> > > On 12/22/19 2:08 PM, Markus Reitschuster wrote: >> Hi all, > >> I have a bridged firewall and am unable to ssh from the privileged >> part into the unprivileged part. > >> I am trying to configure shorewall on a device (nano) that bridges >> 2 parts of my local network - 'ofen' and 'tech'. turris is my >> router to the internet. Shorewall is running on 'nano'. nano has a >> bridge br0 between eth0 (connected to the switch connecting to >> turris and all other devices on 'ofen') and wlan0 (hostapd >> running, offering the 'tech' network) > >> tech <-> nano <-> ofen <-> turris <-> inet > >> clients that connect to 'tech' are using the DNS and DHCP from the >> 'ofen' network. Both networks use the same subnet. I added rules >> allowing DNS and DHCP in /etc/shorewall/rules - this works. Iin >> general connections originating from tech targeting ofen should be >> dropped. Connections from ofen to tech should be accepted. >> Background is that in tech I put some devices that I do not > want to >> let phone home, e.g. IP cam that I still want to access from my >> computer. The policy file is quite simple: > >> ofen all ACCEPT debug all fw >> ACCEPT fw all ACCEPT all all > REJECT >> debug > >> nano is running armbian (based on Ubuntu Bionic) with shorewall >> 5.1.12.2 and a 4.4 kernel for rk3399 chipset. > >> When trying to ssh from a member of ofen (192.168.1.239) to a >> member of tech (192.1688.1.247) I get the following in the >> logfile: Dec 22 22:50:36 localhost kernel: [ 6426.160957] > ofen-tech >> ACCEPT IN=br0 OUT=br0 PHYSIN=eth0 PHYSOUT=wlan0 >> MAC=b8:27:eb:25:63:bd:d4:3d > > :7e:f6:78:26:08:00:45:00:00:3c:7d:d7:40:00:40:06:37:ae:c0:a8:01:ef:c0:a8:01:f7:91:28:00:16:83:65:82:7d:00:00:00:00:a0:02:fa:f0:c8:da:0 > > > 0:00:02:04:05:b4:04:02:08:0a:9c:ed:ca:ee SRC=192.168.1.239 >> DST=192.168.1.247 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=32215 DF >> PROTO=TCP SP T=37160 DPT=22 WINDOW=64240 RES=0x00 SYN URGP=0 > Dec 22 >> 22:50:36 localhost kernel: [ 6426.173197] tech-ofen REJECT IN=br0 >> OUT=br0 PHYSIN=wlan0 PHYSOUT=eth0 MAC=d4:3d:7e:f6:78:26:b8:27 >> :eb:25:63:bd:08:00 SRC=192.168.1.247 DST=192.168.1.239 LEN=60 >> TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=TCP SPT=22 DPT=37160 >> WINDOW=2896 0 RES=0x00 ACK SYN URGP=0 Dec 22 22:50:38 localhost >> kernel: [ 6428.176904] ofen-tech ACCEPT IN=br0 OUT=br0 PHYSIN=eth0 >> PHYSOUT=wlan0 MAC=b8:27:eb:25:63:bd:d4:3d > > :7e:f6:78:26:08:00:45:00:00:3c:7d:d8:40:00:40:06:37:ad:c0:a8:01:ef:c0:a8:01:f7:91:28:00:16:83:65:82:7d:00:00:00:00:a0:02:fa:f0:c0:fa:0 > > > 0:00:02:04:05:b4:04:02:08:0a:9c:ed:d2:ce SRC=192.168.1.239 >> DST=192.168.1.247 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=32216 DF >> PROTO=TCP SP T=37160 DPT=22 WINDOW=64240 RES=0x00 SYN URGP=0 > Dec 22 >> 22:50:38 localhost kernel: [ 6428.191862] tech-ofen REJECT IN=br0 >> OUT=br0 PHYSIN=wlan0 PHYSOUT=eth0 MAC=d4:3d:7e:f6:78:26:b8:27 >> :eb:25:63:bd:08:00 SRC=192.168.1.247 DST=192.168.1.239 LEN=60 >> TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=TCP SPT=22 DPT=37160 >> WINDOW=2896 0 RES=0x00 ACK SYN URGP=0 > >> Similar things happen if I put up an apache2 on a member of 'tech' >> and try to access it from 'ofen'. It was my understanding that > with >> the above policy bidirectional connections can be established, if >> they are initiated by a member of subzone ofen. But it seems I am >> either missing a piece of the puzzle or having a major >> misunderstanding in how networking works. > >> Regards & Happy Holidays > > In shorewall.conf, what is the RELATED_DISPOSITION setting? And > do you > have entries in the RELATED section of the rules file? >
It looks like you didn't answer to Tom's question (bottom of this e-mail), in general a rule in the rules file need to be use to open port (SSH in this case. For connection issue we will need a dump file collected as described at (1). 1) https://shorewall.org/support.htm#Guidelines -Matt -- Matt Darfeuille _______________________________________________ Shorewall-users mailing list Shorewall-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/shorewall-users