Re: [pve-devel] pvefw: masquerade problems and conntrack zones

2014-03-10 Thread Dietmar Maurer
> I'm a bit lost for now, I'll try to create a testlab tomorrow to see how > things > works. I currently use the following configuration for testing: --- auto vmbr0 iface vmbr0 inet manual bridge_ports eth0 bridge_stp off bridge_fd 0 auto pm0 iface pm

Re: [pve-devel] pvefw: masquerade problems and conntrack zones

2014-03-10 Thread Dietmar Maurer
> >>We need physdev match to filter traffic from VMs? > sorry, I wanted to say, output interface instead phydev > > >>iptables -t nat -A POSTROUTING -s '10.10.10.0/24' -o vmbr0 -j > MASQUERADE > replace by > > iptables -t nat -A POSTROUTING -s '10.10.10.0/24' -j SNAT --to X.X.X.X (ip of > the bri

Re: [pve-devel] Proxmox VE 3.2 released!

2014-03-10 Thread Lindsay Mathieson
Congratulations and much appreciated! Has been working great for me, good job everyone - thanks. On 10 March 2014 21:50, Martin Maurer wrote: > Hi all, > > We just released Proxmox VE 3.2, introducing great new features! More SPICE > with spiceterm, Ceph Server integration, Open vSwitch and mor

Re: [pve-devel] pvefw: masquerade problems and conntrack zones

2014-03-10 Thread Alexandre DERUMIER
>>We need physdev match to filter traffic from VMs? sorry, I wanted to say, output interface instead phydev >>iptables -t nat -A POSTROUTING -s '10.10.10.0/24' -o vmbr0 -j MASQUERADE replace by iptables -t nat -A POSTROUTING -s '10.10.10.0/24' -j SNAT --to X.X.X.X (ip of the bridge) how is the

Re: [pve-devel] pvefw: masquerade problems and conntrack zones

2014-03-10 Thread Dietmar Maurer
> >>That behaves quite the same. > > Maybe, without veth ? (using bridge ip directly?). > So we don't need to have physdev match. We need physdev match to filter traffic from VMs? ___ pve-devel mailing list pve-devel@pve.proxmox.com http://pve.proxmox.c

Re: [pve-devel] pvefw: masquerade problems and conntrack zones

2014-03-10 Thread Alexandre DERUMIER
>>That behaves quite the same. Maybe, without veth ? (using bridge ip directly?). So we don't need to have physdev match. - Mail original - De: "Dietmar Maurer" À: "Alexandre DERUMIER" Cc: pve-devel@pve.proxmox.com Envoyé: Lundi 10 Mars 2014 16:07:32 Objet: RE: [pve-devel] pvefw

Re: [pve-devel] pvefw: masquerade problems and conntrack zones

2014-03-10 Thread Dietmar Maurer
> also, as MASQUERADE alternative, maybe it could work better with SNAT ? > (using ip of output device, instead physdev) > > > iptables -t nat -A POSTROUTING -s 10.10.10.0/24 -j SNAT -to-source > X.X.X.X(replace by ip of the output device) That behaves quite the same. __

Re: [pve-devel] pvefw: masquerade problems and conntrack zones

2014-03-10 Thread Dietmar Maurer
> just found this, not sure it's related: > > http://www.spinics.net/lists/netfilter-devel/msg13554.html Thanks for that link. But it looks that also use --zone, so this just adds another level of confusion to me ;-) ___ pve-devel mailing list pve-deve

Re: [pve-devel] pvefw: masquerade problems and conntrack zones

2014-03-10 Thread Dietmar Maurer
> is doing his job, to nat only on pm0 > > > now, I don't known for the --zone 1 . > (So it doesn't work on 2.6.32 without --zone 1 ?) it does not work with 3..6.32 without --zone 1 ___ pve-devel mailing list pve-devel@pve.proxmox.com http://pve.pr

Re: [pve-devel] pvefw: masquerade problems and conntrack zones

2014-03-10 Thread Alexandre DERUMIER
also, as MASQUERADE alternative, maybe it could work better with SNAT ? (using ip of output device, instead physdev) iptables -t nat -A POSTROUTING -s 10.10.10.0/24 -j SNAT -to-source X.X.X.X(replace by ip of the output device) - Mail original - De: "Alexandre DERUMIER" À: "Diet

Re: [pve-devel] pvefw: masquerade problems and conntrack zones

2014-03-10 Thread Alexandre DERUMIER
just found this, not sure it's related: http://www.spinics.net/lists/netfilter-devel/msg13554.html "2.6.34 introduced 'conntrack zones' to deal with cases where packets from multiple identical networks are handled by conntrack/NAT. Packets are looped through veth devices, during which

Re: [pve-devel] pvefw: masquerade problems and conntrack zones

2014-03-10 Thread Alexandre DERUMIER
>>Oh, I have a second bridge configured as: oh,ok. so, it seem that >>iptables -t nat -A POSTROUTING -s '10.10.10.0/24' -j LOG --log-prefix >>"MASQTEST: " show, that packet with source 10.10.10.0/24 in POSTROUTING, is tested against each output interface (maybe interfaces with ip adress con

Re: [pve-devel] pvefw: masquerade problems and conntrack zones

2014-03-10 Thread Dietmar Maurer
> >>Mar 10 11:25:34 lola kernel: [259254.043987] MASQTEST: IN= OUT=vmbr1 > >>PHYSIN=tap116i0 PHYSOUT=pm1peer SRC=10.10.10.3 DST=8.8.8.8 LEN=84 > >>TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 > ID=5639 > >>SEQ=1 >>MARK=0x1 Mar 10 11:25:34 lola kernel: [259254.044020] > >>MASQTEST: IN=

[pve-devel] Proxmox VE 3.2 released!

2014-03-10 Thread Martin Maurer
Hi all, We just released Proxmox VE 3.2, introducing great new features! More SPICE with spiceterm, Ceph Server integration, Open vSwitch and more! Together with this release, we started publishing a new series of short video tutorials, e.g. "What´s new in Proxmox VE 3.2!", see http://youtu.be/U

Re: [pve-devel] pvefw: masquerade problems and conntrack zones

2014-03-10 Thread Dietmar Maurer
> >>So it seem that now the POSTROUTING chain gets called twice. The second > call has the correct output interface. > > what is pm0 vs pm1peer ? Oh, I have a second bridge configured as: auto vmbr0 iface vmbr0 inet manual bridge_ports bond0 bridge_stp off bridge_fd 0 au

Re: [pve-devel] pvefw: masquerade problems and conntrack zones

2014-03-10 Thread Alexandre DERUMIER
>>Mar 10 11:25:34 lola kernel: [259254.043987] MASQTEST: IN= OUT=vmbr1 >>PHYSIN=tap116i0 PHYSOUT=pm1peer SRC=10.10.10.3 DST=8.8.8.8 LEN=84 TOS=0x00 >>PREC=0x00 TTL=64 ID=0 DF PROTO=ICMP TYPE=8 CODE=0 ID=5639 SEQ=1 >>MARK=0x1 >>Mar 10 11:25:34 lola kernel: [259254.044020] MASQTEST: IN= OUT=pm0 >

Re: [pve-devel] pvefw: masquerade problems and conntrack zones

2014-03-10 Thread Dietmar Maurer
> > post-up iptables -t raw -A PREROUTING -s '10.10.10.0/24' -i vmbr1 -j > > CT --zone > > 1 # why do we need this? > > post-up iptables -t raw -A PREROUTING -d '10.10.10.0/24' -i vmbr1 -j > > CT -- zone 1 # why do we need this? > > post-up iptables -t nat -A POSTROUTING -s '10.10.10.0/24' -o pm0 -

Re: [pve-devel] pvefw: masquerade problems and conntrack zones

2014-03-10 Thread Dietmar Maurer
> post-up iptables -t raw -A PREROUTING -s '10.10.10.0/24' -i vmbr1 -j CT --zone > 1 # why do we need this? > post-up iptables -t raw -A PREROUTING -d '10.10.10.0/24' -i vmbr1 -j CT -- > zone 1 # why do we need this? > post-up iptables -t nat -A POSTROUTING -s '10.10.10.0/24' -o pm0 -j > MASQUERADE

Re: [pve-devel] pvefw: masquerade problems and conntrack zones

2014-03-10 Thread Alexandre DERUMIER
Hi, I'm back from holiday ! >>But I do not understand this. Why is that required? Is that the correct way >>to do it? I'm not sure, but post-up iptables -t raw -A PREROUTING -s '10.10.10.0/24' -i vmbr1 -j CT --zone 1 # why do we need this? post-up iptables -t raw -A PREROUTING -d '10.10.1

[pve-devel] pvefw: masquerade problems and conntrack zones

2014-03-10 Thread Dietmar Maurer
The following configuration to MASQUERADE traffic is known to work: auto vmbr1 iface vmbr1 inet static address 10.10.10.1 netmask 255.255.255.0 bridge_ports none bridge_stp off bridge_fd 0 post-up iptables -t nat -A POSTROUTING -s '10.10.10.0/24'