Am 14.11.18 um 19:01 schrieb Tom Eastep:
> On 11/13/18 3:09 AM, Boris wrote:
>> Am 25.09.18 um 10:21 schrieb Boris:
>>> Am 25.09.2018 um 00:50 schrieb Tom Eastep:
>>>> On 09/24/2018 01:55 PM, Boris wrote:
>>>>> Am 24.09.2018 um 19:12 schrieb Tom Eastep:
>>>>>> On 09/05/2018 08:16 AM, Boris wrote:
>>>>>>> Hej SW-list,
>>>>>>>
>>>>>>> This is the first time that I'm writing directly to the SW list. First
>>>>>>> of all, I want to thank you for this great software! I can hardly
>>>>>>> believe that I have been using SW for more than 15 years - embedded in
>>>>>>> the also great environment of LEAF (Linux Embedded Appliance Framework
>>>>>>> (formerly Firewall)).
>>>>>>>
>>>>>>> And now, for the first time, I have a problem that I don't understand
>>>>>>> and hope for help:
>>>>>>> My LEAF box (Ver. 6.x with SW 5.1.7.2 on Alix hardware) worked great on
>>>>>>> a VDSL internet line with 25 Mbps / 5Mbps. I used a FritzBox 7490 as
>>>>>>> modem (PassThrough). I have a web server and a mail server in a DMZ
>>>>>>> segment, a few desktop PCs in the LAN segment and a few wireless devices
>>>>>>> in a WLAN segment. The box also serves as an OpenVPN server. Nothing
>>>>>>> really extraordinary, I think.
>>>>>>>
>>>>>>> A few hours ago I got a new internet line switched with higher
>>>>>>> bandwidth. Unfortunately, I don't (yet) have any detailed technical
>>>>>>> specifications for the line other than the bandwidth (100Mbps / 40Mbps).
>>>>>>> A new FritzBox 7590 serves as modem. During a conversation with the
>>>>>>> support of the provider the keyword 'VLAN 7' was mentioned. This seems
>>>>>>> to indicate a BNG connection from Telekom, but I didn't have to set up
>>>>>>> VLAN tagging.
>>>>>>>
>>>>>>> Now to the problem description: With the unchanged SW configuration,
>>>>>>> REJECTS of TCP packets from and to the zone 'net' occur, which were
>>>>>>> transported correctly before the switchover! It looks like some packets
>>>>>>> are passing through sporadically, but I can't secure that and I can't
>>>>>>> even reproduce it. All other zones work fine with each other, so
>>>>>>> loc-wlan, wlan-dmz, dmz-loc and so on. In addition, icmp packets are
>>>>>>> transported over the zone net without any problems.
>>>>>>> In order to be able to use my environment, I removed all restrictions as
>>>>>>> a temporary solution, with a global statement in /shorewall/policy:
>>>>>>> all     all      ACCEPT
>>>>>>> This is of course undesirable and I am looking for the cause of the
>>>>>>> problem. I asked the provider for detailed specifications of the line.
>>>>>>> Maybe someone has an idea here? I deactivated the global ACCEPT again
>>>>>>> and made a dump, which is attached.
>>>>>>>
>>>>>>> Many thanks and many greetings,
>>>>>>>
>>>>>>>
>>>>>>
>>>>>> Your internet interface is now eth0, not ppp0. So you need to change
>>>>>> your configuration.
>>>>>>
>>>>>> -Tom
>>>>>>
>>>>>
>>>>> Hej Tom,
>>>>>
>>>>> thank you very much for your statement!
>>>>>
>>>>> I'm sure you have one or more very good reason to come to this
>>>>> conclusion. Could you please give a little explanation?
>>>>>
>>>>> Finally, I'm afraid you missunderstood my description of the situation.
>>>>>
>>>>> ppp is still doing the login and ppp0 is the interface that 'owns' the
>>>>> public IP:
>>>>>
>>>>> # ip addr sh:
>>>>>
>>>>> [snip]
>>>>> 3: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast
>>>>> state UNKNOWN group default qlen 1000
>>>>>     link/ether 00:0d:b9:13:fb:d8 brd ff:ff:ff:ff:ff:ff
>>>>> [snip]
>>>>> 13: ppp0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1492 qdisc
>>>>> pfifo_fast state UNKNOWN group default qlen 3
>>>>>     link/ppp
>>>>>     inet 217.70.192.188 peer 213.178.81.101/32 scope global ppp0
>>>>>        valid_lft forever preferred_lft forever
>>>>>
>>>>> Of course I tried to follow your hint and changed ppp0 into eth0 in
>>>>> /etc/shorewall/interfaces and /etc/shorewall/snat. Did I miss something
>>>>> to change?
>>>>> As result, no client in loc, wlan or dmz could connect to any host in
>>>>> net. So I switched back....
>>>>>
>>>>
>>>> Okay. I looked at the log messages and assumed that eth0 was the net
>>>> interface since all of the messages:
>>>>
>>>> a) Had eth0 as the source interface.
>>>> b) Were created out of the INPUT or FORWARD chain.
>>>>
>>>> This is an indication that eth0 is not defined to Shorewall yet packets
>>>> are being received on that interface. This is very strange since eth0
>>>> doesn't even have an IP address. Given that all of the logged packets
>>>> are apparently response packets, it would seem that response IP packets
>>>> are being sent to your firewall from the Fritzbox rather than (or in
>>>> addition to) being sent via PPPoE. That is why an all->all policy of
>>>> ACCEPT is allowing your firewall to work.
>>>>
>>>> If that analysis is correct, then the problem is not in your Shorewall
>>>> configuration but in the configuration of PPPoE link.
>>>>
>>>> -Tom
>>>
>>> Hej Tom,
>>>
>>> thanks again for your brainwork!
>>>
>>> This is extremely interesting and seems to be the one and only
>>> explanation for the strange behaviour. I will think it over and
>>> hopefully create an idea of how to handle.
>>>
>>
>> Hej Tom,
>> hej list,
>>
>> here I am again after some weeks of discussions with AVM and the ISP -
>> with no success nor solution.
>> Also, I took a break working on this because I'm quite frustrated. But
>> after all, there should be a way to make the shorewall work again. It's
>> not a good feeling without safety on that level....
>>
>> AVM admits the fact that pppoe is not passed directly through. So I hope
>> (an actually this seems to be the last chance) there might be a
>> workaround on teh LEAF-box, maybe directly in ShoreWall. Is it possible
>> to define eth0 there as a kind of incoming-only interface?
>>
>> In my imagination there could be something like a
>> forwarding-packet-relay from th0 to ppp0 so that SW accepts the respose
>> packets on ppp0. But I have no idea how this could be realized....
>>
>> I would be extremly glad about any idea to solve that tricky problem!
>>
> 
> You can assign a zone (call it 'hack') to eth0 then add these policies:
> 
> hack  all     ACCEPT
> all   hack    REJECT  <log level>
> 

Hej Tom,

thank you VERY much for this!
I will try this the next days and give report.

Boris


_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to