> On 01/05/2018 03:02 PM, Colony.three via Shorewall-users wrote:
>
>> On 01/05/2018 02:25 PM, Colony.three via Shorewall-users wrote:
>>
>>> I'm trying to change the listening port of Libreswan using these DNAT
>>> entries in rules:
>>> DNAT            net             local:192.168.1.16:500  udp  -
>>> 5500   &eth0
>>> DNAT            net             local:192.168.1.16  udp
>>> ipsec-nat-t  -
>>> &eth0
>>> ... but this results in the below DROPS.  Rather than forwarding the
>>> packets to that IP:port, it blocks them as destined for the $FW.  I
>>> don't understand why?  IPSEC connects fine when I don't try to change
>>> port 500.
>>> Also can I combine these two DNAT lines?  Or would that push
>>> everything
>>> into 500?
>>> [53533.057543] Shorewall:net-fw:DROP:IN=eth0 OUT=
>>> MAC=52:54:00:e6:0a:80:f6:b5:2f:a2:db:8e:08:00 SRC=172.58.46.201
>>> DST=50.35.109.212 LEN=736 TOS=0x00 PREC=0x00 TTL=55 ID=11170 DF
>>> PROTO=UDP SPT=20563 DPT=65500 LEN=716
>>> [53534.973338] Shorewall:net-fw:DROP:IN=eth0 OUT=
>>> MAC=52:54:00:e6:0a:80:f6:b5:2f:a2:db:8e:08:00 SRC=172.58.46.201
>>> DST=50.35.109.212 LEN=736 TOS=0x00 PREC=0x00 TTL=55 ID=11171 DF
>>> PROTO=UDP SPT=20563 DPT=65500 LEN=716
>>> [53537.760649] Shorewall:net-fw:DROP:IN=eth0 OUT=
>>> MAC=52:54:00:e6:0a:80:f6:b5:2f:a2:db:8e:08:00 SRC=172.58.46.201
>>> DST=50.35.109.212 LEN=736 TOS=0x00 PREC=0x00 TTL=55 ID=11172 DF
>>> PROTO=UDP SPT=20563 DPT=65500 LEN=716
>>> [53541.706546] Shorewall:net-fw:DROP:IN=eth0 OUT=
>>> MAC=52:54:00:e6:0a:80:f6:b5:2f:a2:db:8e:08:00 SRC=172.58.46.201
>>> DST=50.35.109.212 LEN=736 TOS=0x00 PREC=0x00 TTL=55 ID=11173 DF
>>> PROTO=UDP SPT=20563 DPT=65500 LEN=716
>>>
>>>
>>> Install the conntrack utility and run 'conntrack -F' and try again.
>>>
>>> -Tom
>>
>> Thanks, but same DROPs.  conntrack -F seemed to just hang, but when I
>> added the tables 'conntrack' and 'expect', it flushed immediately.
>> [56184.041321] Shorewall:net-fw:DROP:IN=eth0 OUT=
>> MAC=52:54:00:e6:0a:80:f6:b5:2f:a2:db:8e:08:00 SRC=172.58.46.201
>> DST=50.35.109.212 LEN=736 TOS=0x00 PREC=0x00 TTL=55 ID=11427 DF
>> PROTO=UDP SPT=3196 DPT=5500 LEN=716
>> [56185.906421] Shorewall:net-fw:DROP:IN=eth0 OUT=
>> MAC=52:54:00:e6:0a:80:f6:b5:2f:a2:db:8e:08:00 SRC=172.58.46.201
>> DST=50.35.109.212 LEN=736 TOS=0x00 PREC=0x00 TTL=55 ID=11428 DF
>> PROTO=UDP SPT=3196 DPT=5500 LEN=716
>> [56188.729401] Shorewall:net-fw:DROP:IN=eth0 OUT=
>> MAC=52:54:00:e6:0a:80:f6:b5:2f:a2:db:8e:08:00 SRC=172.58.46.201
>> DST=50.35.109.212 LEN=736 TOS=0x00 PREC=0x00 TTL=55 ID=11429 DF
>> PROTO=UDP SPT=3196 DPT=5500 LEN=716
>
> The DESTINATION port is 5500, not the SOURCE port. So your rules need:
>
> DNAT net local:192.168.1.16:500 udp 5500 - &eth0
>
> DNAT net local:192.168.1.16 udp ipsec-nat-t - &eth0
>
> -Tom

Ah, so true.  Now no more firewall messages, neither at the router nor the 
gateway, but still no connect with the changed port, but connect with 500.  
Nothing in /var/log/messages, and the only indication is in /var/log/secure . 
(below)

I don't hope for help from you with Libreswan -- you've been more than generous 
with the (undeserving) Strongswan.  But if you see what might be wrong, input 
is appreciated.

/var/log/secure
Jan  5 15:28:41 zeta pluto[54167]: packet from 172.58.46.194:42614: length of 
ISAKMP Message is smaller than minimum
Jan  5 15:28:41 zeta pluto[54167]: packet from 172.58.46.194:42614: Received 
packet with mangled IKE header - dropped
Jan  5 15:28:43 zeta pluto[54167]: packet from 172.58.46.194:42614: length of 
ISAKMP Message is smaller than minimum
Jan  5 15:28:43 zeta pluto[54167]: packet from 172.58.46.194:42614: Received 
packet with mangled IKE header - dropped
Jan  5 15:28:46 zeta pluto[54167]: packet from 172.58.46.194:42614: length of 
ISAKMP Message is smaller than minimum
Jan  5 15:28:46 zeta pluto[54167]: packet from 172.58.46.194:42614: Received 
packet with mangled IKE header - dropped
Jan  5 15:28:50 zeta pluto[54167]: packet from 172.58.46.194:42614: length of 
ISAKMP Message is smaller than minimum
Jan  5 15:28:50 zeta pluto[54167]: packet from 172.58.46.194:42614: Received 
packet with mangled IKE header - dropped
Jan  5 15:28:55 zeta pluto[54167]: packet from 172.58.46.194:42614: length of 
ISAKMP Message is smaller than minimum
Jan  5 15:28:55 zeta pluto[54167]: packet from 172.58.46.194:42614: Received 
packet with mangled IKE header - dropped
Jan  5 15:31:54 zeta pluto[54167]: packet from 172.58.43.178:19924: length of 
ISAKMP Message is smaller than minimum
Jan  5 15:31:54 zeta pluto[54167]: packet from 172.58.43.178:19924: Received 
packet with mangled IKE header - dropped
Jan  5 15:31:55 zeta pluto[54167]: packet from 172.58.43.178:19924: length of 
ISAKMP Message is smaller than minimum
Jan  5 15:31:55 zeta pluto[54167]: packet from 172.58.43.178:19924: Received 
packet with mangled IKE header - dropped
Jan  5 15:31:58 zeta pluto[54167]: packet from 172.58.43.178:19924: length of 
ISAKMP Message is smaller than minimum
Jan  5 15:31:58 zeta pluto[54167]: packet from 172.58.43.178:19924: Received 
packet with mangled IKE header - dropped
Jan  5 15:32:02 zeta pluto[54167]: packet from 172.58.43.178:19924: length of 
ISAKMP Message is smaller than minimum
Jan  5 15:32:02 zeta pluto[54167]: packet from 172.58.43.178:19924: Received 
packet with mangled IKE header - dropped
Jan  5 15:32:08 zeta pluto[54167]: packet from 172.58.43.178:19924: length of 
ISAKMP Message is smaller than minimum
Jan  5 15:32:08 zeta pluto[54167]: packet from 172.58.43.178:19924: Received 
packet with mangled IKE header - dropped

I have no idea what 172.58.43.178 is... certainly not my phone's Ip.  Must be 
some kind of TMobile interlocutor.
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to