Hi,

I use shorewall 5.0.15.6 on Debian Stretch in a dual stack setup. On a reugular 
basis, I get a bunch of the following messages in my log files (my shorewall 
log prefix is just FW):
kernel: [102654.492757] FW:FORWARD:REJECT:IN=ppp0 OUT=ppp0 MAC= 
SRC=2001:4ca0:0108:0042:0000:0080:0006:0009 
DST=2001:14c9:1131:1320:8b80:2765:3c6a:2f19 LEN=80 TC=0 HOPLIMIT=244 FLOWLBL=0 
PROTO=TCP SPT=50625 DPT=80 WINDOW=65535 RES=0x00 SYN URGP=0
The destination ports and protocols vary, but these packets actually all come 
from the same network.

Now, can understand why these packets are rejected. The prefix in DST actually 
matches my IPv6 prefix which is assigned to the interface ppp0, but the 
interface identifier doesn't. And routing back through the same interface is 
neither desired nor allowed on my network:

The relevant lines in shorewall6/interfaces and shorewall6/policy look like 
this:
  shorewall6/interfaces:
  net     ppp0            
dhcp,accept_ra=2,tcpflags,nosmurfs,rpfilter,sourceroute=0

  shorewall6/policy:
  $FW             net             ACCEPT
  [...]
  net             all             DROP
  # THE FOLLOWING POLICY MUST BE LAST
  all             all             REJECT          info

So basically, these packets hit the all-all reject policy. What I would like to 
do however, is to drop these packets without logging (and I do not want to 
change my default policy for that). How can I match these packets? I have tried 
several approaches that all didn't work:

1) I added a policy that said:
  net             net             DROP
Didn't work and also should be redundant due to the net-all drop rule.

2) I added rules in shorewall6/rules to match the source of the traffic (which 
are servers by a university in Munich that try to map/scan the IPv6 address 
space):
  DROP:none    net:[2001:4ca0:108:42::]/64     all     tcp     80
  DROP:none    net:[2001:4ca0:108:42::]/64     all     tcp     443
  DROP:none    net:[2001:4ca0:108:42::]/64     all     udp     443
  DROP:none    net:[2001:4ca0:108:42::]/64     all     udp     53
  DROP:none    net:[2001:4ca0:108:42::]/64     all     ipv6-icmp       128
I tried it in both ?SECTION NEW as well as ?SECTION ALL - didn't work.

3) I tried adding the source of these packets to my blacklist rules 
(shorewall6/blrules) in the same manner, and still they'd show up in my logs.


So, I'm lost here. *Is it possible to somehow match these packets in order to 
drop them silently?* My preference would be to simply drop all packets coming 
from the net zone that would be forwarded back through the same interface. But 
if I have to specify the source, that would be ok as well.

For reference I also include my traffic dispositions and log levels from my 
shorewall6 configuration file:
  grep -e LOG_LEVEL -e DISPOSITION shorewall6/shorewall6.conf
  BLACKLIST_LOG_LEVEL=info
  INVALID_LOG_LEVEL=
  MACLIST_LOG_LEVEL=info
  RELATED_LOG_LEVEL=
  RPFILTER_LOG_LEVEL=none
  SFILTER_LOG_LEVEL=info
  SMURF_LOG_LEVEL=info
  TCP_FLAGS_LOG_LEVEL=info
  UNTRACKED_LOG_LEVEL=
  BLACKLIST_DISPOSITION=DROP
  INVALID_DISPOSITION=CONTINUE
  MACLIST_DISPOSITION=REJECT
  RELATED_DISPOSITION=ACCEPT
  SFILTER_DISPOSITION=DROP
  RPFILTER_DISPOSITION=DROP
  SMURF_DISPOSITION=DROP
  TCP_FLAGS_DISPOSITION=DROP
  UNTRACKED_DISPOSITION=CONTINUE

I'd aprreciate if someone could point me in the right direction on how to get 
rid of these log messages. Thank you!


Best regards,

Timo


_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to