German Jimenez Leal
2006-May-14 14:04 UTC
ERROR: Command "/sbin/iptables -A OUTPUT -o vdpf0 -d eth0 -j all2all" Failed
Hello ! My problem its iptables command error shorewall: Help me please..! [root@localhost shorewall]# service shorewall restart Restarting shorewall: [FALLÓ] May 8 15:50:58 localhost shorewall: Validating /etc/shorewall/tcclasses... May 8 15:50:58 localhost shorewall: Activating Rules... May 8 15:50:58 localhost shorewall: iptables v1.2.11: host/network `eth0'' not f ound May 8 15:50:58 localhost shorewall: Try `iptables -h'' or ''iptables --help'' for more information. May 8 15:50:58 localhost shorewall: ERROR: Command "/sbin/iptables -A OUTPUT -o vdpf0 -d eth0 -j all2all" Failed May 8 15:50:58 localhost shorewall: Processing /etc/shorewall/stop ... May 8 15:50:58 localhost shorewall: IP Forwarding Enabled May 8 15:50:58 localhost shorewall: Processing /etc/shorewall/stopped ... May 8 15:50:58 localhost root: Shorewall Stopped May 8 15:50:58 localhost shorewall: Iniciación de shorewall failed [root@localhost shorewall]# shorewall check Loading /usr/share/shorewall/functions... Processing /etc/shorewall/params ... Processing /etc/shorewall/shorewall.conf... Loading Modules... Shorewall has detected the following iptables/netfilter capabilities: NAT: Available Packet Mangling: Available Multi-port Match: Available Extended Multi-port Match: Not available Connection Tracking Match: Available Packet Type Match: Available Policy Match: Not available Physdev Match: Available IP range Match: Available Recent Match: Available Owner Match: Available Ipset Match: Not available CONNMARK Target: Not available Connmark Match: Not available Raw Table: Available CLASSIFY Target: Available Verifying Configuration... Determining Zones... IPv4_Zones: net loc Firewall Zone: fw Setting up IPSEC... Validating interfaces file... Validating hosts file... Determining Hosts in Zones... net Zone: vdpf0:eth0 loc Zone: vdpf0:eth1 Validating policy file... Policy for loc to net is ACCEPT using chain loc2net Policy for net to loc is DROP using chain net2all Policy for net to fw is DROP using chain net2all Policy for loc to fw is REJECT using chain all2all Policy for fw to net is REJECT using chain all2all Policy for fw to loc is REJECT using chain all2all Checking Black List... Validating Proxy ARP Validating NAT... Pre-validating Actions... Pre-processing /usr/share/shorewall/action.Drop... ..Expanding Macro /usr/share/shorewall/macro.Auth... ..End Macro ..Expanding Macro /usr/share/shorewall/macro.AllowICMPs... ..End Macro ..Expanding Macro /usr/share/shorewall/macro.SMB... ..End Macro ..Expanding Macro /usr/share/shorewall/macro.DropUPnP... ..End Macro ..Expanding Macro /usr/share/shorewall/macro.DropDNSrep... ..End Macro Pre-processing /usr/share/shorewall/action.Reject... Pre-processing /usr/share/shorewall/action.Limit... Validating rules file... Rule "ACCEPT net fw TCP 20,21,22,25,80,110,143,443,995,465 " checked. Rule "ACCEPT loc net TCP 20,21,22,25,80,110,143,443,995,465 " checked. Rule "ACCEPT loc net UDP 20,21,22,25,80,110,143,443,995,465 " checked. Validating Actions... Generating Transitive Closure of Used-action List... Processing /usr/share/shorewall/action.Drop for Chain Drop... ..Expanding Macro /usr/share/shorewall/macro.Auth... Rule "REJECT - - tcp 113 - -" checked. ..End Macro Rule "dropBcast " checked. ..Expanding Macro /usr/share/shorewall/macro.AllowICMPs... Rule "ACCEPT - - icmp fragmentation-needed - -" checked. Rule "ACCEPT - - icmp time-exceeded - -" checked. ..End Macro Rule "dropInvalid " checked. ..Expanding Macro /usr/share/shorewall/macro.SMB... Rule "DROP - - udp 135,445 - -" checked. Rule "DROP - - udp 137:139 - -" checked. Rule "DROP - - udp 1024: 137 -" checked. Rule "DROP - - tcp 135,139,445 - -" checked. ..End Macro ..Expanding Macro /usr/share/shorewall/macro.DropUPnP... Rule "DROP - - udp 1900 - -" checked. ..End Macro Rule "dropNotSyn - - tcp " checked. ..Expanding Macro /usr/share/shorewall/macro.DropDNSrep... Rule "DROP - - udp - 53 -" checked. ..End Macro Processing /usr/share/shorewall/action.Reject for Chain Reject... ..Expanding Macro /usr/share/shorewall/macro.Auth... Rule "REJECT - - tcp 113 - -" checked. ..End Macro Rule "dropBcast " checked. ..Expanding Macro /usr/share/shorewall/macro.AllowICMPs... Rule "ACCEPT - - icmp fragmentation-needed - -" checked. Rule "ACCEPT - - icmp time-exceeded - -" checked. ..End Macro Rule "dropInvalid " checked. ..Expanding Macro /usr/share/shorewall/macro.SMB... Rule "REJECT - - udp 135,445 - -" checked. Rule "REJECT - - udp 137:139 - -" checked. Rule "REJECT - - udp 1024: 137 -" checked. Rule "REJECT - - tcp 135,139,445 - -" checked. ..End Macro ..Expanding Macro /usr/share/shorewall/macro.DropUPnP... Rule "DROP - - udp 1900 - -" checked. ..End Macro Rule "dropNotSyn - - tcp " checked. ..Expanding Macro /usr/share/shorewall/macro.DropDNSrep... Rule "DROP - - udp - 53 -" checked. ..End Macro Masqueraded Networks and Hosts: To 0.0.0.0/0 (all) from 0.0.0.0/0 through vdpf0 Validating /etc/shorewall/tcdevices... Validating /etc/shorewall/tcclasses... Configuration Validated Notice: The ''check'' command is provided to catch obvious errors in a Shorewall configuration. It is not designed to catch all possible errors so please don''t submit problem reports about error conditions that ''check'' doesn''t find My scripts Network interfaces: Ifcfg-eth0 DEVICE=eth0 TYPE=Ethernet BRIDGE=vdpf0 ONBOOT=yes BOOTPROTO=static Ifcfg-eth1 DEVICE=eth1 TYPE=ETHER BRIDGE=vdpf0 ONBOOT=yes BOOTPROTO=static Ifcfg-vdpf0 DEVICE=vdpf0 TYPE=Bridge IPADDR=192.168.64.253 NETMASK=255.255.255.0 GATEWAY=192.168.64.250 ONBOOT=yes STP=no My scripts Shorewall: HOSTS: #ZONE HOST(S) OPTIONS net vdpf0:eth0 loc vdpf0:eth1 #LAST LINE -- ADD YOUR ENTRIES BEFORE THIS LINE -- DO NOT REMOVE INTERFACES: #ZONE INTERFACE BROADCAST OPTIONS - vdpf0 192.168.64.255 #LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE MASQ #INTERFACE SUBNET ADDRESS PROTO PORT(S) IPSEC #LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE eth0 vdpf0 MACLIST #INTERFACE MAC IP ADDRESSES (Optional) #LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE vdpf0:eth0 00:0F:20:2C:7D:46 ROUTESTOPED #INTERFACE HOST(S) OPTIONS vdpf0 - routeback #LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE ZONES #ZONE TYPE OPTIONS IN OUT # OPTIONS OPTIONS fw firewall net ipv4 loc ipv4 #LAST LINE - ADD YOUR ENTRIES ABOVE THIS ONE - DO NOT REMOVE RULES #ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL RATE USER//etc/shorewall/zones # PORT PORT(S) DEST #LIMIT GROUP #SECTION ESTABLISHED #SECTION RELATED #SECTION NEW #ACTION SOURCE DEST PROTO DEST # PORT ACCEPT net fw TCP 20,21,22,25,80,110,143,443,995,465 ACCEPT loc net TCP 20,21,22,25,80,110,143,443,995,465 ACCEPT loc net UDP 20,21,22,25,80,110,143,443,995,465 #LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE
Tom Eastep
2006-May-14 14:19 UTC
Re: ERROR: Command "/sbin/iptables -A OUTPUT -o vdpf0 -d eth0 -j all2all" Failed
German Jimenez Leal wrote:> > Hello…! > My problem its iptables command error shorewall: > Help me please..! > > *[_root@localhost shorewall]# service shorewall restart_* > Restarting shorewall: [FALLÓ] > > May 8 15:50:58 localhost shorewall: Validating /etc/shorewall/tcclasses... > May 8 15:50:58 localhost shorewall: Activating Rules... > May 8 15:50:58 localhost shorewall: iptables v1.2.11: host/network > `eth0'' not f ound > _May 8 15:50:58 localhost shorewall: Try `iptables -h'' or ''iptables > --help'' for more information._ > _May 8 15:50:58 localhost shorewall: ERROR: Command "/sbin/iptables > -A OUTPUT -o vdpf0 -d eth0 -j all2all" Failed_a) You apparently haven''t set BRIDGING=Yes in shorewall.conf. b) You will need the ''routeback'' option on vdpf0 in /etc/shorewall/interfaces. -Tom -- Tom Eastep \ Nothing is foolproof to a sufficiently talented fool Shoreline, \ http://shorewall.net Washington USA \ teastep@shorewall.net PGP Public Key \ https://lists.shorewall.net/teastep.pgp.key
Tom Eastep
2006-May-14 14:25 UTC
Re: ERROR: Command "/sbin/iptables -A OUTPUT -o vdpf0 -d eth0 -j all2all" Failed
German Jimenez Leal wrote:> > MASQ > #INTERFACE SUBNET ADDRESS PROTO PORT(S) > IPSEC > #LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE > eth0 vdpf0 >Also a) the above entry is absurd -- you can''t masquerade out of a bridge port. b) Even though the comment clearly says (in capital letters) that you should add your entry ABOVE that line, you have added your after the line. c) You apparently didn''t terminate the entry with a new-line character so Shorewall ignored it (which is why all of the config files have the ''#LAST LINE'' entry in the first place. Please refer to http://www.shorewall.net/bridge.html for instructions about configuring Shorewall with a bridge. -Tom -- Tom Eastep \ Nothing is foolproof to a sufficiently talented fool Shoreline, \ http://shorewall.net Washington USA \ teastep@shorewall.net PGP Public Key \ https://lists.shorewall.net/teastep.pgp.key
Tom Eastep
2006-May-14 15:57 UTC
Re: ERROR: Command "/sbin/iptables -A OUTPUT -o vdpf0 -d eth0 -j all2all" Failed
Tom Eastep wrote:> > Please refer to http://www.shorewall.net/bridge.html for instructions > about configuring Shorewall with a bridge. >And if after following all of advice, "shorewall start" still fails, then please forward a trace as described at http://www.shorewall.net/support.htm. -Tom -- Tom Eastep \ Nothing is foolproof to a sufficiently talented fool Shoreline, \ http://shorewall.net Washington USA \ teastep@shorewall.net PGP Public Key \ https://lists.shorewall.net/teastep.pgp.key
Ray Booysen
2006-May-15 08:14 UTC
Re: ERROR: Command "/sbin/iptables -A OUTPUT -o vdpf0 -d eth0 -j all2all" Failed
iptables is telling shorewall that eth0 cannot be found. Are you sure the interface is up and working correctly? Regards Ray German Jimenez Leal wrote:> > Hello…! > My problem its iptables command error shorewall: > Help me please..! > > *[_root@localhost shorewall]# service shorewall restart_* > Restarting shorewall: [FALLÓ] > > May 8 15:50:58 localhost shorewall: Validating > /etc/shorewall/tcclasses... > May 8 15:50:58 localhost shorewall: Activating Rules... > May 8 15:50:58 localhost shorewall: iptables v1.2.11: host/network > `eth0'' not f ound > _May 8 15:50:58 localhost shorewall: Try `iptables -h'' or ''iptables > --help'' for more information._ > _May 8 15:50:58 localhost shorewall: ERROR: Command "/sbin/iptables -A > OUTPUT -o vdpf0 -d eth0 -j all2all" Failed_ > May 8 15:50:58 localhost shorewall: Processing /etc/shorewall/stop ... > May 8 15:50:58 localhost shorewall: IP Forwarding Enabled > May 8 15:50:58 localhost shorewall: Processing /etc/shorewall/stopped ... > May 8 15:50:58 localhost root: Shorewall Stopped > May 8 15:50:58 localhost shorewall: Iniciación de shorewall failed > > _*[root@localhost shorewall]# shorewall check*_ > Loading /usr/share/shorewall/functions... > Processing /etc/shorewall/params ... > Processing /etc/shorewall/shorewall.conf... > Loading Modules... > Shorewall has detected the following iptables/netfilter capabilities: > NAT: Available > Packet Mangling: Available > Multi-port Match: Available > Extended Multi-port Match: Not available > Connection Tracking Match: Available > Packet Type Match: Available > Policy Match: Not available > Physdev Match: Available > IP range Match: Available > Recent Match: Available > Owner Match: Available > Ipset Match: Not available > CONNMARK Target: Not available > Connmark Match: Not available > Raw Table: Available > CLASSIFY Target: Available > Verifying Configuration... > Determining Zones... > IPv4_Zones: net loc > Firewall Zone: fw > Setting up IPSEC... > Validating interfaces file... > Validating hosts file... > Determining Hosts in Zones... > net Zone: vdpf0:eth0 > loc Zone: vdpf0:eth1 > Validating policy file... > Policy for loc to net is ACCEPT using chain loc2net > Policy for net to loc is DROP using chain net2all > Policy for net to fw is DROP using chain net2all > Policy for loc to fw is REJECT using chain all2all > Policy for fw to net is REJECT using chain all2all > Policy for fw to loc is REJECT using chain all2all > Checking Black List... > Validating Proxy ARP > Validating NAT... > Pre-validating Actions... > Pre-processing /usr/share/shorewall/action.Drop... > ..Expanding Macro /usr/share/shorewall/macro.Auth... > ..End Macro > ..Expanding Macro /usr/share/shorewall/macro.AllowICMPs... > ..End Macro > ..Expanding Macro /usr/share/shorewall/macro.SMB... > ..End Macro > ..Expanding Macro /usr/share/shorewall/macro.DropUPnP... > ..End Macro > ..Expanding Macro /usr/share/shorewall/macro.DropDNSrep... > ..End Macro > Pre-processing /usr/share/shorewall/action.Reject... > Pre-processing /usr/share/shorewall/action.Limit... > Validating rules file... > Rule "ACCEPT net fw TCP 20,21,22,25,80,110,143,443,995,465 " checked. > Rule "ACCEPT loc net TCP 20,21,22,25,80,110,143,443,995,465 " checked. > Rule "ACCEPT loc net UDP 20,21,22,25,80,110,143,443,995,465 " checked. > Validating Actions... > Generating Transitive Closure of Used-action List... > Processing /usr/share/shorewall/action.Drop for Chain Drop... > ..Expanding Macro /usr/share/shorewall/macro.Auth... > Rule "REJECT - - tcp 113 - -" checked. > ..End Macro > Rule "dropBcast " checked. > ..Expanding Macro /usr/share/shorewall/macro.AllowICMPs... > Rule "ACCEPT - - icmp fragmentation-needed - -" checked. > Rule "ACCEPT - - icmp time-exceeded - -" checked. > ..End Macro > Rule "dropInvalid " checked. > ..Expanding Macro /usr/share/shorewall/macro.SMB... > Rule "DROP - - udp 135,445 - -" checked. > Rule "DROP - - udp 137:139 - -" checked. > Rule "DROP - - udp 1024: 137 -" checked. > Rule "DROP - - tcp 135,139,445 - -" checked. > ..End Macro > ..Expanding Macro /usr/share/shorewall/macro.DropUPnP... > Rule "DROP - - udp 1900 - -" checked. > ..End Macro > Rule "dropNotSyn - - tcp " checked. > ..Expanding Macro /usr/share/shorewall/macro.DropDNSrep... > Rule "DROP - - udp - 53 -" checked. > ..End Macro > Processing /usr/share/shorewall/action.Reject for Chain Reject... > ..Expanding Macro /usr/share/shorewall/macro.Auth... > Rule "REJECT - - tcp 113 - -" checked. > ..End Macro > Rule "dropBcast " checked. > ..Expanding Macro /usr/share/shorewall/macro.AllowICMPs... > Rule "ACCEPT - - icmp fragmentation-needed - -" checked. > Rule "ACCEPT - - icmp time-exceeded - -" checked. > ..End Macro > Rule "dropInvalid " checked. > ..Expanding Macro /usr/share/shorewall/macro.SMB... > Rule "REJECT - - udp 135,445 - -" checked. > Rule "REJECT - - udp 137:139 - -" checked. > Rule "REJECT - - udp 1024: 137 -" checked. > Rule "REJECT - - tcp 135,139,445 - -" checked. > ..End Macro > ..Expanding Macro /usr/share/shorewall/macro.DropUPnP... > Rule "DROP - - udp 1900 - -" checked. > ..End Macro > Rule "dropNotSyn - - tcp " checked. > ..Expanding Macro /usr/share/shorewall/macro.DropDNSrep... > Rule "DROP - - udp - 53 -" checked. > ..End Macro > Masqueraded Networks and Hosts: > To 0.0.0.0/0 (all) from 0.0.0.0/0 through vdpf0 > Validating /etc/shorewall/tcdevices... > Validating /etc/shorewall/tcclasses... > Configuration Validated > > Notice: The ''check'' command is provided to catch > obvious errors in a Shorewall configuration. > It is not designed to catch all possible errors > so please don''t submit problem reports about > error conditions that ''check'' doesn''t find > > _*My scripts Network interfaces:*_ > Ifcfg-eth0 > DEVICE=eth0 > TYPE=Ethernet > BRIDGE=vdpf0 > ONBOOT=yes > BOOTPROTO=static > > Ifcfg-eth1 > DEVICE=eth1 > TYPE=ETHER > BRIDGE=vdpf0 > ONBOOT=yes > BOOTPROTO=static > > Ifcfg-vdpf0 > DEVICE=vdpf0 > TYPE=Bridge > IPADDR=192.168.64.253 > NETMASK=255.255.255.0 > GATEWAY=192.168.64.250 > ONBOOT=yes > STP=no > > _*My scripts Shorewall:*_ > HOSTS: > #ZONE HOST(S) OPTIONS > net vdpf0:eth0 > loc vdpf0:eth1 > #LAST LINE -- ADD YOUR ENTRIES BEFORE THIS LINE -- DO NOT REMOVE > > INTERFACES: > #ZONE INTERFACE BROADCAST OPTIONS > - vdpf0 192.168.64.255 > #LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE > > MASQ > #INTERFACE SUBNET ADDRESS PROTO PORT(S) IPSEC > #LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE > eth0 vdpf0 > > MACLIST > #INTERFACE MAC IP ADDRESSES (Optional) > #LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE > vdpf0:eth0 00:0F:20:2C:7D:46 > > ROUTESTOPED > #INTERFACE HOST(S) OPTIONS > vdpf0 - routeback > > #LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE > > ZONES > #ZONE TYPE OPTIONS IN OUT > # OPTIONS OPTIONS > fw firewall > net ipv4 > loc ipv4 > #LAST LINE - ADD YOUR ENTRIES ABOVE THIS ONE - DO NOT REMOVE > > RULES > #ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL RATE > USER//etc/shorewall/zones > > # PORT PORT(S) DEST #LIMIT GROUP > #SECTION ESTABLISHED > #SECTION RELATED > #SECTION NEW > #ACTION SOURCE DEST PROTO DEST > # PORT > ACCEPT net fw TCP 20,21,22,25,80,110,143,443,995,465 > ACCEPT loc net TCP 20,21,22,25,80,110,143,443,995,465 > ACCEPT loc net UDP 20,21,22,25,80,110,143,443,995,465 > #LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE > > >-- Ray Booysen rj_booysen@rjb.za.net ------------------------------------------------------- Using Tomcat but need to do more? Need to support web services, security? Get stuff done quickly with pre-integrated technology to make your job easier Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642
Tom Eastep
2006-May-15 16:09 UTC
Re: ERROR: Command "/sbin/iptables -A OUTPUT -o vdpf0 -d eth0 -j all2all" Failed
Ray Booysen wrote:> iptables is telling shorewall that eth0 cannot be found. Are you sure > the interface is up and working correctly? >See my earlier response to the OP. "-d eth0" is illegal iptables syntax since the argument to "-d" is expected to be an IP address rather than an interface name. It indicates that BRIDGING is not set to Yes in /etc/shorewall/shorewall.conf. -Tom -- Tom Eastep \ Nothing is foolproof to a sufficiently talented fool Shoreline, \ http://shorewall.net Washington USA \ teastep@shorewall.net PGP Public Key \ https://lists.shorewall.net/teastep.pgp.key