Displaying 20 results from an estimated 900 matches similar to: "TPROXY/IPv6: Documentation bugs?"
2017 Aug 08
1
CentOS6, IP6tables, Routing, TPROXY (squid34 epel package)
Hello,
how do achieve this:
how must files /etc/sysconfig/network-scripts/ look like to be the same as
entering the following two commands ...
ip -f inet6 rule add fwmark 1 lookup 100
ip -f inet6 route add local ::/0 dev lo table 100
is there the localhost device lo correct, or does it have to be br0?
e.g.
a file route-br0 with
192.168.1.0/24 via 10.10.10.1 dev br0
does the routing to the
2010 Jun 15
4
TPROXY configuration
I''m trying to get TPROXY / Squid running and I have a few questions...
I found this page:
http://www.shorewall.net/Shorewall_Squid_Usage.html#TPROXY
However, it doesn''t explain what I''m seeing in the configuration.
For the zone file, do I keep my loc and net configurations and just add
the following to the file?
- lo - -
or do I remove the loc and net zones and
2018 Dec 19
5
[Bug 1310] New: syntax issue with tproxy
https://bugzilla.netfilter.org/show_bug.cgi?id=1310
Bug ID: 1310
Summary: syntax issue with tproxy
Product: nftables
Version: unspecified
Hardware: All
OS: Debian GNU/Linux
Status: NEW
Severity: normal
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
2020 Jan 16
2
[Bug 1398] New: tproxy rule is not matched for ip6
https://bugzilla.netfilter.org/show_bug.cgi?id=1398
Bug ID: 1398
Summary: tproxy rule is not matched for ip6
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Ubuntu
Status: NEW
Severity: normal
Priority: P5
Component: kernel
Assignee: pablo at netfilter.org
2019 Oct 15
0
Attempting to use tproxy on Centos 8 fails with 'No such file or directory'
On 2019-10-15 12:12 p.m., Nathan Coulson wrote:
> I was working on a haproxy transparent proxy setup that we had working
> on Centos 7 (iptables), but running into issues getting tproxy working
> with NFTables on Centos 8.
>
> From https://www.kernel.org/doc/Documentation/networking/tproxy.txt,
>
> It should be a matter of:
>
> # nft add table filter
> # nft add
2019 Oct 15
1
Attempting to use tproxy on Centos 8 fails with 'No such file or directory'
On 10/15/19 9:16 PM, Nathan Coulson wrote:
> On 2019-10-15 12:12 p.m., Nathan Coulson wrote:
>> I was working on a haproxy transparent proxy setup that we had working
>> on Centos 7 (iptables), but running into issues getting tproxy working
>> with NFTables on Centos 8.
>>
>> From https://www.kernel.org/doc/Documentation/networking/tproxy.txt,
>>
>> It
2019 Oct 15
2
Attempting to use tproxy on Centos 8 fails with 'No such file or directory'
I was working on a haproxy transparent proxy setup that we had working
on Centos 7 (iptables), but running into issues getting tproxy working
with NFTables on Centos 8.
>From https://www.kernel.org/doc/Documentation/networking/tproxy.txt,
It should be a matter of:
# nft add table filter
# nft add chain filter divert "{ type filter hook prerouting priority -150; }"
# nft add rule
2012 May 18
11
Shorewall 4.5.4 Beta 3
4.5.4 Beta 3 is now available for testing. I apologize for the
back-to-back Betas but I guess it''s better to find these problems during
the Beta period rather than later.
Problems corrected:
1) This release includes all defect repairs from Shorewall 4.5.3.1.
2) When EXPORTMODULES=No in shorewall.conf, the following errors were
issued:
/usr/share/shorewall/modules: line 19:
2012 May 18
11
Shorewall 4.5.4 Beta 3
4.5.4 Beta 3 is now available for testing. I apologize for the
back-to-back Betas but I guess it''s better to find these problems during
the Beta period rather than later.
Problems corrected:
1) This release includes all defect repairs from Shorewall 4.5.3.1.
2) When EXPORTMODULES=No in shorewall.conf, the following errors were
issued:
/usr/share/shorewall/modules: line 19:
2012 May 08
19
Shorewall, TPROXY, Transparent Squid and Multiples ISP
Hello,
I wonder if someone could use the TPROXY with Shorewall and
transparent Squid with using the routing rules on shorewall
(tcrules) for hosts / networks (LAN) with multiples providers (WANs)
directly from the internal network on port 80 (with TPROXY
transparent squid or REDIRECT).
On this issue, the routing rules is not work propertly because the
source is the
2013 Jun 28
0
IPv6 two or more providers, duplicating routing table does not work
Hello,
shorewall6 seem to have problems duplicating the main routing table. shorewall6 tries to add the fe80::/64 route of every ipv6 configured interface to routing table 1.
The first route applies but the other ones not.
If i try to add the routes manually to routing table 1 i have to add the first fe80::/64 route and append not add the other ones.
does not work:
ip -6 route add table 1
2015 May 15
0
OT: Avoiding redirection loops with iptables tproxy
Hi all,
I have a hard trouble with my iptables rules. I need to create a
netfilter config so that it does not redirect connections from a daemon
(like for example a squid proxy) to the original destinations.
Searching info about that, some ways to do that include to limit the
redirection rules to the incoming traffic interface, another to limit it
to a certain range of source IPs or to
2012 Jan 11
0
Shorewall 4.5.0 Beta 3
Beta 3 is now available for testing.
Problems Corrected:
1) The value ''0'' is once again accepted in the IN_BANDWIDTH columns of
tcinterfaces and tcrules, and causes no ingress policing to be
configured.
2) MARK_IN_FORWARD_CHAIN=Yes no longer generates an error when
$FW:<address> is entered in the SOURCE column of the tcrules file.
New Features:
1) The
2012 Jan 11
0
Shorewall 4.5.0 Beta 3
Beta 3 is now available for testing.
Problems Corrected:
1) The value ''0'' is once again accepted in the IN_BANDWIDTH columns of
tcinterfaces and tcrules, and causes no ingress policing to be
configured.
2) MARK_IN_FORWARD_CHAIN=Yes no longer generates an error when
$FW:<address> is entered in the SOURCE column of the tcrules file.
New Features:
1) The
2013 Nov 19
7
IPv6 connections won't be rejected nor logged
Hi,
I have servers where shorewall6 won''t reject nor log:
# cat /etc/shorewall6/zones
fw firewall
net ipv6
# cat /etc/shorewall6/interfaces
net eth1 tcpflags
(I also tried without "tcpflags", but no changes)
# cat /etc/shorewall6/policy
$FW all ACCEPT
all all REJECT info
# cat /etc/shorewall6/rules
SECTION NEW
(for testing, I removed all the rules)
I am testing from
2009 Dec 06
6
shorewall6-lite's shorecap sourcing /usr/share/shorewall-lite/lib.base?
Hey all,
Just a sanity check, but should the shorecap script in shorewall6-lite
be sourcing /usr/share/shorewall6-lite/lib.base rather
than /usr/share/shorewall-lite/lib.base like it does currently?
In fact shouldn''t there be a general s/shorewall-lite/shorewall6-lite/
in shorecap in shorewall6-lite? Maybe there is more of that lurking
about as well.
Also, the first line of the
2011 Dec 04
6
Shorewall 4.4.27 Beta 1
Beta 1 is now available for testing.
One of the problems I''ve had with the Shorewall products is trying to keep them all in sync. There have been two copies of each shell library and four CLI programs.
To simplify maintenance, I have collapsed each of the library pairs into a single library and have reduced the number of CLI programs from four to two (one for the
2011 Dec 04
6
Shorewall 4.4.27 Beta 1
Beta 1 is now available for testing.
One of the problems I''ve had with the Shorewall products is trying to keep them all in sync. There have been two copies of each shell library and four CLI programs.
To simplify maintenance, I have collapsed each of the library pairs into a single library and have reduced the number of CLI programs from four to two (one for the
2012 Feb 20
5
Upgrade from Shorewall 4.4.27.3 to 4.5.0.1
I''d like to ask for clarification on the upgrade procedure using tarballs. In the past, with version 4.4, I have downloaded shorewall-4.4.x.y.tar.bz2 and shorewall6-4.4.x.y.tar.bz2, extracted each, and executed ''install.sh -s'' in each directory.
Now there is a new package shorewall-core-4.5.x.y.tar.bz2. As I understand it, with version 4.5, this core package needs to be
2023 Jun 02
3
[Bug 1686] New: Transparent proxy support requires transport protocol match
https://bugzilla.netfilter.org/show_bug.cgi?id=1686
Bug ID: 1686
Summary: Transparent proxy support requires transport protocol
match
Product: nftables
Version: git (please specify your HEAD)
Hardware: x86_64
OS: All
Status: NEW
Severity: enhancement
Priority: P5