I'm still plugging along on my 1st shorewall install, now trying to get IPv6
setup.
My config is still pretty simplistic, working first on just PING6
My shorewall6-lite config has
/interfaces
net EXTIF
physical=enp5s0,tcpflags,forward=1,accept_ra=1,nosmurfs
- INTIF physical=enp4s0,tcpflags,forward=1,accept_ra=1
/zones
fw firewall
net ipv6
lan ipv6
/policy
$FW $FW ACCEPT err
$FW all+ ACCEPT err
lan net ACCEPT err
net all DROP debug
all all REJECT debug
/rules
?SECTION ALL
?SECTION ESTABLISHED
?SECTION RELATED
?SECTION INVALID
?SECTION UNTRACKED
?SECTION NEW
Ping(ACCEPT) all all
On the server
ip -6 addr show
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 state UNKNOWN qlen 1000
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: enp5s0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP
qlen 1000
inet6 fe80::e175:83e4:7fc1:b190/64 scope link
valid_lft forever preferred_lft forever
3: enp4s0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP
qlen 1000
inet6 fe80::e175:83e4:7fc1:b191/64 scope link
valid_lft forever preferred_lft forever
systemctl status shorewall6-lite -ln0
● shorewall6-lite.service - Shorewall IPv6 firewall (lite)
Loaded: loaded
(/usr/lib/systemd/system/shorewall6-lite.service; enabled; vendor preset:
disabled)
Active: active (exited) since Tue 2021-05-18 11:06:43
EDT; 11s ago
Process: 37445 ExecStart=/usr/sbin/shorewall -6l
$OPTIONS start $STARTOPTIONS (code=exited, status=0/SUCCESS)
Main PID: 37445 (code=exited, status=0/SUCCESS)
CPU: 1.977s
I can't even ping to itself
ping6 fe80::e175:83e4:7fc1:b190
PING fe80::e175:83e4:7fc1:b190(fe80::e175:83e4:7fc1:b190) 56
data bytes
(just sits there)
ping6 fe80::e175:83e4:7fc1:b191
PING fe80::e175:83e4:7fc1:b191(fe80::e175:83e4:7fc1:b191) 56
data bytes
(just sits there)
That's with
shorewall6-lite show
1 Shorewall6 Lite 5.2.8 filter Table at thad.local - Tue May 18
11:08:33 AM EDT 2021
2
3 Counters reset Tue May 18 11:06:43 AM EDT 2021
4
5 Chain INPUT (policy DROP 0 packets, 0 bytes)
6 pkts bytes target prot opt in out source
destination
7 2 128 net-fw all enp5s0 * ::/0
::/0
8 0 0 ACCEPT all lo * ::/0
::/0
9 18 1808 AllowICMPs icmpv6 * * ::/0
::/0
10 0 0 Broadcast all * * ::/0
::/0
11 0 0 DROP all * * ::/0
ff00::/8
12 0 0 LOG all * * ::/0
::/0 limit: up to 5/min burst 5 12 mode srcip LOG
flags 0 level 7 prefix "INPUT:REJECT "
13 0 0 reject all * * ::/0
::/0 [goto]
14
15 Chain FORWARD (policy DROP 0 packets, 0 bytes)
16 pkts bytes target prot opt in out source
destination
17 0 0 net_frwd all enp5s0 * ::/0
::/0
18 15 1200 INTIF_fwd all enp4s0 * ::/0
::/0
19 0 0 AllowICMPs icmpv6 * * ::/0
::/0
20 15 1200 Broadcast all * * ::/0
::/0
21 0 0 DROP all * * ::/0
ff00::/8
22 9 720 LOG all * * ::/0
::/0 limit: up to 5/min burst 5 22 mode srcip LOG
flags 0 level 7 prefix "FORWARD:REJECT "
23 15 1200 reject all * * ::/0
::/0 [goto]
24
25 Chain OUTPUT (policy DROP 0 packets, 0 bytes)
26 pkts bytes target prot opt in out source
destination
27 0 0 ACCEPT all * * ::/0
::/0 ctstate ESTABLISHED
28 24 2561 fw-net all * enp5s0 ::/0
::/0
29 0 0 fw-fw all * lo ::/0
::/0
30 18 1800 AllowICMPs icmpv6 * * ::/0
::/0
31 0 0 Broadcast all * * ::/0
::/0
32 0 0 DROP all * * ::/0
ff00::/8
33 0 0 LOG all * * ::/0
::/0 limit: up to 5/min burst 5 33 mode srcip LOG
flags 0 level 7 prefix "OUTPUT:REJECT "
34 0 0 reject all * * ::/0
::/0 [goto]
35
36 Chain +fw-fw (2 references)
37 pkts bytes target prot opt in out source
destination
38 0 0 LOG all * * ::/0
::/0 limit: up to 5/min burst 5 38 mode srcip LOG
flags 0 level 3 prefix "+fw:ACCEPT "
39 0 0 ACCEPT all * * ::/0
::/0
40
41 Chain +net-fw (1 references)
42 pkts bytes target prot opt in out source
destination
43 0 0 LOG all * * ::/0
::/0 limit: up to 5/min burst 5 43 mode srcip LOG
flags 0 level 3 prefix "+net:ACCEPT "
44 0 0 ACCEPT all * * ::/0
::/0
45
46 Chain AllowICMPs (4 references)
47 pkts bytes target prot opt in out source
destination
48 0 0 ACCEPT icmpv6 * * ::/0
::/0 ipv6-icmptype 1 /* Needed 48 ICMP types
(RFC4890) */
49 0 0 ACCEPT icmpv6 * * ::/0
::/0 ipv6-icmptype 2 /* Needed 49 ICMP types
(RFC4890) */
50 0 0 ACCEPT icmpv6 * * ::/0
::/0 ipv6-icmptype 3 /* Needed 50 ICMP types
(RFC4890) */
51 0 0 ACCEPT icmpv6 * * ::/0
::/0 ipv6-icmptype 4 /* Needed 51 ICMP types
(RFC4890) */
52 0 0 ACCEPT icmpv6 * * ::/0
::/0 ipv6-icmptype 133 /* Neede 52 d ICMP types
(RFC4890) */
53 32 3328 ACCEPT icmpv6 * * ::/0
::/0 ipv6-icmptype 134 /* Neede 53 d ICMP types
(RFC4890) */
54 2 144 ACCEPT icmpv6 * * ::/0
::/0 ipv6-icmptype 135 /* Neede 54 d ICMP types
(RFC4890) */
55 4 264 ACCEPT icmpv6 * * ::/0
::/0 ipv6-icmptype 136 /* Neede 55 d ICMP types
(RFC4890) */
56 0 0 ACCEPT icmpv6 * * ::/0
::/0 ipv6-icmptype 137 /* Neede 56 d ICMP types
(RFC4890) */
57 0 0 ACCEPT icmpv6 * * ::/0
::/0 ipv6-icmptype 141 /* Neede 57 d ICMP types
(RFC4890) */
58 0 0 ACCEPT icmpv6 * * ::/0
::/0 ipv6-icmptype 142 /* Neede 58 d ICMP types
(RFC4890) */
59 0 0 ACCEPT icmpv6 * * fe80::/10
::/0 ipv6-icmptype 130 /* Neede 59 d ICMP types
(RFC4890) */
60 0 0 ACCEPT icmpv6 * * fe80::/10
::/0 ipv6-icmptype 131 /* Neede 60 d ICMP types
(RFC4890) */
61 0 0 ACCEPT icmpv6 * * fe80::/10
::/0 ipv6-icmptype 132 /* Neede 61 d ICMP types
(RFC4890) */
62 0 0 ACCEPT icmpv6 * * fe80::/10
::/0 ipv6-icmptype 143 /* Neede 62 d ICMP types
(RFC4890) */
63 0 0 ACCEPT icmpv6 * * ::/0
::/0 ipv6-icmptype 148 /* Neede 63 d ICMP types
(RFC4890) */
64 0 0 ACCEPT icmpv6 * * ::/0
::/0 ipv6-icmptype 149 /* Neede 64 d ICMP types
(RFC4890) */
65 0 0 ACCEPT icmpv6 * * fe80::/10
::/0 ipv6-icmptype 151 /* Neede 65 d ICMP types
(RFC4890) */
66 0 0 ACCEPT icmpv6 * * fe80::/10
::/0 ipv6-icmptype 152 /* Neede 66 d ICMP types
(RFC4890) */
67 0 0 ACCEPT icmpv6 * * fe80::/10
::/0 ipv6-icmptype 153 /* Neede 67 d ICMP types
(RFC4890) */
68
69 Chain Broadcast (4 references)
70 pkts bytes target prot opt in out source
destination
71
72 Chain INTIF_fwd (1 references)
73 pkts bytes target prot opt in out source
destination
74 0 0 sfilter all * enp4s0 ::/0
::/0 [goto]
75 0 0 DROP all * * ::/0
::/0 ctstate INVALID,NEW,UNTRACK 75 ED match-set
SW_DBL6 src
76 0 0 ACCEPT all * * ::/0
::/0 ctstate ESTABLISHED
77 15 1200 tcpflags tcp * * ::/0
::/0
78
79 Chain fw-fw (1 references)
80 pkts bytes target prot opt in out source
destination
81 0 0 +fw-fw all * * ::/0
::/0 ctstate RELATED
82 0 0 LOG all * * ::/0
::/0 limit: up to 5/min burst 5 82 mode srcip LOG
flags 0 level 3 prefix "fw:ACCEPT "
83 0 0 ACCEPT all * * ::/0
::/0
84
85 Chain fw-net (1 references)
86 pkts bytes target prot opt in out source
destination
87 0 0 +fw-fw all * * ::/0
::/0 ctstate RELATED
88 22 2417 ACCEPT udp * * ::/0
::/0 udp dpt:53 /* DNS */
89 0 0 ACCEPT tcp * * ::/0
::/0 tcp dpt:53 /* DNS */
90 0 0 ACCEPT icmpv6 * * ::/0
::/0 ipv6-icmptype 128 /* Ping 90 */
91 2 144 LOG all * * ::/0
::/0 limit: up to 5/min burst 5 91 mode srcip LOG
flags 0 level 3 prefix "fw:ACCEPT "
92 2 144 ACCEPT all * * ::/0
::/0
93
94 Chain logflags (7 references)
95 pkts bytes target prot opt in out source
destination
96 0 0 LOG all * * ::/0
::/0 limit: up to 5/min burst 5 96 mode srcip LOG
flags 4 level 3 prefix "logflags:DROP "
97 0 0 DROP all * * ::/0
::/0
98
99 Chain net-fw (1 references)
100 pkts bytes target prot opt in out source
destination
101 0 0 DROP all * * ::/0
::/0 ctstate INVALID,NEW,UNTRACK 101 ED match-set SW_DBL6 src
102 0 0 ACCEPT all * * ::/0
::/0 ctstate ESTABLISHED
103 2 128 smurfs all * * ::/0
::/0 ctstate INVALID,NEW,UNTRACK 103 ED
104 0 0 tcpflags tcp * * ::/0
::/0
105 0 0 +net-fw all * * ::/0
::/0 ctstate RELATED
106 0 0 ACCEPT icmpv6 * * ::/0
::/0 ipv6-icmptype 128 /* Ping 106 */
107 2 128 AllowICMPs icmpv6 * * ::/0
::/0
108 0 0 Broadcast all * * ::/0
::/0
109 0 0 DROP all * * ::/0
ff00::/8
110 0 0 LOG all * * ::/0
::/0 limit: up to 5/min burst 5 110 mode srcip LOG flags 0
level 7 prefix "net:DROP "
111 0 0 DROP all * * ::/0
::/0
112
113 Chain net_frwd (1 references)
114 pkts bytes target prot opt in out source
destination
115 0 0 sfilter all * enp5s0 ::/0
::/0 [goto]
116 0 0 DROP all * * ::/0
::/0 ctstate INVALID,NEW,UNTRACK 116 ED match-set SW_DBL6 src
117 0 0 ACCEPT all * * ::/0
::/0 ctstate ESTABLISHED
118 0 0 smurfs all * * ::/0
::/0 ctstate INVALID,NEW,UNTRACK 118 ED
119 0 0 tcpflags tcp * * ::/0
::/0
120
121 Chain reject (3 references)
122 pkts bytes target prot opt in out source
destination
123 0 0 DROP all * * ff00::/8
::/0
124 0 0 DROP 2 * * ::/0
::/0
125 15 1200 REJECT tcp * * ::/0
::/0 reject-with tcp-reset
126 0 0 REJECT udp * * ::/0
::/0 reject-with icmp6-port-unre 126 achable
127 0 0 REJECT icmpv6 * * ::/0
::/0 reject-with icmp6-addr-unr 127 eachable
128 0 0 REJECT all * * ::/0
::/0 reject-with icmp6-adm-prohi 128 bited
129
130 Chain sfilter (2 references)
131 pkts bytes target prot opt in out source
destination
132 0 0 LOG all * * ::/0
::/0 limit: up to 5/min burst 5 132 mode srcip LOG flags 0
level 3 prefix "sfilter:DROP "
133 0 0 DROP all * * ::/0
::/0
134
135 Chain sha-lh-df6b6641257157224ef0 (0 references)
136 pkts bytes target prot opt in out source
destination
137
138 Chain sha-rh-d6b77076c61861d4f974 (0 references)
139 pkts bytes target prot opt in out source
destination
140
141 Chain shorewall (0 references)
142 pkts bytes target prot opt in out source
destination
143 0 0 all * * ::/0
::/0 recent: SET name: %CURRENTT 143 IME side: source mask:
ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
144
145 Chain smurflog (1 references)
146 pkts bytes target prot opt in out source
destination
147 0 0 LOG all * * ::/0
::/0 limit: up to 5/min burst 5 147 mode srcip LOG flags 0
level 3 prefix "smurfs:DROP "
148 0 0 DROP all * * ::/0
::/0
149
150 Chain smurfs (2 references)
151 pkts bytes target prot opt in out source
destination
152 0 0 smurflog all * * ff00::/8
::/0 [goto]
153
154 Chain tcpflags (3 references)
155 pkts bytes target prot opt in out source
destination
156 0 0 logflags tcp * * ::/0
::/0 [goto] tcp flags:0x3F/0x29
157 0 0 logflags tcp * * ::/0
::/0 [goto] tcp flags:0x3F/0x00
158 0 0 logflags tcp * * ::/0
::/0 [goto] tcp flags:0x06/0x06
159 0 0 logflags tcp * * ::/0
::/0 [goto] tcp flags:0x05/0x05
160 0 0 logflags tcp * * ::/0
::/0 [goto] tcp flags:0x03/0x03
161 0 0 logflags tcp * * ::/0
::/0 [goto] tcp flags:0x19/0x09
162 0 0 logflags tcp * * ::/0
::/0 [goto] tcp spt:0 flags:0x17 162 /0x02
If I clear the firewall, so,
ip6tables -L -n
Chain INPUT (policy ACCEPT)
target prot opt source destination
Chain FORWARD (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Chain +fw-fw (0 references)
target prot opt source destination
Chain +net-fw (0 references)
target prot opt source destination
Chain AllowICMPs (0 references)
target prot opt source destination
Chain Broadcast (0 references)
target prot opt source destination
Chain INTIF_fwd (0 references)
target prot opt source destination
Chain fw-fw (0 references)
target prot opt source destination
Chain fw-net (0 references)
target prot opt source destination
Chain logflags (0 references)
target prot opt source destination
Chain net-fw (0 references)
target prot opt source destination
Chain net_frwd (0 references)
target prot opt source destination
Chain reject (0 references)
target prot opt source destination
Chain sfilter (0 references)
target prot opt source destination
Chain sha-lh-df6b6641257157224ef0 (0 references)
target prot opt source destination
Chain sha-rh-d6b77076c61861d4f974 (0 references)
target prot opt source destination
Chain shorewall (0 references)
target prot opt source destination
Chain smurflog (0 references)
target prot opt source destination
Chain smurfs (0 references)
target prot opt source destination
Chain tcpflags (0 references)
target prot opt source destination
Same thing, NO ping.
And even with the 'debug' loglevel I don't see and related DROPs or REJECTs
when I ping/fail.
So as usual I guess I'm missing something.
Any helpful pointers?
Thanks!
Thad
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users