ipfw divert but no packet payload?

2004-05-12 Thread Tom R. no spam
I've followed the divert and ipfw manpages, Stevens _Unix
Network Programming_  etc, Baldine's Feb 2000 Divert
Sockets mini-HOWTO at www.tldp.org/HOWTO, and everything
else I could find (not very much exactly about this, tho).

My situation is:
  firewall:  have ipfw divert portnum rule for port 80 out
  user program:  recvfrom() on a raw socket bound to portnum

My question is:  whether I should expect to be able to get
the full packet including data payload for a packet diverted
to port portnum ?  I want to be able to inspect the packet
content before it is sent out.  Right now my user code just
prints the packet, then does sendto() back to the raw socket
to send the packet on its way, but there is no data payload.
Everything I've seen about divert seems clearly to expect the
full data payload to be available to whatever is receiving
from the raw socket.

Web browsing works,  tcpdump shows full packets, but I can't
see any data payload in the user program.  User prog can read
the ip header length, tcp header length, and full ip packet
length from the packet (20, 40, and 60 respectively, after
converting to bytes).  Per the 60, packet seems to be saying
there *isn't* any data payload, only the 20+40 header bytes.
The recvfrom() memory buffer argument is 2048 bytes long, and
I can printout all its many 0 bytes after the headers.  I
understand tcpdump uses the bsd packet filter to get merely a
copy of the packet, but the full packets are getting to where
they're addressed somehow because browsing is working, and
tcpdump is showing packet sizes like 467, etc.  ipfw -a list
shows the same divert packet count as how many my user program
sees, and byte count == (60 * pkt count).  (Tho a couple of
early runs, before I did full printouts and had settled on
simple ipfw rules, had occasional 44 byte recvfrom() returns
and ipfw packet sizes mixed in with the 60 byte returns/sizes.)

Any suggestions would be very appreciated.

(I'm using FreeBSD as Mac OSX 10.2.8, which has shown no
strangeness other than a couple of odd console.log alerts
relating to unrecognized ipfw rules while I was fiddling
with my own ipfw preparing for trying the divert stuff.)
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]


RE: ipfw divert but no packet payload?

2004-05-12 Thread Tom R. no spam
Here's the ipfw -a list content at the start.  I
run a shell script manually to set these, it starts
with a flush then adds rules.  The keep-state are
leftover from studying dynamic rule creation.  (FWIW,
Mac OSX 10.2.8 seemed on brief review not to use a
3000 check-state I originally was trying.)

2000 - 2040 are stock OSX, 4010 - 4030 are mine,
4040 - end are stock OSX.
--

02000  allow ip from any to any via lo*
02010  deny ip from 127.0.0.0/8 to any in
02020  deny ip from any to 127.0.0.0/8 in
02030  deny ip from 224.0.0.0/3 to any in
02040  deny tcp from any to 224.0.0.0/3 in
04010  allow udp from me to any 53 keep-state out
04020  divert 55374 tcp from me to any 80 out
04030  allow tcp from me to any keep-state out setup
04040  allow tcp from any to any established
12190  deny tcp from any to any
65535  allow ip from any to any
--

On Wed, 12 May 2004, JJB wrote:

 Post you ipfw rules so people can see what you are talking about.

 -Original Message-

 I've followed the divert and ipfw manpages, Stevens _Unix
 Network Programming_  etc, Baldine's Feb 2000 Divert
 Sockets mini-HOWTO at www.tldp.org/HOWTO, and everything
 else I could find (not very much exactly about this, tho).

 My situation is:
   firewall:  have ipfw divert portnum rule for port 80 out
   user program:  recvfrom() on a raw socket bound to portnum

 My question is:  whether I should expect to be able to get
 the full packet including data payload for a packet diverted
 to port portnum ?  I want to be able to inspect the packet
 content before it is sent out.  Right now my user code just
 prints the packet, then does sendto() back to the raw socket
 to send the packet on its way, but there is no data payload.
 Everything I've seen about divert seems clearly to expect the
 full data payload to be available to whatever is receiving
 from the raw socket.

 Web browsing works,  tcpdump shows full packets, but I can't
 see any data payload in the user program.  User prog can read
 the ip header length, tcp header length, and full ip packet
 length from the packet (20, 40, and 60 respectively, after
 converting to bytes).  Per the 60, packet seems to be saying
 there *isn't* any data payload, only the 20+40 header bytes.
 The recvfrom() memory buffer argument is 2048 bytes long, and
 I can printout all its many 0 bytes after the headers.  I
 understand tcpdump uses the bsd packet filter to get merely a
 copy of the packet, but the full packets are getting to where
 they're addressed somehow because browsing is working, and
 tcpdump is showing packet sizes like 467, etc.  ipfw -a list
 shows the same divert packet count as how many my user program
 sees, and byte count == (60 * pkt count).  (Tho a couple of
 early runs, before I did full printouts and had settled on
 simple ipfw rules, had occasional 44 byte recvfrom() returns
 and ipfw packet sizes mixed in with the 60 byte returns/sizes.)

 Any suggestions would be very appreciated.

 (I'm using FreeBSD as Mac OSX 10.2.8, which has shown no
 strangeness other than a couple of odd console.log alerts
 relating to unrecognized ipfw rules while I was fiddling
 with my own ipfw preparing for trying the divert stuff.)
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to [EMAIL PROTECTED]