On 6/26/20 6:37 AM, Vieri Di Paola wrote:
> Hi,
> 
> It seems I can't access an RDP service (3389) on a host with IP
> address 10.215.246.24 from an openvpn client with IP address
> 192.168.146.98.
> Accessing the same RDP server from another client works fine.
> 
> I'm not sure it's a firewall issue because I see this:
> 
> # tcpdump -n -i tun146 port 3389 and host 192.168.146.98
> dropped privs to tcpdump
> tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
> listening on tun146, link-type RAW (Raw IP), capture size 262144 bytes
> 09:12:10.665880 IP 192.168.146.98.51811 > 10.215.246.24.3389: Flags
> [S], seq 1273664527, win 64240, options [mss 1357,nop,wscale
> 8,nop,nop,sackOK], length 0
> 09:12:10.666468 IP 10.215.246.24.3389 > 192.168.146.98.51811: Flags
> [S.], seq 1353116740, ack 1273664528, win 64240, options [mss
> 1460,nop,wscale 0,nop,nop,sackO
> K], length 0
> 09:12:10.781841 IP 192.168.146.98.51811 > 10.215.246.24.3389: Flags
> [.], ack 1, win 1028, length 0
> 09:12:10.784384 IP 192.168.146.98.51811 > 10.215.246.24.3389: Flags
> [P.], seq 1:20, ack 1, win 1028, length 19
> 09:12:10.784868 IP 10.215.246.24.3389 > 192.168.146.98.51811: Flags
> [P.], seq 1:20, ack 20, win 64221, length 19
> 09:12:10.886544 IP 192.168.146.98.51811 > 10.215.246.24.3389: Flags
> [R.], seq 20, ack 20, win 0, length 0
> 09:12:19.496402 IP 192.168.146.98.51812 > 10.215.246.24.3389: Flags
> [S], seq 3446290954, win 64240, options [mss 1357,nop,wscale
> 8,nop,nop,sackOK], length 0
> 09:12:19.496955 IP 10.215.246.24.3389 > 192.168.146.98.51812: Flags
> [S.], seq 1218676088, ack 3446290955, win 64240, options [mss
> 1460,nop,wscale 0,nop,nop,sackO
> K], length 0
> 09:12:19.588388 IP 192.168.146.98.51812 > 10.215.246.24.3389: Flags
> [.], ack 1, win 1028, length 0
> 09:12:19.588423 IP 192.168.146.98.51812 > 10.215.246.24.3389: Flags
> [P.], seq 1:20, ack 1, win 1028, length 19
> 09:12:19.903475 IP 192.168.146.98.51812 > 10.215.246.24.3389: Flags
> [P.], seq 1:20, ack 1, win 1028, length 19
> 09:12:20.252426 IP 192.168.146.98.51812 > 10.215.246.24.3389: Flags
> [P.], seq 1:20, ack 1, win 1028, length 19
> 09:12:20.852404 IP 192.168.146.98.51812 > 10.215.246.24.3389: Flags
> [P.], seq 1:20, ack 1, win 1028, length 19
> 09:12:22.065761 IP 192.168.146.98.51812 > 10.215.246.24.3389: Flags
> [P.], seq 1:20, ack 1, win 1028, length 19
> 09:12:24.480485 IP 192.168.146.98.51812 > 10.215.246.24.3389: Flags
> [P.], seq 1:20, ack 1, win 1028, length 19
> 09:12:29.286545 IP 192.168.146.98.51812 > 10.215.246.24.3389: Flags
> [P.], seq 1:20, ack 1, win 1028, length 19
> 09:12:38.898649 IP 192.168.146.98.51812 > 10.215.246.24.3389: Flags
> [R.], seq 20, ack 1, win 0, length 0
> 
> Do you see anything in the shorewall dump that might suggest a FW issue?
> 
> https://drive.google.com/file/d/1zpinkAFYA8BnaiQ4--YhRxGOKDq559kD/view?usp=sharing
> 

The only thing that I see in the dump is that you are dropping TCP 3389
ESTABLISHED packets not marked with value 0xa; that might be the issue

-Tom
-- 
Tom Eastep        \ Q: What do you get when you cross a mobster
Shoreline,         \    with an international standard?
Washington, USA     \ A: Someone who makes you an offer you
http://shorewall.org \    can't understand
                      \________________________________________

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to