Hello all,
I''m writing to the list, because I have a problem setting up my routing
that I''m unable to overcome.
1. The situation:
+-------------+ +-------------+
| actaea | eth0 | ilex |
| 192.168.1.4 |------ localnet ------| 192.168.1.1 |
+-------------+ 192.168.1.0/24 +-------------+
eth1 / | ppp0
80.72.34.162 83.31.149.159
/ |
wlnet tpsa
80.72.34.160/24 |
/ |
+--------------+ +------------+
| 80.72.34.161 | | 213.25.2.3 |
+--------------+ +------------+
\ /
\-----------, /
+--------------+ "" \
| salix | / Internet "
| 212.87.7.182 |--------''-, ,-"
+--------------+ "--------"
Ilex, the router/firewall is running Debian/GNU Linux "Sarge", kernel
version 2.6.5, iproute2 tools 20010824-13, iptables 1.2.9-6
2. What I am trying to achieve:
I want ilex to respond to any incoming trafic on 80.72.34.162 address
(it is running a DNS server). All outgoing trafic from localnet should
go through tpsa link (faster but non-static IP). Resposnses to the
latter should also return through tpsa link.
I have followed instrucitons from LARTC howto, chapter 4.2 but to no avail.
3. The problem:
after running:
ip route del default
ip route add default via 213.25.2.3
localnet traffic flows fine, BUT ilex no longer responds to pings from
salix on 80.72.34.162 address
this happens also in the opposite direction, after running:
ip route del default
ip route add default via 80.72.34.161
localnet traffic flows fine, BUT ilex no longer responds to pings from
salix on 83.31.149.159 address
4. What I did to diagnose the problem:
Checked, and double checked my settings against the howto.
Tried pinging ilex from salix tracing the traffic with iptables -j LOG
(settings below). I''m able to see ping request packets, but no ping
response packets. I also tried monitoring the trafic with ethereal, both
on the virtuall ''all'' interface, and also on each of the
physical
interface (well, ppp0 isn''t actually physical, but you get the idea) in
promiscous mode. Only ping request packets are visible.
Then I tried connecting with ssh from salix to ilex. I''m seeing
incoming
SYN packets, but no response packets directed to salix emerge on either
interface.
5. Relevant diagnostic information:
ip output, with default route through wlnet link:
ilex:~# ip address show
1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
2: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000
link/ether 00:30:1b:2e:fb:c1 brd ff:ff:ff:ff:ff:ff
inet 192.168.1.1/24 brd 192.168.1.255 scope global eth0
3: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000
link/ether 00:c0:df:f7:5c:26 brd ff:ff:ff:ff:ff:ff
inet 80.72.34.162/27 brd 80.255.255.255 scope global eth1
4: eth2: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000
link/ether 00:60:4c:17:54:7c brd ff:ff:ff:ff:ff:ff
27: ppp0: <POINTOPOINT,MULTICAST,NOARP,UP> mtu 1492 qdisc pfifo_fast qlen
3
link/ppp
inet 83.31.149.159 peer 213.25.2.3/32 scope global ppp0
ilex:~# ip rule show
0: from all lookup local
32764: from 213.25.2.3 lookup tpsa
32765: from 80.72.34.161 lookup wlnet
32766: from all lookup main
32767: from all lookup default
ilex:~# ip route show table local
local 192.168.1.1 dev eth0 proto kernel scope host src 192.168.1.1
local 83.31.149.159 dev ppp0 proto kernel scope host src 83.31.149.159
broadcast 80.72.34.160 dev eth1 proto kernel scope link src 80.72.34.162
broadcast 192.168.1.0 dev eth0 proto kernel scope link src 192.168.1.1
broadcast 127.255.255.255 dev lo proto kernel scope link src 127.0.0.1
local 80.72.34.162 dev eth1 proto kernel scope host src 80.72.34.162
broadcast 80.255.255.255 dev eth1 proto kernel scope link src
80.72.34.162
broadcast 192.168.1.255 dev eth0 proto kernel scope link src 192.168.1.1
broadcast 127.0.0.0 dev lo proto kernel scope link src 127.0.0.1
local 127.0.0.1 dev lo proto kernel scope host src 127.0.0.1
broadcast 80.72.34.191 dev eth1 proto kernel scope link src 80.72.34.162
local 127.0.0.0/8 dev lo proto kernel scope host src 127.0.0.1
ilex:~# ip route show table tpsa
213.25.2.3 dev ppp0 scope link src 83.31.149.159
80.72.34.160/27 dev eth1 scope link
192.168.1.0/24 dev eth0 scope link
127.0.0.0/8 dev lo scope link
default via 213.25.2.3 dev ppp0
ilex:~# ip route show table wlnet
213.25.2.3 dev ppp0 scope link
80.72.34.160/27 dev eth1 scope link src 80.72.34.162
192.168.1.0/24 dev eth0 scope link
127.0.0.0/8 dev lo scope link
default via 80.72.34.161 dev eth1
ilex:~# ip route show table main
213.25.2.3 dev ppp0 proto kernel scope link src 83.31.149.159
80.72.34.160/27 dev eth1 proto kernel scope link src 80.72.34.162
192.168.1.0/24 dev eth0 proto kernel scope link src 192.168.1.1
default via 80.72.34.161 dev eth1
ilex:~# ip route show table default
iptables output at the time of testing (disabled firewall):
ilex:~# iptables -L -n
Chain INPUT (policy ACCEPT)
target prot opt source destination
LOG all -- 83.31.149.159 0.0.0.0/0 LOG flags 0
level 4
LOG all -- 0.0.0.0/0 83.31.149.159 LOG flags 0
level 4
Chain FORWARD (policy ACCEPT)
target prot opt source destination
LOG all -- 83.31.149.159 0.0.0.0/0 LOG flags 0
level 4
LOG all -- 0.0.0.0/0 83.31.149.159 LOG flags 0
level 4
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
LOG all -- 83.31.149.159 0.0.0.0/0 LOG flags 0
level 4
LOG all -- 0.0.0.0/0 83.31.149.159 LOG flags 0
level 4
ilex:~# iptables -t nat -L -n
Chain PREROUTING (policy ACCEPT)
target prot opt source destination
LOG all -- 83.31.149.159 0.0.0.0/0 LOG flags 0
level 4
LOG all -- 0.0.0.0/0 83.31.149.159 LOG flags 0
level 4
Chain POSTROUTING (policy ACCEPT)
target prot opt source destination
LOG all -- 83.31.149.159 0.0.0.0/0 LOG flags 0
level 4
LOG all -- 0.0.0.0/0 83.31.149.159 LOG flags 0
level 4
MASQUERADE all -- 192.168.0.0/16 0.0.0.0/0
MASQUERADE all -- 192.168.0.0/16 0.0.0.0/0
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
LOG all -- 83.31.149.159 0.0.0.0/0 LOG flags 0
level 4
LOG all -- 0.0.0.0/0 83.31.149.159 LOG flags 0
level 4
Note: the seemingly indentical MASQUERADE entries in the POSTROUTING
chain are:
-s 192.168.0.0/16 -o eth1 -j MASQUERADE
-s 192.168.0.0/16 -o ppp0 -j MASQUERADE
My apologies for a rather lenghty email. I''m trying to provide all
information that I have in order to reduce mailing list noise.Please
help - I am stuck.
Thanks in advance,
Rafal
_______________________________________________
LARTC mailing list / LARTC@mailman.ds9a.nl
http://mailman.ds9a.nl/mailman/listinfo/lartc HOWTO: http://lartc.org/