[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re (4): OpenVPN server mode usage.



From:	Bob Proulx <bob@proulx.com>
Date:	Mon, 10 Jan 2011 21:55:10 -0700
> x: echo foo | nc -u y 1149
> 
> You should see that show up in your tcpdump traces.

You've tried this on your system?  Or least can detect the datagram  
leaving the orginating system?

From:	Mike Bird <mgb-debian@yosemite.net>
Date:	Tue, 11 Jan 2011 14:39:13 -0800
> Anything interesting in the /etc/openvpn/*, or in the output
> of "iptables-save" or of "route -n" or of "ifconfig"?

Incidentally, telnet and daytime haven't worked in dalton since last Spring.   

root@dalton:/etc/openvpn# cat /etc/openvpn/myvpn.conf
# dalton:/etc/openvpn/myvpn.conf 
# 
# Default protocol is udp. 
# Default port is 1194. 
# Joule has a dynamic address. 
mode server
dev tun 
ifconfig 10.4.0.2 10.4.0.1 
verb 5 
secret /root/key 1 
# Machines in the local home zone reached _via_ the tunnel. 
# Curie 
route 172.23.4.2 
# Heaviside 
route 172.23.5.2 
# Shaw mail servers _via_ the tunnel. 
# route shawmail.gv.shawcable.net 
route 64.59.128.135 
route 24.71.223.43 
# Shaw ftp server _via_ the tunnel. 
# route ftp.shaw.ca 
route 64.59.128.134

I haven't touched /etc/openvpn/update-resolv-conf.  It remains 
exactly as installed.

root@dalton:/etc/openvpn# ip route show
142.103.107.128/25 dev eth0  proto kernel  scope link  src 142.103.107.137 
172.24.1.0/24 dev LocLCS106703196  proto kernel  scope link  src 172.24.1.1 
default via 142.103.107.254 dev eth0 

root@dalton:/etc/openvpn# ip addr show
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN 
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
    inet6 ::1/128 scope host 
       valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP qlen 1000
    link/ether 00:02:55:d9:a7:ef brd ff:ff:ff:ff:ff:ff
    inet 142.103.107.137/25 brd 142.103.107.255 scope global eth0
    inet6 fe80::202:55ff:fed9:a7ef/64 scope link 
       valid_lft forever preferred_lft forever
3: LocLCS106703196: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP qlen 1000
    link/ether 00:16:b6:ef:1d:6c brd ff:ff:ff:ff:ff:ff
    inet 172.24.1.1/24 brd 172.24.1.255 scope global LocLCS106703196
    inet6 fe80::216:b6ff:feef:1d6c/64 scope link 
       valid_lft forever preferred_lft forever

root@dalton:/etc/openvpn# iptables-save
# Generated by iptables-save v1.4.8 on Tue Jan 11 17:46:23 2011
*raw
:PREROUTING ACCEPT [64233:10270729]
:OUTPUT ACCEPT [54270:6788049]
COMMIT
# Completed on Tue Jan 11 17:46:23 2011
# Generated by iptables-save v1.4.8 on Tue Jan 11 17:46:23 2011
*nat
:PREROUTING ACCEPT [9450:1202948]
:POSTROUTING ACCEPT [18164:1299072]
:OUTPUT ACCEPT [18164:1299072]
:eth0_masq - [0:0]
-A POSTROUTING -o eth0 -j eth0_masq 
-A eth0_masq -s 172.24.0.0/16 -j MASQUERADE 
COMMIT
# Completed on Tue Jan 11 17:46:23 2011
# Generated by iptables-save v1.4.8 on Tue Jan 11 17:46:23 2011
*mangle
:PREROUTING ACCEPT [64234:10270769]
:INPUT ACCEPT [62019:9683981]
:FORWARD ACCEPT [1905:577508]
:OUTPUT ACCEPT [54271:6788557]
:POSTROUTING ACCEPT [56176:7366065]
:tcfor - [0:0]
:tcout - [0:0]
:tcpost - [0:0]
:tcpre - [0:0]
-A PREROUTING -j tcpre 
-A FORWARD -j MARK --set-xmark 0x0/0xff 
-A FORWARD -j tcfor 
-A OUTPUT -j tcout 
-A POSTROUTING -j tcpost 
COMMIT
# Completed on Tue Jan 11 17:46:23 2011
# Generated by iptables-save v1.4.8 on Tue Jan 11 17:46:23 2011
*filter
:INPUT DROP [0:0]
:FORWARD DROP [0:0]
:OUTPUT DROP [0:0]
:Drop - [0:0]
:Loc+_fwd - [0:0]
:Loc+_in - [0:0]
:Reject - [0:0]
:dropBcast - [0:0]
:dropInvalid - [0:0]
:dropNotSyn - [0:0]
:dynamic - [0:0]
:fw2loc - [0:0]
:fw2net - [0:0]
:fw2vpn - [0:0]
:loc2fw - [0:0]
:loc2net - [0:0]
:loc2vpn - [0:0]
:loc_frwd - [0:0]
:logdrop - [0:0]
:logflags - [0:0]
:logreject - [0:0]
:net2fw - [0:0]
:net2loc - [0:0]
:net2vpn - [0:0]
:net_frwd - [0:0]
:ppp+_fwd - [0:0]
:ppp+_in - [0:0]
:reject - [0:0]
:shorewall - [0:0]
:smurflog - [0:0]
:smurfs - [0:0]
:tcpflags - [0:0]
:vpn2fw - [0:0]
:vpn2loc - [0:0]
:vpn2net - [0:0]
:vpn_frwd - [0:0]
-A INPUT -m conntrack --ctstate INVALID,NEW -j dynamic 
-A INPUT -i eth0 -j net2fw 
-A INPUT -i Loc+ -j Loc+_in 
-A INPUT -i ppp+ -j ppp+_in 
-A INPUT -i tun0 -j vpn2fw 
-A INPUT -i lo -j ACCEPT 
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT 
-A INPUT -j Reject 
-A INPUT -j LOG --log-prefix "Shorewall:INPUT:REJECT:" --log-level 6 
-A INPUT -g reject 
-A FORWARD -m conntrack --ctstate INVALID,NEW -j dynamic 
-A FORWARD -i eth0 -j net_frwd 
-A FORWARD -i Loc+ -j Loc+_fwd 
-A FORWARD -i ppp+ -j ppp+_fwd 
-A FORWARD -i tun0 -j vpn_frwd 
-A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT 
-A FORWARD -j Reject 
-A FORWARD -j LOG --log-prefix "Shorewall:FORWARD:REJECT:" --log-level 6 
-A FORWARD -g reject 
-A OUTPUT -o eth0 -j fw2net 
-A OUTPUT -o Loc+ -j fw2loc 
-A OUTPUT -o ppp+ -j fw2loc 
-A OUTPUT -o tun0 -j fw2vpn 
-A OUTPUT -o lo -j ACCEPT 
-A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT 
-A OUTPUT -j ACCEPT 
-A Drop 
-A Drop -p tcp -m tcp --dport 113 -m comment --comment "Auth" -j reject 
-A Drop -j dropBcast 
-A Drop -p icmp -m icmp --icmp-type 3/4 -m comment --comment "Needed ICMP types" -j ACCEPT 
-A Drop -p icmp -m icmp --icmp-type 11 -m comment --comment "Needed ICMP types" -j ACCEPT 
-A Drop -j dropInvalid 
-A Drop -p udp -m multiport --dports 135,445 -m comment --comment "SMB" -j DROP 
-A Drop -p udp -m udp --dport 137:139 -m comment --comment "SMB" -j DROP 
-A Drop -p udp -m udp --sport 137 --dport 1024:65535 -m comment --comment "SMB" -j DROP 
-A Drop -p tcp -m multiport --dports 135,139,445 -m comment --comment "SMB" -j DROP 
-A Drop -p udp -m udp --dport 1900 -m comment --comment "UPnP" -j DROP 
-A Drop -p tcp -j dropNotSyn 
-A Drop -p udp -m udp --sport 53 -m comment --comment "Late DNS Replies" -j DROP 
-A Loc+_fwd -m conntrack --ctstate INVALID,NEW -j smurfs 
-A Loc+_fwd -p tcp -j tcpflags 
-A Loc+_fwd -j loc_frwd 
-A Loc+_in -m conntrack --ctstate INVALID,NEW -j smurfs 
-A Loc+_in -p tcp -j tcpflags 
-A Loc+_in -j loc2fw 
-A Reject 
-A Reject -p tcp -m tcp --dport 113 -m comment --comment "Auth" -j reject 
-A Reject -j dropBcast 
-A Reject -p icmp -m icmp --icmp-type 3/4 -m comment --comment "Needed ICMP types" -j ACCEPT 
-A Reject -p icmp -m icmp --icmp-type 11 -m comment --comment "Needed ICMP types" -j ACCEPT 
-A Reject -j dropInvalid 
-A Reject -p udp -m multiport --dports 135,445 -m comment --comment "SMB" -j reject 
-A Reject -p udp -m udp --dport 137:139 -m comment --comment "SMB" -j reject 
-A Reject -p udp -m udp --sport 137 --dport 1024:65535 -m comment --comment "SMB" -j reject 
-A Reject -p tcp -m multiport --dports 135,139,445 -m comment --comment "SMB" -j reject 
-A Reject -p udp -m udp --dport 1900 -m comment --comment "UPnP" -j DROP 
-A Reject -p tcp -j dropNotSyn 
-A Reject -p udp -m udp --sport 53 -m comment --comment "Late DNS Replies" -j DROP 
-A dropBcast -m addrtype --dst-type BROADCAST -j DROP 
-A dropBcast -d 224.0.0.0/4 -j DROP 
-A dropInvalid -m conntrack --ctstate INVALID -j DROP 
-A dropNotSyn -p tcp -m tcp ! --tcp-flags FIN,SYN,RST,ACK SYN -j DROP 
-A fw2loc -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT 
-A fw2loc -j ACCEPT 
-A fw2net -p udp -m udp --dport 67:68 -j ACCEPT 
-A fw2net -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT 
-A fw2net -p udp -m udp --dport 1194 -j ACCEPT 
-A fw2net -j ACCEPT 
-A fw2vpn -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT 
-A fw2vpn -j ACCEPT 
-A loc2fw -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT 
-A loc2fw -j ACCEPT 
-A loc2net -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT 
-A loc2net -j ACCEPT 
-A loc2vpn -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT 
-A loc2vpn -j ACCEPT 
-A loc_frwd -o eth0 -j loc2net 
-A loc_frwd -o Loc+ -j ACCEPT 
-A loc_frwd -o ppp+ -j ACCEPT 
-A loc_frwd -o tun0 -j loc2vpn 
-A logdrop -j DROP 
-A logflags -j LOG --log-prefix "Shorewall:logflags:DROP:" --log-level 6 --log-ip-options 
-A logflags -j DROP 
-A logreject -j reject 
-A net2fw -m conntrack --ctstate INVALID,NEW -j smurfs 
-A net2fw -p udp -m udp --dport 67:68 -j ACCEPT 
-A net2fw -p tcp -j tcpflags 
-A net2fw -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT 
-A net2fw -p udp -m udp --dport 1194 -j ACCEPT 
-A net2fw -p tcp -m tcp --dport 22 -m comment --comment "SSH" -j ACCEPT 
-A net2fw -p icmp -m icmp --icmp-type 8 -m comment --comment "Ping" -j DROP 
-A net2fw -p icmp -j ACCEPT 
-A net2fw -j Drop 
-A net2fw -j DROP 
-A net2loc -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT 
-A net2loc -p icmp -j ACCEPT 
-A net2loc -j Drop 
-A net2loc -j DROP 
-A net2vpn -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT 
-A net2vpn -j Drop 
-A net2vpn -j DROP 
-A net_frwd -m conntrack --ctstate INVALID,NEW -j smurfs 
-A net_frwd -p tcp -j tcpflags 
-A net_frwd -o Loc+ -j net2loc 
-A net_frwd -o ppp+ -j net2loc 
-A net_frwd -o tun0 -j net2vpn 
-A ppp+_fwd -m conntrack --ctstate INVALID,NEW -j smurfs 
-A ppp+_fwd -p tcp -j tcpflags 
-A ppp+_fwd -j loc_frwd 
-A ppp+_in -m conntrack --ctstate INVALID,NEW -j smurfs 
-A ppp+_in -p tcp -j tcpflags 
-A ppp+_in -j loc2fw 
-A reject -m addrtype --src-type BROADCAST -j DROP 
-A reject -s 224.0.0.0/4 -j DROP 
-A reject -p igmp -j DROP 
-A reject -p tcp -j REJECT --reject-with tcp-reset 
-A reject -p udp -j REJECT --reject-with icmp-port-unreachable 
-A reject -p icmp -j REJECT --reject-with icmp-host-unreachable 
-A reject -j REJECT --reject-with icmp-host-prohibited 
-A smurflog -j LOG --log-prefix "Shorewall:smurfs:DROP:" --log-level 6 
-A smurflog -j DROP 
-A smurfs -s 0.0.0.0/32 -j RETURN 
-A smurfs -m addrtype --src-type BROADCAST -g smurflog 
-A smurfs -s 224.0.0.0/4 -g smurflog 
-A tcpflags -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG FIN,PSH,URG -g logflags 
-A tcpflags -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG NONE -g logflags 
-A tcpflags -p tcp -m tcp --tcp-flags SYN,RST SYN,RST -g logflags 
-A tcpflags -p tcp -m tcp --tcp-flags FIN,SYN FIN,SYN -g logflags 
-A tcpflags -p tcp -m tcp --sport 0 --tcp-flags FIN,SYN,RST,ACK SYN -g logflags 
-A vpn2fw -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT 
-A vpn2fw -j ACCEPT 
-A vpn2loc -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT 
-A vpn2loc -j ACCEPT 
-A vpn2net -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT 
-A vpn2net -j ACCEPT 
-A vpn_frwd -o eth0 -j vpn2net 
-A vpn_frwd -o Loc+ -j vpn2loc 
-A vpn_frwd -o ppp+ -j vpn2loc 
COMMIT
# Completed on Tue Jan 11 17:46:23 2011


-- 
http://members.shaw.ca/peasthope/
http://carnot.yi.org/ = http://carnot.pathology.ubc.ca/



Reply to: