[Bug 730] New: DHCP request (and other?) traffic bypasses iptables/netfilter

bugzilla-daemon at bugzilla.netfilter.org bugzilla-daemon at bugzilla.netfilter.org
Tue Jul 26 05:06:01 CEST 2011


http://bugzilla.netfilter.org/show_bug.cgi?id=730

           Summary: DHCP request (and other?) traffic bypasses
                    iptables/netfilter
           Product: netfilter/iptables
           Version: linux-2.6.x
          Platform: x86_64
        OS/Version: Ubuntu
            Status: NEW
          Severity: major
          Priority: P5
         Component: unknown
        AssignedTo: netfilter-buglog at lists.netfilter.org
        ReportedBy: rcl24 at drexel.edu
   Estimated Hours: 0.0


Created an attachment (id=357)
 --> (http://bugzilla.netfilter.org/attachment.cgi?id=357)
My iptables ruleset for filter

Running Ubuntu 11.04 with iptables 1.4.10-1ubuntu1 and Ubuntu kernel
2.6.38-10-generic on x86-64 architecture.

I have my server configured to act as a NAT router connecting a private LAN to
the Internet.  The Internet is connected to eth0 and the LAN is connected to
eth1.  DHCP provides addressing and configuration for the LAN machines.  I have
an iptables setup to protect the server from both the Internet and the
computers on the LAN with a DROP by default policy for both interfaces.

Internet <--> (eth0) Server (eth1) <--> LAN

While auditing my iptables configuration, I realized that I had never allowed
port 67 access via eth1, and yet, the machines on my LAN were able to reach my
DHCP server.  At first I suspected that the basic firewall setup (Ubuntu's UFW)
had a liberal policy that allowed that traffic.  However, by manually reading
the rules, I determined that inbound traffic to port 67 should be blocked by
the rules.  I will attach my iptables filter rules as the file iptables.txt.

When I run wireshark and connect a computer to my LAN, I see a UDP packet come
into eth1 with source address 0.0.0.0:68 to destination 255.255.255.255:67.



More information about the netfilter-buglog mailing list