I have an issue where my bridging firewall no longer drops traffic. Everything looks like it should be working but I can still access things I shouldn't. I am wondering if my use case is no longer supported.
This system worked well for years. When I updated from Debian 6 to Debian 7 ( It was really the kernel updates) the bridge no longer passed traffic. This is because I had no VLAN configurations, but the traffic crossing the bridge is VLANed. Apparently the bridge used to just pass the traffic anyway. My understanding is that the bridge now operates more like a switch in that if it does not have an interface in that VLAN then it does not forward the traffic. Logical to me. So I reconfigured the bridge to use VLANs and it works well. All traffic is VLANed (no untagged VLANs in use) and the traffic passes through and services work correctly. The issue is that even with very specific firewall rules, the traffic is not dropped (or there is a duplicate flow) because I am able to access thing that I should not be able to. The firewall rules (with DROP) target are incrementing in conjunction with the traffic I generate, but yet I can still access things. I tried to change the target to different things, but they are not working either. I tried changing the target to TRACE, but that did not generate any output - even though the counters for the rule incremented. I make use of CLASSIFY, and that is not working, and I tried MARK instead and it doesn't work. When the drop rule for my specific IP increments (only when I access a server) and I can still browse a webserver, then that tells me that either: The traffic is not dropped even though iptables matched it to a drop rule Or the packet is dropped but there are multiple packets. But I have not seen this in a packet capture. So is a bridge with VLANs and iptables supported? Under what circumstances would iptables match traffic to a DROP target but not drop the traffic? Under what circumstances would the bridge circumvent iptables? net.bridge.bridge-nf-call-arptables = 1 net.bridge.bridge-nf-call-iptables = 1 net.bridge.bridge-nf-call-ip6tables = 1 net.bridge.bridge-nf-filter-vlan-tagged = 1 net.bridge.bridge-nf-filter-pppoe-tagged = 0 When I turn off net.bridge.bridge-nf-call-iptables, the iptables rules no longer increment. Turn them on and the rules increment again as expected. bridge name bridge id STP enabled interfaces bra0 8000.001b21b18c10 yes eth0.1 eth1.1 bra100 8000.001b21b18c10 yes eth0.100 eth1.100 bra102 8000.001b21b18c10 yes eth0.102 eth1.102 brb0 8000.001b21b18c14 yes eth2.1 eth3.1 brb100 8000.001b21b18c14 yes eth2.100 eth3.100 brb102 8000.001b21b18c14 yes eth2.102 eth3.102 Thanks, Andy -- To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/62036c7d34ac114faad0b9d10f11ea562be1c...@txexmb01.mouser.lan