Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Nat reflection and udp

    Scheduled Pinned Locked Moved NAT
    58 Posts 3 Posters 25.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A
      aldo
      last edited by

      ok i will check the cvstrac for the items u mention and test it then thanks

      1 Reply Last reply Reply Quote 0
      • A
        aldo
        last edited by

        @aldo:

        ok upgraded to snapshot 07-09

        rdr on lan on protocol udp from any to xxx.xxx.xxx.xxx/32 to 127.0.0.1:19006  this line looks fine
        pass in on lan on protocol tcp from any to 127.0.0.1:19006 this line is the problem

        these rules are not 100% as they are from memory but the problem is correct.

        where does the 127.0.0.1:19006 got to i would guess it is a stream of some sort. but i cannot seem to find it.
        i guess this is also wrong as i have added a rule to my user defined rules like so with no success.

        pass in on lan on protocol udp from any to 127.0.0.1:19006

        I can try to put some better logging on this maybe i can get a test up on it tomorrow to give further information.
        can someone answer me about what happens in the loopback and how does it get to the dmz server that i am aiming for.

        the dmz server is working externally and there is nothing hitting it. please believe me i have been attempting to get this working right for
        some time in my own world. but with little sucess as i am lost in the loopback address routing.

        regards

        alan

        1 Reply Last reply Reply Quote 0
        • S
          sullrich
          last edited by

          Grmbl.  At this point we should just disable UDP and add this to the FAQ.  Reflection was a mistake from the git-go.  Since the sponsor of the feature decided to eat and run then its really left us in a awkward position to be happy about fixing this pile of crap.

          1 Reply Last reply Reply Quote 0
          • A
            aldo
            last edited by

            i empathise with you anyway scott give me a few tips and i can look at it i just need to know how the inetd is called i am presently guessing it is being called at command line for each reflection as i can't find a .conf for it anywhere

            1 Reply Last reply Reply Quote 0
            • S
              sullrich
              last edited by

              Look in /var/etc/inetd.conf

              1 Reply Last reply Reply Quote 0
              • A
                aldo
                last edited by

                gotyou

                /etc/inc/filter.inc
                ok line 844 has a case for udp that is empty
                there is another one a little lower than that.

                i am still looking for the rest of it.

                how much was the bounty for this scott can we afford to pay it was it a big one

                1 Reply Last reply Reply Quote 0
                • S
                  sullrich
                  last edited by

                  @aldo:

                  gotyou

                  /etc/inc/filter.inc
                  ok line 844 has a case for udp that is empty
                  there is another one a little lower than that.

                  The same code handles tcp and udp.  This is normal for case type statements.

                  @aldo:

                  i am still looking for the rest of it.

                  how much was the bounty for this scott can we afford to pay it was it a big one

                  $1500

                  1 Reply Last reply Reply Quote 0
                  • S
                    sullrich
                    last edited by

                    aldo, please check out http://cvstrac.pfsense.com/chngview?cn=14258

                    1 Reply Last reply Reply Quote 0
                    • A
                      aldo
                      last edited by

                      ok one last question how do i reload the /tmp/rules.debug will come back to you tomorrow

                      1 Reply Last reply Reply Quote 0
                      • A
                        aldo
                        last edited by

                        sorted it looks impossible with the nc bit on the end.

                        1 Reply Last reply Reply Quote 0
                        • A
                          aldo
                          last edited by

                          think i have it scott

                          19000 stream udp nowait/0 nobody /usr/bin/nc nc -w 20 192.168.200.200 161

                          this nc needs a -u option to get udp

                          as per

                          http://www.openbsd.org/cgi-bin/man.cgi?query=nc&sektion=1&manpath=OpenBSD+3.9

                          the only other error that i saw was to do with this line which you seem to be working on. this line always shows up tcp not udp

                          pass in quick on $lan inet proto tcp from any to $loopback port 19000 keep state label "NAT REFLECT: Allow traffic to localhost"

                          1 Reply Last reply Reply Quote 0
                          • A
                            aldo
                            last edited by

                            line 919 fwrite($inetd_fd, "{$starting_localhost_port}\tstream\t{$protocol}\tnowait/0\tnobody\t/usr/bin/nc nc -w 20 {$target} {$loc_pt}\n");
                            change this to
                            fwrite($inetd_fd, "{$starting_localhost_port}\tstream\t{$protocol}\tnowait/0\tnobody\t/usr/bin/nc nc -w 20 -u {$target} {$loc_pt}\n");

                            the problem with this seems to be that this line even though the case is udpsets both tcp and udp streams???? i am sure you might know what this means

                            line 1891   $ipfrules .= "pass in quick on ${$ifname_real} inet proto tcp from any to $loopback port {$starting_localhost_port} keep state label "NAT REFLECT: Allow traffic to localhost"\n";
                            change this to
                            $ipfrules .= "pass in quick on ${$ifname_real} inet proto udp from any to $loopback port {$starting_localhost_port} keep state label "NAT REFLECT: Allow traffic to localhost"\n";

                            hope it helps  alan

                            1 Reply Last reply Reply Quote 0
                            • S
                              sullrich
                              last edited by

                              Please issue these commands to test:

                              fetch -o /etc/inc/ http://www.pfsense.com/~sullrich/filter.inc
                              /etc/rc.filter_configure

                              1 Reply Last reply Reply Quote 0
                              • A
                                aldo
                                last edited by

                                switch($rule['protocol']) {
                                                                                                        case "tcp/udp":
                                                                                                                $protocol = "{ tcp udp }";
                                                                                                                $ipfrules .= "pass in quick on ${$ifname_real} inet proto tcp from any to $loopback port {$starting_localhost_port} keep state label "NAT REFLECT: Allow traffic to localhost"\n";
                                                                                                                $ipfrules .= "pass in quick on ${$ifname_real} inet proto udp from any to $loopback port {$starting_localhost_port} keep state label "NAT REFLECT: Allow traffic to localhost"\n";
                                                                                                                break;
                                                                                                        case "tcp":
                                                                                                        case "udp":
                                                                                                                $protocol = $rule['protocol'];
                                                                                                                $ipfrules .= "pass in quick on ${$ifname_real} inet proto udp from any to $loopback port {$starting_localhost_port} keep state label "NAT REFLECT: Allow traffic to localhost"\n";
                                                                                                                break;
                                                                                                        default:
                                                                                                                break;
                                                                                                }

                                **You need to add the case for tcp otherwise tcp get udp case set

                                the stream looks good but the local host rule needs the tcp case filled in i tested this and it worked fine
                                                                                                        case "tcp":
                                                                                                                $protocol = $rule['protocol'];
                                                                                                                $ipfrules .= "pass in quick on ${$ifname_real} inet proto tcp from any to $loopback port {$starting_localhost_port} keep state label "NAT REFLECT: Allow traffic to localhost"\n";
                                                                                                                break**;

                                1 Reply Last reply Reply Quote 0
                                • S
                                  sullrich
                                  last edited by

                                  There is no break, it automatically hits the next case.

                                  1 Reply Last reply Reply Quote 0
                                  • A
                                    aldo
                                    last edited by

                                    ok sorry i just stripped you code when pasting not mine

                                    1 Reply Last reply Reply Quote 0
                                    • A
                                      aldo
                                      last edited by

                                      one last thing you have an extra white space on the udp stream now.
                                      i did them both in clean cases before and all worked well

                                      for the inetd i added info the the tcp case and the upd case as i did in the localhost allow rule your
                                      solution was definatly neater but there is a whitespace issue

                                      1 Reply Last reply Reply Quote 0
                                      • S
                                        sullrich
                                        last edited by

                                        Please test the file that I posted.  It really should be working now.

                                        1 Reply Last reply Reply Quote 0
                                        • S
                                          sullrich
                                          last edited by

                                          @aldo:

                                          one last thing you have an extra white space on the udp stream now.
                                          i did them both in clean cases before and all worked well

                                          for the inetd i added info the the tcp case and the upd case as i did in the localhost allow rule your
                                          solution was definatly neater but there is a whitespace issue

                                          Not sure what you mean.  Please show me either the generated rules from rules.debug or the netcat entries from inetd.conf

                                          1 Reply Last reply Reply Quote 0
                                          • A
                                            aldo
                                            last edited by

                                            19000 stream udp nowait/0 nobody /usr/bin/nc nc  -u -w 20 192.168.200.200 161
                                            19002 stream tcp nowait/0 nobody /usr/bin/nc nc -w 20 192.168.200.200 8000

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.