Package: shorewall
Version: 2.0.7-1
Severity: important

Hello,

We route outgoing packets for several satellite connections.

After a big set of upgrades (including kernel version) today, these asymmetric 
connections stopped
working.

I found the culprit:

Chain FORWARD (policy DROP 62 packets, 3392 bytes)
 pkts bytes target     prot opt in     out     source
 destination
45  2557 DROP      !icmp --  *      *       0.0.0.0/0 0.0.0.0/0 state INVALID
[...]

This rule is the very first one listed for FORWARD, and the second one
for INPUT and OUTPUT (the first one is lo specific).

On one hand I suspect this use to work, and with recent kernel
versions (2.6.9+) the meaning of INVALID has become more strict.

One the other hand, I haven't set dropunclean for any of the interfaces,
and checking the value this early would seem to render LOGUNCLEAN
invalid, as any unclean packets have already been dropped before it
gets this far.

I have already changed the newnotsyn file/rule to cope with my
asymmetric routing needs, but this isn't used until after the packets
are already dropped.

I also checked my 2.0.13-1 shorewall firewall and it has the same rules
listed.

Alternatively, if I am missing something obvious (such as a config
parameter that controls this behaviour), please let me know.

-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)
Kernel: Linux 2.6.8-2-k7
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages shorewall depends on:
ii  debconf                       1.4.30.11  Debian configuration management sy
ii  iproute                       20041019-2 Professional tools to control the 
ii  iptables                      1.2.11-8   Linux kernel 2.4+ iptables adminis

-- debconf information excluded


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to