------------------
> Check out the vibrant tech community on one of the world's most
> engaging tech sites, Slashdot.org! http://sdm.link/slashdot
>
>
> _______________________________________________
> Shorewall-users mailing list
> Shorewall-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/shorewall-users

Attachment: signature.asc
Description: OpenPGP digital signature

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to