Jump to content

RHudack

Members
  • Posts

    3
  • Joined

  • Last visited

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

RHudack's Achievements

Newbie

Newbie (1/14)

  1. It appears it was all USER ERROR! a capitol C in the word config inside the /etc/config/firewall file was the culprit. fw3 print showed the line with the error. Sorry for the post, likely can be deleted now.
  2. So after a bit more review it seems I just have one turtle that has a blank iptables config iptables -S from 2 units running v4 code have different outputs. Broken Turtle root@turtle:~# iptables -S -P INPUT ACCEPT -P FORWARD ACCEPT -P OUTPUT ACCEPT Working Turtles root@turtle:~# iptables -S -P INPUT DROP -P FORWARD DROP -P OUTPUT DROP -N delegate_forward -N delegate_input -N delegate_output -N forwarding_3gwan_rule -N forwarding_lan_rule -N forwarding_rule -N forwarding_vpn_rule -N forwarding_wan_rule -N input_3gwan_rule -N input_lan_rule -N input_rule -N input_vpn_rule -N input_wan_rule -N output_3gwan_rule -N output_lan_rule -N output_rule -N output_vpn_rule -N output_wan_rule -N reject -N syn_flood -N zone_3gwan_dest_ACCEPT -N zone_3gwan_dest_REJECT -N zone_3gwan_forward -N zone_3gwan_input -N zone_3gwan_output -N zone_3gwan_src_REJECT -N zone_lan_dest_ACCEPT -N zone_lan_forward -N zone_lan_input -N zone_lan_output -N zone_lan_src_ACCEPT -N zone_vpn_dest_ACCEPT -N zone_vpn_forward -N zone_vpn_input -N zone_vpn_output -N zone_vpn_src_ACCEPT -N zone_wan_dest_ACCEPT -N zone_wan_forward -N zone_wan_input -N zone_wan_output -N zone_wan_src_REJECT -A INPUT -j delegate_input -A FORWARD -j delegate_forward -A OUTPUT -j delegate_output -A delegate_forward -m comment --comment "user chain for forwarding" -j forwarding_rule -A delegate_forward -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT -A delegate_forward -i eth0 -j zone_lan_forward -A delegate_forward -i eth1 -j zone_wan_forward -A delegate_forward -i tun0 -j zone_vpn_forward -A delegate_forward -j reject -A delegate_input -i lo -j ACCEPT -A delegate_input -m comment --comment "user chain for input" -j input_rule -A delegate_input -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT -A delegate_input -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -j syn_flood -A delegate_input -i eth0 -j zone_lan_input -A delegate_input -i eth1 -j zone_wan_input -A delegate_input -i tun0 -j zone_vpn_input -A delegate_input -j reject -A delegate_output -o lo -j ACCEPT -A delegate_output -m comment --comment "user chain for output" -j output_rule -A delegate_output -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT -A delegate_output -o eth0 -j zone_lan_output -A delegate_output -o eth1 -j zone_wan_output -A delegate_output -o tun0 -j zone_vpn_output -A delegate_output -j reject -A reject -p tcp -j REJECT --reject-with tcp-reset -A reject -j REJECT --reject-with icmp-port-unreachable -A syn_flood -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m limit --limit 25/sec --limit-burst 50 -j RETURN -A syn_flood -j DROP -A zone_3gwan_forward -m comment --comment "user chain for forwarding" -j forwarding_3gwan_rule -A zone_3gwan_forward -m conntrack --ctstate DNAT -m comment --comment "Accept port forwards" -j ACCEPT -A zone_3gwan_forward -j zone_3gwan_dest_REJECT -A zone_3gwan_input -m comment --comment "user chain for input" -j input_3gwan_rule -A zone_3gwan_input -m conntrack --ctstate DNAT -m comment --comment "Accept port redirections" -j ACCEPT -A zone_3gwan_input -j zone_3gwan_src_REJECT -A zone_3gwan_output -m comment --comment "user chain for output" -j output_3gwan_rule -A zone_3gwan_output -j zone_3gwan_dest_ACCEPT -A zone_lan_dest_ACCEPT -o eth0 -j ACCEPT -A zone_lan_forward -m comment --comment "user chain for forwarding" -j forwarding_lan_rule -A zone_lan_forward -m comment --comment "forwarding lan -> wan" -j zone_wan_dest_ACCEPT -A zone_lan_forward -m comment --comment "forwarding lan -> vpn" -j zone_vpn_dest_ACCEPT -A zone_lan_forward -m conntrack --ctstate DNAT -m comment --comment "Accept port forwards" -j ACCEPT -A zone_lan_forward -j zone_lan_dest_ACCEPT -A zone_lan_input -m comment --comment "user chain for input" -j input_lan_rule -A zone_lan_input -m conntrack --ctstate DNAT -m comment --comment "Accept port redirections" -j ACCEPT -A zone_lan_input -j zone_lan_src_ACCEPT -A zone_lan_output -m comment --comment "user chain for output" -j output_lan_rule -A zone_lan_output -j zone_lan_dest_ACCEPT -A zone_lan_src_ACCEPT -i eth0 -j ACCEPT -A zone_vpn_dest_ACCEPT -o tun0 -j ACCEPT -A zone_vpn_forward -m comment --comment "user chain for forwarding" -j forwarding_vpn_rule -A zone_vpn_forward -m comment --comment "forwarding vpn -> wan" -j zone_wan_dest_ACCEPT -A zone_vpn_forward -m comment --comment "forwarding vpn -> lan" -j zone_lan_dest_ACCEPT -A zone_vpn_forward -m conntrack --ctstate DNAT -m comment --comment "Accept port forwards" -j ACCEPT -A zone_vpn_forward -j zone_vpn_dest_ACCEPT -A zone_vpn_input -m comment --comment "user chain for input" -j input_vpn_rule -A zone_vpn_input -m conntrack --ctstate DNAT -m comment --comment "Accept port redirections" -j ACCEPT -A zone_vpn_input -j zone_vpn_src_ACCEPT -A zone_vpn_output -m comment --comment "user chain for output" -j output_vpn_rule -A zone_vpn_output -j zone_vpn_dest_ACCEPT -A zone_vpn_src_ACCEPT -i tun0 -j ACCEPT -A zone_wan_dest_ACCEPT -o eth1 -j ACCEPT -A zone_wan_forward -m comment --comment "user chain for forwarding" -j forwarding_wan_rule -A zone_wan_forward -p esp -m comment --comment "@rule[7]" -j zone_lan_dest_ACCEPT -A zone_wan_forward -p udp -m udp --dport 500 -m comment --comment "@rule[8]" -j zone_lan_dest_ACCEPT -A zone_wan_forward -m comment --comment "forwarding wan -> vpn" -j zone_vpn_dest_ACCEPT -A zone_wan_forward -m conntrack --ctstate DNAT -m comment --comment "Accept port forwards" -j ACCEPT -A zone_wan_forward -j zone_wan_dest_ACCEPT -A zone_wan_input -m comment --comment "user chain for input" -j input_wan_rule -A zone_wan_input -p udp -m udp --dport 68 -m comment --comment Allow-DHCP-Renew -j ACCEPT -A zone_wan_input -p icmp -m icmp --icmp-type 8 -m comment --comment Allow-Ping -j ACCEPT -A zone_wan_input -p igmp -m comment --comment Allow-IGMP -j ACCEPT -A zone_wan_input -m conntrack --ctstate DNAT -m comment --comment "Accept port redirections" -j ACCEPT -A zone_wan_input -j zone_wan_src_REJECT -A zone_wan_output -m comment --comment "user chain for output" -j output_wan_rule -A zone_wan_output -j zone_wan_dest_ACCEPT -A zone_wan_src_REJECT -i eth1 -j reject How do I copy this to the broken turtle?
  3. I have several LAN Turtles that I deploy to customer environments to perform vulnerability scans. I mainly use AutoSSH for my phone home and reverse SSH into the Turtle (failsafe); and OpenVPN for NAT into the client environment. After I update one of my lanturtles to the lastest v4 firmware, it seems that my reverse NAT no longer works. I did some digging and found the v3 and v4 iptables are very different. the v4 is missing a statement regarding NAT. I dug and found that if I run "iptables -t nat -A POSTROUTING -j MASQUERADE" after the OpenVPN connects then I can get into the client environment. I need to know how to make this setting persistent in the IPTables config. I am not a linux guy so please go easy on me if this is super simple fix.
×
×
  • Create New...