[Bug 464] New: state match sometimes failes RELATED, ESTABLISHED matches

bugzilla-daemon at bugzilla.netfilter.org bugzilla-daemon at bugzilla.netfilter.org
Thu Mar 23 17:01:34 CET 2006


https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=464

           Summary: state match sometimes failes RELATED,ESTABLISHED matches
           Product: netfilter/iptables
           Version: linux-2.6.x
          Platform: i386
        OS/Version: Debian GNU/Linux
            Status: NEW
          Severity: normal
          Priority: P2
         Component: unknown
        AssignedTo: laforge at netfilter.org
        ReportedBy: joerg at dorchain.net


I have a fairly complex setup using the filter table combined with a simple nat
table.

Until recently, everything worked well, but (maybe since the current kernel,
sorry for not tracking it more closely) now sometimes my state match fails. This
happens almost reliably when trying to login on a certain webserver via https
where the login-form is on a http page.

As a workaround, I installed a tcp rules matching on SYN flags. Counters on that
rules go up, so it is actually reached.

Here are excerpts from my filter rules (iptables -n -v -L). This fragment is
called from the input and forward chains. Outgoing packets are all allowed.

2     649K  287M RETURN     all  --  *      *       0.0.0.0/0           
0.0.0.0/0           state RELATED,ESTABLISHED
3    32033 2289K RETURN     all  --  !ppp0  *       0.0.0.0/0            0.0.0.0/0
4      162 41323 RETURN     tcp  --  *      *       0.0.0.0/0           
0.0.0.0/0           tcp flags:!0x17/0x02

Line 4 with the tcp match was inserted recently and was not necessary before.
IMHO the this line should never be reached as a) packets coming in via
interfaces other than ppp0 are allowed and b) packets for existing connections
are allowed.

the nat table looks like this:
Chain PREROUTING (policy ACCEPT 49985 packets, 4356K bytes)
num   pkts bytes target     prot opt in     out     source               destination

Chain POSTROUTING (policy ACCEPT 53061 packets, 4356K bytes)
num   pkts bytes target     prot opt in     out     source               destination
1    84565 6603K MASQUERADE  all  --  *      ppp0    0.0.0.0/0            0.0.0.0/0

Chain OUTPUT (policy ACCEPT 137K packets, 11M bytes)
num   pkts bytes target     prot opt in     out     source               destination


This all happens on a Debian testing system, vanilla kernel 2.6.15 (2.6.16 after
next reboot), iptables v1.3.3. Maybe the fact that ppp0 is pppoe and there is a
rule -A FORWARD -o ppp0 -p tcp -m tcp --tcp-flags SYN,RST SYN -j TCPMSS
--clamp-mss-to-pmtu helps

Bye,

Joerg

-- 
Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.



More information about the netfilter-buglog mailing list