On 11/14/18 12:29 AM, Vieri Di Paola wrote:
> On Wed, Nov 14, 2018 at 12:53 AM Tom Eastep <teas...@shorewall.net> wrote:
>> Because you have given interface enp8s5 an IP address and have assigned
>> it to the dmz zone, and your rules allow ping from dmz -> fw. The bridge
>> configuration never comes into play. In a valid bridge configuration,
>> the bridge port interfaces have no IP configuration and are only defined
>> to Shorewall as bport interfaces.
> You lost me there.
>
> As far as I can tell, I haven't set any IP address to enp8s5 or
> assigned it to the dmz zone.
> Here's what I have in my interfaces file:
>
> dmz     enp5s0         routeback,dhcp,proxyarp=1
> dmzx    br0             bridge,dhcp,proxyarp=1
> dmz0    br0:enp8s5              routeback
> dmz1    br0:enp8s5_1            routeback
> dmz11   br0:enp8s5_11   routeback
>
> Also, this is my network configuration which is the same as the one
> reported in the SW dump:
>
> # ip addr show enp8s5
> 8: enp8s5: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel
> master br0 state UP group default qlen 1000
>     link/ether 00:e3:c0:5f:81:5d brd ff:ff:ff:ff:ff:ff
>     inet6 fe80::2e3:c0ff:fe5f:815d/64 scope link
>        valid_lft forever preferred_lft forever
> # ip addr show enp8s5_1
> 60: enp8s5_1@enp8s5: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc
> noqueue master br0 state UP group default qlen 1000
>     link/ether 00:e3:c0:5f:81:5d brd ff:ff:ff:ff:ff:ff
>     inet6 fe80::2e3:c0ff:fe5f:815d/64 scope link
>        valid_lft forever preferred_lft forever
> # ip addr show enp8s5_11
> 61: enp8s5_11@enp8s5: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc
> noqueue master br0 state UP group default qlen 1000
>     link/ether 00:e3:c0:5f:81:5d brd ff:ff:ff:ff:ff:ff
>     inet6 fe80::2e3:c0ff:fe5f:815d/64 scope link
>        valid_lft forever preferred_lft forever
> # ip addr show br0
> 62: br0: <BROADCAST,MULTICAST,PROMISC,UP,LOWER_UP> mtu 1500 qdisc
> noqueue state UP group default qlen 1000
>     link/ether 00:e3:c0:5f:81:5d brd ff:ff:ff:ff:ff:ff
>     inet 192.168.215.1/24 brd 192.168.215.255 scope global br0
>        valid_lft forever preferred_lft forever
>     inet6 fe80::2e3:c0ff:fe5f:815d/64 scope link
>        valid_lft forever preferred_lft forever
> # ip addr show enp5s0
> 2: enp5s0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast
> state UP group default qlen 1000
>     link/ether 68:05:ca:11:64:30 brd ff:ff:ff:ff:ff:ff
>     inet 192.168.210.1/23 brd 192.168.211.255 scope global enp5s0
>        valid_lft forever preferred_lft forever
>     inet 192.168.212.1/24 brd 192.168.212.255 scope global enp5s0
>        valid_lft forever preferred_lft forever
>     inet6 fe80::6a05:caff:fe11:6430/64 scope link
>        valid_lft forever preferred_lft forever
>
> As you can see from the above, enp8s5 does not have an IP address
> configured. Only br0 has a management IP address which I need anyway.
> Also, br0 only covers enp8s5, enp8s5_1 and enp8s5_11, not enp5s0.
>
> The traffic's source address reported in this dump is not in the dmz
> zone but in dmz1, ie. the traffic flow is through the br0 bridge.
>
> Have I overlooked something?
>
No -- I was apparently confusing enp8s5 with enp5s0 (I hate this new NIC
naming convention).

It appears that *no* traffic entered via enp5s0 during the period of
time covered by the dump:

Chain br0_fwd (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 dmz0_frwd  all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         PHYSDEV match --physdev-in enp8s5 policy match dir in pol none 
<================
   25  4464 dmz1_frwd  all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         PHYSDEV match --physdev-in enp8s5_1 policy match dir in pol none
    0     0 dmz11_frwd  all  --  *      *       0.0.0.0/0            0.0.0.0/0  
          PHYSDEV match --physdev-in enp8s5_11 policy match dir in pol none
    0     0 dmzx_frwd  all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         policy match dir in pol none

Chain br0_in (1 references)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 dmz0-fw    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         PHYSDEV match --physdev-in enp8s5 policy match dir in pol none 
<===============
   49  4424 dmz1-fw    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         PHYSDEV match --physdev-in enp8s5_1 policy match dir in pol none
    0     0 dmz11-fw   all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         PHYSDEV match --physdev-in enp8s5_11 policy match dir in pol none
    0     0 dmzx-fw    all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         policy match dir in pol none

Or, at least, none made it as far as the filter table. So I suggest
analyzing the packet flow with 'shorewall iptrace -s 192.168.215.201 -d
192.168.215.1' so we can see how netfilter is processing the echo
request packets'.

-Tom

-- 
Tom Eastep        \   Q: What do you get when you cross a mobster with
Shoreline,         \     an international standard?
Washington, USA     \ A: Someone who makes you an offer you can't 
http://shorewall.org \   understand
                      \_______________________________________________


Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to