On Thu, Nov 15, 2018 at 8:48 PM Tom Eastep <teas...@shorewall.net> wrote:
>
> That's what I believe also.
>
> Vieri - Do I understand correctly that after you physically reconfigure,
> things settle down after some period of time and work properly (and stay
> working properly)? If so, I don't believe that there is anything here to
> worry about.

Simon and Tom, thank you for looking into this.

I've noticed that it doesn't really matter if I put the Windows 10
host to sleep for 30 seconds. It happens with any host (Linux, etc.),
and the easy way to "make things work" is to simply disconnect the
host cable from the switch (port with VLAN ID 11 Untagged, in my
case), wait *at least* 30 seconds, and finally connect the cable to
another switch port (VLAN ID 12 Untagged, in my case). If I honor this
time lag, everything behaves "as expected". In my previous tests, I
would move the cable from one port to another on the switch in way
less than 30 seconds.

I haven't found any ARP timeout setting on this particular switch,
even though I've seen this option somewhere on another brand or model.

Anyway, yes, once the physical connections are settled, everything
seems to work fine. However, I have to keep in mind that any change in
the wiring requires to keep the switch port down for at least 30
seconds.

I'm really curious though, so I took another look at the logs.
The shorewall iptrace below was taken from my previous post at
https://drive.google.com/open?id=1eFYjF9HPi144uzl2Y_oDZxtMCDq4fSog
.That's when things were "not working right". According to the trace,
the packets are actually entering chain dmz12-fw. They should be
dropped, but they are apparently not according to what I see on the
client host itself.

Nov 15 09:36:40 inf-fw2 kernel: TRACE: raw:PREROUTING:policy:13 IN=br0
OUT= PHYSIN=enp8s5_12 MAC=00:e3:c0:5f:81:5d:f4:39:09:d9:14:c8:08:00
SRC=192.168.215.200 DST=192.168.215.1 LEN=60 TOS=0x00 PREC=0x00
TTL=128 ID=9994 PROTO=ICMP TYPE=8 CODE=0 ID=1 SEQ=16395
Nov 15 09:36:40 inf-fw2 kernel: TRACE: mangle:PREROUTING:rule:1 IN=br0
OUT= PHYSIN=enp8s5_12 MAC=00:e3:c0:5f:81:5d:f4:39:09:d9:14:c8:08:00
SRC=192.168.215.200 DST=192.168.215.1 LEN=60 TOS=0x00 PREC=0x00
TTL=128 ID=9994 PROTO=ICMP TYPE=8 CODE=0 ID=1 SEQ=16395
Nov 15 09:36:40 inf-fw2 kernel: TRACE: mangle:PREROUTING:policy:9
IN=br0 OUT= PHYSIN=enp8s5_12
MAC=00:e3:c0:5f:81:5d:f4:39:09:d9:14:c8:08:00 SRC=192.168.215.200
DST=192.168.215.1 LEN=60 TOS=0x00 PREC=0x00 TTL=128 ID=9994 PROTO=ICMP
TYPE=8 CODE=0 ID=1 SEQ=16395
Nov 15 09:36:40 inf-fw2 kernel: TRACE: mangle:INPUT:policy:1 IN=br0
OUT= PHYSIN=enp8s5_12 MAC=00:e3:c0:5f:81:5d:f4:39:09:d9:14:c8:08:00
SRC=192.168.215.200 DST=192.168.215.1 LEN=60 TOS=0x00 PREC=0x00
TTL=128 ID=9994 PROTO=ICMP TYPE=8 CODE=0 ID=1 SEQ=16395
Nov 15 09:36:40 inf-fw2 kernel: TRACE: filter:INPUT:rule:6 IN=br0 OUT=
PHYSIN=enp8s5_12 MAC=00:e3:c0:5f:81:5d:f4:39:09:d9:14:c8:08:00
SRC=192.168.215.200 DST=192.168.215.1 LEN=60 TOS=0x00 PREC=0x00
TTL=128 ID=9994 PROTO=ICMP TYPE=8 CODE=0 ID=1 SEQ=16395
Nov 15 09:36:40 inf-fw2 kernel: TRACE: filter:br0_in:rule:4 IN=br0
OUT= PHYSIN=enp8s5_12 MAC=00:e3:c0:5f:81:5d:f4:39:09:d9:14:c8:08:00
SRC=192.168.215.200 DST=192.168.215.1 LEN=60 TOS=0x00 PREC=0x00
TTL=128 ID=9994 PROTO=ICMP TYPE=8 CODE=0 ID=1 SEQ=16395
Nov 15 09:36:40 inf-fw2 kernel: TRACE: filter:dmz12-fw:rule:4 IN=br0
OUT= PHYSIN=enp8s5_12 MAC=00:e3:c0:5f:81:5d:f4:39:09:d9:14:c8:08:00
SRC=192.168.215.200 DST=192.168.215.1 LEN=60 TOS=0x00 PREC=0x00
TTL=128 ID=9994 PROTO=ICMP TYPE=8 CODE=0 ID=1 SEQ=16395

So I then searched the shorewall log and found this:

Nov 15 09:36:40 inf-fw2 kernel: Shorewall:dmz12-fw:DROP:IN=br0 OUT=
PHYSIN=enp8s5_12 MAC=00:e3:c0:5f:81:5d:f4:39:09:d9:14:c8:08:00
SRC=192.168.215.200 DST=192.168.215.1 LEN=62 TOS=0x00 PREC=0x00
TTL=128 ID=9995 PROTO=UDP SPT=50892 DPT=53 LEN=42

There's nothing regarding ICMP.
I would have expected something like:

Nov 16 09:36:40 inf-fw2 kernel: Shorewall:dmz12-fw:DROP:IN=br0 OUT=
PHYSIN=enp8s5_12 MAC=00:e3:c0:5f:81:5d:f4:39:09:d9:14:c8:08:00
SRC=192.168.215.200 DST=192.168.215.1 LEN=60 TOS=0x00 PREC=0x00
TTL=128 ID=19982 PROTO=ICMP TYPE=8 CODE=0 ID=1 SEQ=22595
(this line was taken today from a "working environment")

Basically, what puzzles me most is that the "iptrace" shows that the
dmz12-fw filter is being applied to the ICMP message, but nothing is
logged regarding ICMP in syslog.
I'm wondering if this behavior is ICMP-specific. I haven't tried other
protocols and ports.

Anyway, I can live with it. Thanks again.

Vieri


_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to