On Mon, Feb 24, 2025 at 10:01:49PM +0100, Peter 'PMc' Much wrote:

! Packets do arrive, but are ignored.
! The local firewall is switched to pass-thru.
! 
! I don't know what else could selectively swallow packets without
! notice.

Okay, I figured it out.

tcpdump was friendly enough to tell me I should use -vv option,
only I didn't read that at first.
Then it clearly shows that these packets have invalid checksums. :(

And that is apparently reason enough to just drop them without
notice.

Now how they aquire broken checksums, and why they start to
do so two days ago (because I find some successful XFR in the log,
until Feb-22), that is another story.

Basically I have a little bit different understanding of zero-trust,
and I am doing it a little bit longer already than since it became
a buzzword - but it basically boils down on the respective node doing
it's own decisions about which network is how safe. Therefore the node
needs to have access to the respective networks - and the cheap
variant is to simply build tunnels, like so:

tun1: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> metric 0 mtu 1500
        options=80000<LINKSTATE>
        inet 10.1.0.126 --> 10.1.0.120 netmask 0xffffffff
        groups: tun
        nd6 options=9<PERFORMNUD,IFDISABLED>
        Opened by PID 11541
tun3: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> metric 0 mtu 1500
        options=80000<LINKSTATE>
        inet 10.1.0.136 --> 10.1.0.130 netmask 0xffffffff
        inet6 fe80::1%tun3 prefixlen 124 scopeid 0x4
        groups: tun
        nd6 options=1<PERFORMNUD>
        Opened by PID 54021
tun5: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> metric 0 mtu 1500
        options=80000<LINKSTATE>
        inet 10.1.0.146 --> 10.1.0.140 netmask 0xffffffff
        inet6 fe80::1%tun5 prefixlen 124 scopeid 0x5
        groups: tun
        nd6 options=1<PERFORMNUD>
        Opened by PID 11487
tun6: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> metric 0 mtu 1500
        options=80000<LINKSTATE>
        inet 10.1.0.166 --> 10.1.0.160 netmask 0xffffffff
        inet6 fe80::1%tun6 prefixlen 124 scopeid 0x6
        groups: tun
        nd6 options=1<PERFORMNUD>
        Opened by PID 11514

(Yes, these tunnels run with mtu 1500 - but that's again a different
story ;) )

The ugly thing with such tunnels is, when one connects thru them,
the local node will choose the nearside tunnel pier as the source
ip address, so it will appear as all kinds of 10.1.0.1X6 instead it's
genuine IP. And that is a real nuisance if you need to recognize the
traffic later, and it must be fixed individually per application (if
possible at all).
So I thought, lets solve that once and for all - we have libraries
for NAT, and these libraries do exactly fix such situations, by
replacing unwanted local IPs with a single well-known IP.

Works fine - only two days ago that NAT library has apparently
decided to start mangling the packet checksums, for whatever reason.

cheerio,
PMc
-- 
Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from 
this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to