Maik Brauer writes:
> after installing XEN 3.0.4-1 and setting up iptables for that, I've some
> problems with the ctstate traffic, which is
> blocked from IPtables. Below a short printout is available from my
> /var/log/kern.log:
> --------
> May 13 17:05:13 debian4 kernel: IN=eth0 OUT= PHYSIN=peth0 PHYSOUT=vif0.0
> MAC=00:13:8f:0f:5b:c7:00:04:0e:66:da:c8:08:00 SRC=172.16.76.15
> DST=172.16.76.99 LEN=117 TOS=0x00 PREC=0x00 TTL=64 ID=2091 PROTO=UDP
> SPT=53 DPT=32769 LEN=97
I recently upgraded to Xen 3.0.4-1, and encountered the same (or very similar)
problem.
May 13 12:51:25 elysium INPUT IN=eth0 OUT= PHYSIN=peth0 PHYSOUT=vif0.0
MAC=00:0f:ea:43:13:6a:00:14:bf:94:c1:0f:08:00 SRC=199.7.66.1 DST=10.137.1.1
LEN=268 TOS=0x00 PREC=0x00 TTL=58 ID=62618 DF PROTO=UDP SPT=53 DPT=33689 LEN=248
My firewall rules are automatically generated (from a Haskell script), and
worked fine with the earlier version of Xen. The rules are a bit lengthy, so I
have appended a cut-down version of them at the end of this message (the omitted
rules deal with other ports, which should be irrelevant).
> So to avoid that the firewall will block the traffic though the bridge I
> can use the command:
>
> sysctl -w net.bridge.bridge-nf-call-iptables="0"
This also restores traffic for me - thank you.
> which is working. Then everthing is fine. But this is not the real
> solution. It should work without this.
> So my question is now, did I forget something or is this a known bug in XEN.
I have the same question.
> Is anybody who is sharing this problem with me
I think I am.
Tim
---
Chain INPUT (policy ACCEPT 507 packets, 83922 bytes)
pkts bytes target prot opt in out source destination
0 0 DROP tcp -- any any anywhere anywhere
tcp flags:FIN,SYN,RST,PSH,ACK,URG/FIN,SYN,RST,PSH,ACK,URG
0 0 DROP tcp -- any any anywhere anywhere
tcp flags:FIN,SYN,RST,PSH,ACK,URG/FIN,SYN,RST,ACK,URG
0 0 DROP tcp -- any any anywhere anywhere
tcp flags:FIN,SYN,RST,PSH,ACK,URG/FIN,PSH,URG
0 0 DROP tcp -- any any anywhere anywhere
tcp flags:FIN,SYN,RST,PSH,ACK,URG/NONE
0 0 DROP tcp -- any any anywhere anywhere
tcp flags:SYN,RST/SYN,RST
0 0 DROP tcp -- any any anywhere anywhere
tcp flags:FIN,SYN/FIN,SYN
7129 2290K ACCEPT all -- any any anywhere anywhere
state RELATED,ESTABLISHED
2 264 ACCEPT tcp -- eth0 any anywhere anywhere
tcp dpt:ssh limit: avg 3/sec burst 5
0 0 ACCEPT tcp -- eth0 any anywhere anywhere
tcp dpt:domain limit: avg 3/sec burst 5
68 4154 ACCEPT udp -- eth0 any anywhere anywhere
udp dpt:domain limit: avg 3/sec burst 5
266 15992 ACCEPT all -- lo any anywhere anywhere
/* Accept everything on loop back (lo) */
3 252 ACCEPT icmp -- any any anywhere anywhere
icmp echo-reply limit: avg 3/sec burst 5
1 88 ACCEPT icmp -- any any anywhere anywhere
icmp destination-unreachable limit: avg 3/sec burst 5
1 84 ACCEPT icmp -- any any anywhere anywhere
icmp echo-request limit: avg 3/sec burst 5
0 0 ACCEPT icmp -- any any anywhere anywhere
icmp time-exceeded limit: avg 3/sec burst 5
90 15357 LOG all -- any any anywhere anywhere
LOG level warning prefix `INPUT '
90 15357 DROP all -- any any anywhere anywhere
Chain FORWARD (policy ACCEPT 823 packets, 631K bytes)
pkts bytes target prot opt in out source destination
0 0 DROP tcp -- any any anywhere anywhere
tcp flags:FIN,SYN,RST,PSH,ACK,URG/FIN,SYN,RST,PSH,ACK,URG
0 0 DROP tcp -- any any anywhere anywhere
tcp flags:FIN,SYN,RST,PSH,ACK,URG/FIN,SYN,RST,ACK,URG
0 0 DROP tcp -- any any anywhere anywhere
tcp flags:FIN,SYN,RST,PSH,ACK,URG/FIN,PSH,URG
0 0 DROP tcp -- any any anywhere anywhere
tcp flags:FIN,SYN,RST,PSH,ACK,URG/NONE
0 0 DROP tcp -- any any anywhere anywhere
tcp flags:SYN,RST/SYN,RST
0 0 DROP tcp -- any any anywhere anywhere
tcp flags:FIN,SYN/FIN,SYN
139 20954 ACCEPT all -- any any anywhere anywhere
state RELATED,ESTABLISHED
44 3112 ACCEPT all -- any any anywhere anywhere
PHYSDEV match --physdev-in vif0.0
0 0 ACCEPT all -- any any anywhere anywhere
PHYSDEV match --physdev-in rat.0
0 0 ACCEPT all -- any any anywhere anywhere
PHYSDEV match --physdev-in rat.0
0 0 ACCEPT all -- any any anywhere anywhere
PHYSDEV match --physdev-in pro.0
0 0 ACCEPT tcp -- any any anywhere anywhere
tcp dpt:ssh PHYSDEV match --physdev-out vif0.0 limit: avg 3/sec burst 5
0 0 ACCEPT tcp -- any any anywhere anywhere
tcp dpt:domain PHYSDEV match --physdev-out vif0.0 limit: avg 3/sec
burst 5
1 57 ACCEPT udp -- any any anywhere anywhere
udp dpt:domain PHYSDEV match --physdev-out vif0.0 limit: avg 3/sec
burst 5
0 0 ACCEPT tcp -- any any anywhere anywhere
tcp dpt:ssh PHYSDEV match --physdev-out rat.0 limit: avg 3/sec burst 5
0 0 ACCEPT tcp -- any any anywhere anywhere
tcp dpt:ssh PHYSDEV match --physdev-out pro.0 limit: avg 3/sec burst 5
0 0 ACCEPT icmp -- any any anywhere anywhere
icmp echo-reply limit: avg 3/sec burst 5
0 0 ACCEPT icmp -- any any anywhere anywhere
icmp destination-unreachable limit: avg 3/sec burst 5
3 252 ACCEPT icmp -- any any anywhere anywhere
icmp echo-request limit: avg 3/sec burst 5
0 0 ACCEPT icmp -- any any anywhere anywhere
icmp time-exceeded limit: avg 3/sec burst 5
9 1161 LOG all -- any any anywhere anywhere
LOG level warning prefix `FORWARD '
9 1161 DROP all -- any any anywhere anywhere
Chain OUTPUT (policy ACCEPT 470 packets, 560K bytes)
pkts bytes target prot opt in out source destination
7819 4710K ACCEPT all -- any any anywhere anywhere
_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users
|