Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 31 Oct 2014 15:46:58 -0200
From:      Raimundo Santos <raitech@gmail.com>
To:        "freebsd-net@freebsd.org" <freebsd-net@freebsd.org>
Subject:   Re: ipfw fwd duplicating packets in 9.3-RELEASE
Message-ID:  <CAGQ6iC88g1u9JaHEwJs2-Vu5V8_XmAQiL650SYLqSoM_pQCNFg@mail.gmail.com>
In-Reply-To: <CAGQ6iC_AvESCyfVZwH2tMx_%2BczGn8k65PA=QeqmQmODi3kuRxg@mail.gmail.com>
References:  <CAGQ6iC-0PJApN=yyhit-Lih5ozTABsXJBV5TXQ7XVf9tpAfbdQ@mail.gmail.com> <009c01cff388$29fe7ec0$7dfb7c40$@gmail.com> <CAGQ6iC_AvESCyfVZwH2tMx_%2BczGn8k65PA=QeqmQmODi3kuRxg@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
For documentation:

I do not know why or how, but after trying to reproduce the same strange
behaviour, it did not happen. This was after restarting all the test
environment.

Weird.

Sorry for take your time with this strange mess.

Regards,
Raimundo Santos

On 29 October 2014 14:30, Raimundo Santos <raitech@gmail.com> wrote:

>
>
> On 29 October 2014 12:53, bycn82 <bycn82@gmail.com> wrote:
> >
> > Hi,
> > I cannot help to point out when the ICMP packet was duplicated and
> transfer
> > via 2 different links, If it happens in my machine, I will call this
> feature
> > "multi-homing".
>
>
> That is a bit off topic, but how and undesired behaviour could be a
> feature? It is not only undesired, but it is also undocumented.
>
> If I filter incoming packtes, I got it sent to the original and to the fwd
> destinations, by my tests. I can not see how it is multi-homing.
>
> What I know by multi-homing is: two or more interconnections with the same
> other network, or to the Internet. It implies more care to the outgoing and
> incoming paths. Who leaves from link 1 will enter via link 1? It is ok to
> happen that way? Only the context can say that.
>
> In my case the packet not only get out via two different links, but it is
> reaching two *different* machines in different networks.
>
> >
> > But what I want to say is the firewall rule
> > fwd 192.168.0.2 proto icmp src-ip 192.168.4.2 out xmit em1
> > You can remove the "out"  because "xmit" will check the "out interface".
>
> Thank you for the clarification.
>
> >
> >
> > Regards,
> > Bycn82
>
>
> Regards,
> Raimundo Santos
>
>
> >
> >
> > -----Original Message-----
> > From: owner-freebsd-net@freebsd.org [mailto:
> owner-freebsd-net@freebsd.org]
> > On Behalf Of Raimundo Santos
> > Sent: Tuesday, 28 October, 2014 3:32 PM
> > To: freebsd-net@freebsd.org
> > Subject: ipfw fwd duplicating packets in 9.3-RELEASE
> >
> > Hello list!
> >
> > I was testing the behaviour of fwd in ipfw from FreeBSd 9.3-RELEASE,
> latest
> > updates, GENERIC kernel, in this setup:
> >
> > 1x FreeBSD 9.3 as router, with 3 network interfaces 5x OpenBSD 5.5 as
> > network machines, each one connected to FreeBSD via one port.
> >
> > It is a virtual env.
> >
> > FreeBSD em0 (192.168.0.1) -> OpenBSD#1 em0 (192.168.0.2) FreeBSD em1
> > (192.168.1.1) -> OpenBSD#2 em0 (192.168.1.2) FreeBSD em2 (192.168.2.1) ->
> > OpenBSD#3 em0 (192.168.2.2) FreeBSD em3 (192.168.3.1) -> OpenBSD#4 em0
> > (192.168.3.2) FreeBSD em4 (192.168.4.1) -> OpenBSD#5 em1 (192.168.4.2)
> >
> > ipfw rule:
> >
> > fwd 192.168.0.2 proto icmp src-ip 192.168.4.2 in recv em4
> >
> > Then a ping 192.168.1.2 was issued from OpenBSD#5.
> >
> > Interestingly, this rule put a packet on em0 and em1 in FreeBSD. The
> packet
> > successfully arrived at OpenBSD#1, where it was discarded, and at
> OpenBSD#2,
> > where it got its reply.
> >
> > Only these combinations of interface direction do not duplicate the
> packet:
> > out xmit
> >
> > fwd 192.168.0.2 proto icmp src-ip 192.168.4.2 out xmit em1
> >
> > and
> >
> > fwd 192.168.0.2 proto icmp src-ip 192.168.4.2 out via em1
> >
> > Even out recv em4 xmit em1 leads to packet duplication.
> >
> > I think that it is a bad thing for PBR. As I can see from these tests, I
> can
> > not use all the options to do PBR.
> >
> > In my real needs I have to:
> >
> > 1. let web traffic flow to an cache appliance (from internal network to
> > cache, from internet to cache)
> >
> > 2. do NAT for the internal network under three different links
> >
> > In theory, fwd + in kernel NAT + one_pass=0 could solve the problem. But
> I
> > am hitting my head in the wall for almost three weeks on this, only now I
> > have the time to test in a more clear way. First I blamed the NAT, after
> > that the one_pass=0, and now, with these results, well...
> >
> > Someone has an explanation about it? Something related to
> > https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=129036?
> >
> > For my real needs, I figured out that it works with
> >
> > <...before NAT aliasing...>
> > fwd CACHE_IP proto tcp src-ip table(INT) dst-port 80 out recv INT_IFACE
> > <...after NAT dealiasing...> fwd CACHE_IP proto tcp dst-ip table(INT)
> > src-port 80 out recv EXT_IFACE
> >
> > But I am not confident that it will remains in good shape without knowing
> > exactly why fwd behaves that way.
> >
> > Thank you in advance for your time,
> > Raimundo Santos
> > _______________________________________________
> > freebsd-net@freebsd.org mailing list
> > http://lists.freebsd.org/mailman/listinfo/freebsd-net
> > To unsubscribe, send any mail to "freebsd-net-unsubscribe@freebsd.org"
> >
>
>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAGQ6iC88g1u9JaHEwJs2-Vu5V8_XmAQiL650SYLqSoM_pQCNFg>