[Openswan Users] Port redirection (DNAT/REDIRECT chains) performed on the IPsec Peer interface
rsg
ranil.santhish at gmail.com
Tue Feb 19 05:34:20 EST 2008
This is a general question on a particular test performed(IPsec and
Transparent Proxy) using Openswan and Iptables.
[Peer 1-External IP] ========================== [Peer 2-External IP]
IPsec tunnel
Note: Peer to acts as a IPsec VPN peer as well as a Transparent proxy.
On Peer 2 Activate a DNAT or (TCP REDIRECT) rule for Transparent proxying
example: iptables -t nat -A PREROUTING -p tcp --dport 25 -j DNAT
--to-destination 192.168.200.1
192.168.200.1 is an internal interface listening on SMTP(TCP 25)
Once a TCP connection is initiated on any SMTP address e.g. smtp.yahoo.com
There is a new ESP packet generated from the address originated from
smtp.yahoo.com( 216.145.54.171) towards Peer 1-External IP which in
turn drops as this is not intended.
eg: output of TCPDUMP related to this ESP packet origination:
11:04:24.757204 IP (tos 0x0, ttl 64, id 30507, offset 0, flags [DF],
proto: ESP (50), length: 112) 216.145.54.171 > [Peer 1 External IP]:
ESP(spi=0x0019afce,seq=0x18ea), length 92
Eventually the smtp connection is not established and ip_conntrack
shows only a SYN_RECV upon packet re-writing.
eg output of: # cat /proc/net/ip_conntrack
tcp 6 54 SYN_RECV src=[any Source IP] dst=216.145.54.171 sport=60712
dport=25 packets=1 bytes=60 src=192.168.200.1 dst=[any Source IP]
sport=25 dport=60712 packets=8 bytes=480 mark=0 use=1
How to avoid the originatation of new ESP packet from the unintended
host(DNATed SMTP host)? Is there a different approach to achieve this
envionment?
Thanks in advance for your comments and suggestions.
rsg
More information about the Users
mailing list