On 01/06/2018 04:07 PM, Colony.three via Shorewall-users wrote:
> 
> 
> 
> 
>> -------- Original Message --------
>> Subject: Re: [Shorewall-users] IPSec Tunneling
>> Local Time: January 5, 2018 3:41 PM
>> UTC Time: January 5, 2018 11:41 PM
>> From: colony.th...@protonmail.ch
>> To: Shorewall Users <shorewall-users@lists.sourceforge.net>
>>
>>
>>> On 01/05/2018 03:02 PM, Colony.three via Shorewall-users wrote:
>>>
>>>     On 01/05/2018 02:25 PM, Colony.three via Shorewall-users wrote:
>>>
>>>         |I'm trying to change the listening port of Libreswan using
>>>         these DNAT entries in rules: DNAT            net            
>>>         local:192.168.1.16:500  udp  -  5500   &eth0 DNAT           
>>>         net             local:192.168.1.16  udp  ipsec-nat-t  - 
>>>         &eth0 ... but this results in the below DROPS.  Rather than
>>>         forwarding the packets to that IP:port, it blocks them as
>>>         destined for the $FW.  I don't understand why?  IPSEC
>>>         connects fine when I don't try to change port 500. Also can I
>>>         combine these two DNAT lines?  Or would that push everything
>>>         into 500? [53533.057543] Shorewall:net-fw:DROP:IN=eth0 OUT=
>>>         MAC=52:54:00:e6:0a:80:f6:b5:2f:a2:db:8e:08:00
>>>         SRC=172.58.46.201 DST=50.35.109.212 LEN=736 TOS=0x00
>>>         PREC=0x00 TTL=55 ID=11170 DF PROTO=UDP SPT=20563 DPT=65500
>>>         LEN=716 [53534.973338] Shorewall:net-fw:DROP:IN=eth0 OUT=
>>>         MAC=52:54:00:e6:0a:80:f6:b5:2f:a2:db:8e:08:00
>>>         SRC=172.58.46.201 DST=50.35.109.212 LEN=736 TOS=0x00
>>>         PREC=0x00 TTL=55 ID=11171 DF PROTO=UDP SPT=20563 DPT=65500
>>>         LEN=716 [53537.760649] Shorewall:net-fw:DROP:IN=eth0 OUT=
>>>         MAC=52:54:00:e6:0a:80:f6:b5:2f:a2:db:8e:08:00
>>>         SRC=172.58.46.201 DST=50.35.109.212 LEN=736 TOS=0x00
>>>         PREC=0x00 TTL=55 ID=11172 DF PROTO=UDP SPT=20563 DPT=65500
>>>         LEN=716 [53541.706546] Shorewall:net-fw:DROP:IN=eth0 OUT=
>>>         MAC=52:54:00:e6:0a:80:f6:b5:2f:a2:db:8e:08:00
>>>         SRC=172.58.46.201 DST=50.35.109.212 LEN=736 TOS=0x00
>>>         PREC=0x00 TTL=55 ID=11173 DF PROTO=UDP SPT=20563 DPT=65500
>>>         LEN=716   Install the conntrack utility and run 'conntrack
>>>         -F' and try again.   -Tom |
>>>
>>>     Thanks, but same DROPs.  conntrack -F seemed to just hang, but when I
>>>     added the tables 'conntrack' and 'expect', it flushed immediately.
>>>     [56184.041321] Shorewall:net-fw:DROP:IN=eth0 OUT=
>>>     MAC=52:54:00:e6:0a:80:f6:b5:2f:a2:db:8e:08:00 SRC=172.58.46.201
>>>     DST=50.35.109.212 LEN=736 TOS=0x00 PREC=0x00 TTL=55 ID=11427 DF
>>>     PROTO=UDP SPT=3196 DPT=5500 LEN=716
>>>     [56185.906421] Shorewall:net-fw:DROP:IN=eth0 OUT=
>>>     MAC=52:54:00:e6:0a:80:f6:b5:2f:a2:db:8e:08:00 SRC=172.58.46.201
>>>     DST=50.35.109.212 LEN=736 TOS=0x00 PREC=0x00 TTL=55 ID=11428 DF
>>>     PROTO=UDP SPT=3196 DPT=5500 LEN=716
>>>     [56188.729401] Shorewall:net-fw:DROP:IN=eth0 OUT=
>>>     MAC=52:54:00:e6:0a:80:f6:b5:2f:a2:db:8e:08:00 SRC=172.58.46.201
>>>     DST=50.35.109.212 LEN=736 TOS=0x00 PREC=0x00 TTL=55 ID=11429 DF
>>>     PROTO=UDP SPT=3196 DPT=5500 LEN=716
>>>
>>>
>>>      
>>>      
>>>     The DESTINATION port is 5500, not the SOURCE port. So your rules
>>>     need:
>>>      
>>>     DNAT net local:192.168.1.16:500 udp 5500 - &eth0
>>>     DNAT net local:192.168.1.16 udp ipsec-nat-t - &eth0
>>>      
>>>     -Tom
>>>
>>
>> Ah, so true.  Now no more firewall messages, neither at the router nor
>> the gateway, but still no connect with the changed port, but connect
>> with 500.  Nothing in /var/log/messages, and the only indication is in
>> /var/log/secure . (below)
>>
>> I don't hope for help from you with Libreswan -- you've been more than
>> generous with the (undeserving) Strongswan.  But if you see what might
>> be wrong, input is appreciated.
>>
>>
>> /var/log/secure
>> Jan  5 15:28:41 zeta pluto[54167]: packet from 172.58.46.194:42614:
>> length of ISAKMP Message is smaller than minimum
>> Jan  5 15:28:41 zeta pluto[54167]: packet from 172.58.46.194:42614:
>> Received packet with mangled IKE header - dropped
>> Jan  5 15:28:43 zeta pluto[54167]: packet from 172.58.46.194:42614:
>> length of ISAKMP Message is smaller than minimum
>> Jan  5 15:28:43 zeta pluto[54167]: packet from 172.58.46.194:42614:
>> Received packet with mangled IKE header - dropped
>> Jan  5 15:28:46 zeta pluto[54167]: packet from 172.58.46.194:42614:
>> length of ISAKMP Message is smaller than minimum
>> Jan  5 15:28:46 zeta pluto[54167]: packet from 172.58.46.194:42614:
>> Received packet with mangled IKE header - dropped
>> Jan  5 15:28:50 zeta pluto[54167]: packet from 172.58.46.194:42614:
>> length of ISAKMP Message is smaller than minimum
>> Jan  5 15:28:50 zeta pluto[54167]: packet from 172.58.46.194:42614:
>> Received packet with mangled IKE header - dropped
>> Jan  5 15:28:55 zeta pluto[54167]: packet from 172.58.46.194:42614:
>> length of ISAKMP Message is smaller than minimum
>> Jan  5 15:28:55 zeta pluto[54167]: packet from 172.58.46.194:42614:
>> Received packet with mangled IKE header - dropped
>> Jan  5 15:31:54 zeta pluto[54167]: packet from 172.58.43.178:19924:
>> length of ISAKMP Message is smaller than minimum
>> Jan  5 15:31:54 zeta pluto[54167]: packet from 172.58.43.178:19924:
>> Received packet with mangled IKE header - dropped
>> Jan  5 15:31:55 zeta pluto[54167]: packet from 172.58.43.178:19924:
>> length of ISAKMP Message is smaller than minimum
>> Jan  5 15:31:55 zeta pluto[54167]: packet from 172.58.43.178:19924:
>> Received packet with mangled IKE header - dropped
>> Jan  5 15:31:58 zeta pluto[54167]: packet from 172.58.43.178:19924:
>> length of ISAKMP Message is smaller than minimum
>> Jan  5 15:31:58 zeta pluto[54167]: packet from 172.58.43.178:19924:
>> Received packet with mangled IKE header - dropped
>> Jan  5 15:32:02 zeta pluto[54167]: packet from 172.58.43.178:19924:
>> length of ISAKMP Message is smaller than minimum
>> Jan  5 15:32:02 zeta pluto[54167]: packet from 172.58.43.178:19924:
>> Received packet with mangled IKE header - dropped
>> Jan  5 15:32:08 zeta pluto[54167]: packet from 172.58.43.178:19924:
>> length of ISAKMP Message is smaller than minimum
>> Jan  5 15:32:08 zeta pluto[54167]: packet from 172.58.43.178:19924:
>> Received packet with mangled IKE header - dropped
>>
>>
>> I have no idea what 172.58.43.178 is... certainly not my phone's Ip. 
>> Must be some kind of TMobile interlocutor.
> 
> 
> On the router I'm seeing the IPSec packets coming in -- or what appear
> to be, as they're on the port I've substituted:
> 
> # tcpdump 'udp port 5500 and (((ip[2:2] - ((ip[0]&0xf)<<2)) -
> ((udp[12]&0xf0)>>2)) != 0)'
> tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
> listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
> 15:53:15.393979 IP 172.58.43.174.qdb2service >
> draco.darkmatter.org.5500: UDP, length 708
> 15:53:17.299826 IP 172.58.43.174.qdb2service >
> draco.darkmatter.org.5500: UDP, length 708
> 15:53:20.099326 IP 172.58.43.174.qdb2service >
> draco.darkmatter.org.5500: UDP, length 708
> 15:53:24.051977 IP 172.58.43.174.qdb2service >
> draco.darkmatter.org.5500: UDP, length 708
> 15:53:29.637394 IP 172.58.43.174.qdb2service >
> draco.darkmatter.org.5500: UDP, length 708
> ^C
> 5 packets captured
> 5 packets received by filter
> 0 packets dropped by kernel
> 
> 
> Then on the IPSec gateway I seem to also be seeing those packets:
> 
> # tcpdump 'udp port 500 and (((ip[2:2] - ((ip[0]&0xf)<<2)) -
> ((udp[12]&0xf0)>>2)) != 0)'
> tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
> listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
> 15:58:13.722242 IP 172.58.43.174.41546 > zeta.darkmtter.org.isakmp: isakmp:
> 15:58:15.627860 IP 172.58.43.174.41546 > zeta.darkmtter.org.isakmp: isakmp:
> 15:58:18.429562 IP 172.58.43.174.41546 > zeta.darkmtter.org.isakmp: isakmp:
> 15:58:22.346575 IP 172.58.43.174.41546 > zeta.darkmtter.org.isakmp: isakmp:
> 15:58:27.960118 IP 172.58.43.174.41546 > zeta.darkmtter.org.isakmp: isakmp:
> ^C
> 5 packets captured
> 5 packets received by filter
> 0 packets dropped by kernel
> 
> 
> But Libreswan never sees them -- there is no recognition of any packets
> in /var/log/messages.  And in /var/log/secure:
> 
> Jan  6 15:59:50 zeta pluto[1991]: packet from 172.58.43.174:32544:
> Received packet with mangled IKE header - dropped
> Jan  6 15:59:52 zeta pluto[1991]: packet from 172.58.43.174:32544:
> length of ISAKMP Message is smaller than minimum
> Jan  6 15:59:52 zeta pluto[1991]: packet from 172.58.43.174:32544:
> Received packet with mangled IKE header - dropped
> Jan  6 15:59:55 zeta pluto[1991]: packet from 172.58.43.174:32544:
> length of ISAKMP Message is smaller than minimum
> Jan  6 15:59:55 zeta pluto[1991]: packet from 172.58.43.174:32544:
> Received packet with mangled IKE header - dropped
> Jan  6 15:59:59 zeta pluto[1991]: packet from 172.58.43.174:32544:
> length of ISAKMP Message is smaller than minimum
> Jan  6 15:59:59 zeta pluto[1991]: packet from 172.58.43.174:32544:
> Received packet with mangled IKE header - dropped
> Jan  6 16:00:04 zeta pluto[1991]: packet from 172.58.43.174:32544:
> length of ISAKMP Message is smaller than minimum
> Jan  6 16:00:04 zeta pluto[1991]: packet from 172.58.43.174:32544:
> Received packet with mangled IKE header - dropped
> Jan  6 16:00:06 zeta pluto[1991]: packet from 172.58.43.174:32544:
> length of ISAKMP Message is smaller than minimum
> Jan  6 16:00:06 zeta pluto[1991]: packet from 172.58.43.174:32544:
> Received packet with mangled IKE header - dropped
> 
> So the UDP packets are getting torn up in the process of converting from
> port 5500 to 500.  This is the DNAT I'm using in rules:
> 
> DNAT            net             local:192.168.111.16:500 udp 5500 -    &eth0
> DNAT            net             local:192.168.111.16 udp ipsec-nat-t - 
> &eth0
> 
> It works fine and I connect with no trouble when I don't try to change
> the port.   But when I try to change the port it will not connect.
> 

Then don't change the port.

-Tom
-- 
Tom Eastep        \   Q: What do you get when you cross a mobster with
Shoreline,         \     an international standard?
Washington, USA     \ A: Someone who makes you an offer you can't
http://shorewall.org \   understand
                      \_______________________________________________

Attachment: signature.asc
Description: OpenPGP digital signature

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to