NethServer Version: 7
Module: firewall
Hello. last night I noticed that hairpin nat stopped working. The port forwards work off the network but I can’t access them from internal anymore. It says refused to connect. I’m not sure what is causing this and I’ve been working at trying to fix it for a few hours now. Hopefully something in the logs below jump out at one of you.
Here is my Shorwall show
[CODE] Chain loc2fw (1 references)
pkts bytes target prot opt in out source destination
83 10803 dynamic all – * * 0.0.0.0/0 0.0.0.0/0 ctstate INVALID,NEW,ESTABLISHED,UNTRACKED
18 3808 smurfs all – * * 0.0.0.0/0 0.0.0.0/0 ctstate INVALID,NEW,UNTRACKED
0 0 ACCEPT udp – * * 0.0.0.0/0 0.0.0.0/0 udp dpts:67:68
65 6995 tcpflags tcp – * * 0.0.0.0/0 0.0.0.0/0
65 6995 ACCEPT all – * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
0 0 ACCEPT icmp – * * 0.0.0.0/0 0.0.0.0/0 icmptype 8 /* Ping /
0 0 ACCEPT udp – * * 0.0.0.0/0 0.0.0.0/0 udp dpt:123 / chronyd /
0 0 ACCEPT tcp – * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:53 / dnsmasq /
2 120 ACCEPT udp – * * 0.0.0.0/0 0.0.0.0/0 udp dpt:53 / dnsmasq /
0 0 ACCEPT udp – * * 0.0.0.0/0 0.0.0.0/0 udp dpt:67 / dnsmasq /
0 0 ACCEPT udp – * * 0.0.0.0/0 0.0.0.0/0 udp dpt:69 / dnsmasq /
0 0 ACCEPT tcp – * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:110 / dovecot /
0 0 ACCEPT tcp – * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:143 / dovecot /
0 0 ACCEPT tcp – * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:4190 / dovecot /
0 0 ACCEPT tcp – * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:993 / dovecot /
0 0 ACCEPT tcp – * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:995 / dovecot /
0 0 ACCEPT tcp – * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 / httpd /
0 0 ACCEPT tcp – * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:443 / httpd /
0 0 ACCEPT tcp – * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:980 / httpd-admin /
0 0 ACCEPT tcp – * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:3000 / ntopng /
0 0 ACCEPT tcp – * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:25 / postfix /
0 0 ACCEPT tcp – * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:465 / postfix /
0 0 ACCEPT tcp – * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:587 / postfix /
0 0 ACCEPT tcp – * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:2525 / postfix /
0 0 ACCEPT tcp – * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:389 / slapd /
0 0 ACCEPT tcp – * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:636 / slapd /
0 0 ACCEPT tcp – * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 / sshd */
16 3688 Reject all – * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all – * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix "Shorewall:loc2fw:REJECT:"
0 0 reject all – * * 0.0.0.0/0 0.0.0.0/0 [goto]
Chain loc2loc (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all – * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
0 0 ACCEPT tcp – * * 0.0.0.0/0 192.168.1.2 ctorigdst 50.4.44.143 tcp dpt:8006 ctorigdstport 8006 /* Proxmox Web Access from loc /
0 0 ACCEPT udp – * * 0.0.0.0/0 192.168.1.2 ctorigdst 50.4.44.143 udp dpt:8006 ctorigdstport 8006 / Proxmox Web Access from loc /
0 0 ACCEPT tcp – * * 0.0.0.0/0 192.168.1.5 ctorigdst 50.4.44.143 tcp dpt:8443 ctorigdstport 8443 / OMV Web Access from loc /
0 0 ACCEPT udp – * * 0.0.0.0/0 192.168.1.5 ctorigdst 50.4.44.143 udp dpt:8443 ctorigdstport 8443 / OMV Web Access from loc /
0 0 ACCEPT tcp – * * 0.0.0.0/0 192.168.1.5 ctorigdst 50.4.44.143 tcp dpt:7443 ctorigdstport 7443 / NextCloud Web Access from loc /
0 0 ACCEPT udp – * * 0.0.0.0/0 192.168.1.5 ctorigdst 50.4.44.143 udp dpt:7443 ctorigdstport 7443 / NextCloud Web Access from loc /
0 0 ACCEPT tcp – * * 0.0.0.0/0 192.168.1.7 ctorigdst 50.4.44.143 tcp dpt:8124 ctorigdstport 8124 / Votifier from loc /
0 0 ACCEPT udp – * * 0.0.0.0/0 192.168.1.7 ctorigdst 50.4.44.143 udp dpt:8124 ctorigdstport 8124 / Votifier from loc /
0 0 ACCEPT tcp – * * 0.0.0.0/0 192.168.1.7 ctorigdst 50.4.44.143 tcp dpt:25420 ctorigdstport 25420 / Minecraft Server from loc /
0 0 ACCEPT udp – * * 0.0.0.0/0 192.168.1.7 ctorigdst 50.4.44.143 udp dpt:25420 ctorigdstport 25420 / Minecraft Server from loc /
0 0 ACCEPT tcp – * * 0.0.0.0/0 192.168.1.10 ctorigdst 50.4.44.143 tcp dpt:25566 ctorigdstport 25566 / Test Environment from loc /
0 0 ACCEPT udp – * * 0.0.0.0/0 192.168.1.10 ctorigdst 50.4.44.143 udp dpt:25566 ctorigdstport 25566 / Test Environment from loc /
0 0 ACCEPT tcp – * * 0.0.0.0/0 192.168.1.7 ctorigdst 50.4.44.143 tcp dpt:22 ctorigdstport 69 / ssh for Minecraft from loc /
0 0 ACCEPT udp – * * 0.0.0.0/0 192.168.1.7 ctorigdst 50.4.44.143 udp dpt:22 ctorigdstport 69 / ssh for Minecraft from loc /
0 0 ACCEPT tcp – * * 0.0.0.0/0 192.168.1.9 ctorigdst 50.4.44.143 tcp dpt:25569 ctorigdstport 25569 / Anarchy Minecraft Server from loc /
0 0 ACCEPT udp – * * 0.0.0.0/0 192.168.1.9 ctorigdst 50.4.44.143 udp dpt:25569 ctorigdstport 25569 / Anarchy Minecraft Server from loc */
0 0 ACCEPT all – * * 0.0.0.0/0 0.0.0.0/0
Chain loc2net (1 references)
pkts bytes target prot opt in out source destination
8270 1393K ACCEPT all – * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
0 0 ~log1 tcp – * * 0.0.0.0/0 0.0.0.0/0 [goto] tcp dpt:25 /* block port 25 from green */
2 1438 ACCEPT all – * * 0.0.0.0/0 0.0.0.0/0
Chain loc_frwd (1 references)
pkts bytes target prot opt in out source destination
8272 1394K dynamic all – * * 0.0.0.0/0 0.0.0.0/0 ctstate INVALID,NEW,ESTABLISHED,UNTRACKED
2 1438 smurfs all – * * 0.0.0.0/0 0.0.0.0/0 ctstate INVALID,NEW,UNTRACKED
8263 1391K tcpflags tcp – * * 0.0.0.0/0 0.0.0.0/0
0 0 loc2loc all – * eth0 0.0.0.0/0 0.0.0.0/0
8272 1394K loc2net all – * eth1 0.0.0.0/0 0.0.0.0/0
Chain logdrop (0 references)
pkts bytes target prot opt in out source destination
0 0 LOG all – * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix "Shorewall:logdrop:DROP:"
0 0 DROP all – * * 0.0.0.0/0 0.0.0.0/0
Chain logflags (7 references)
pkts bytes target prot opt in out source destination
0 0 LOG all – * * 0.0.0.0/0 0.0.0.0/0 LOG flags 4 level 6 prefix "Shorewall:logflags:DROP:"
0 0 DROP all – * * 0.0.0.0/0 0.0.0.0/0
Chain logreject (0 references)
pkts bytes target prot opt in out source destination
0 0 LOG all – * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix "Shorewall:logreject:REJECT:"
0 0 reject all – * * 0.0.0.0/0 0.0.0.0/0
Chain net2fw (1 references)
pkts bytes target prot opt in out source destination
3 228 dynamic all – * * 0.0.0.0/0 0.0.0.0/0 ctstate INVALID,NEW,ESTABLISHED,UNTRACKED
0 0 smurfs all – * * 0.0.0.0/0 0.0.0.0/0 ctstate INVALID,NEW,UNTRACKED
0 0 ACCEPT udp – * * 0.0.0.0/0 0.0.0.0/0 udp dpts:67:68
0 0 tcpflags tcp – * * 0.0.0.0/0 0.0.0.0/0
3 228 ACCEPT all – * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
0 0 ACCEPT icmp – * * 0.0.0.0/0 0.0.0.0/0 icmptype 8 /* Ping /
0 0 ACCEPT tcp – * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:110 / dovecot /
0 0 ACCEPT tcp – * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:143 / dovecot /
0 0 ACCEPT tcp – * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:4190 / dovecot /
0 0 ACCEPT tcp – * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:993 / dovecot /
0 0 ACCEPT tcp – * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:995 / dovecot /
0 0 ACCEPT tcp – * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 / httpd /
0 0 ACCEPT tcp – * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:443 / httpd /
0 0 ACCEPT tcp – * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:980 / httpd-admin /
0 0 ACCEPT tcp – * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:25 / postfix /
0 0 ACCEPT tcp – * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:465 / postfix /
0 0 ACCEPT tcp – * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:587 / postfix /
0 0 ACCEPT tcp – * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:2525 / postfix /
0 0 ACCEPT tcp – * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 / sshd */
0 0 Drop all – * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all – * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix "Shorewall:net2fw:DROP:"
0 0 DROP all – * * 0.0.0.0/0 0.0.0.0/0
Chain net2loc (1 references)
pkts bytes target prot opt in out source destination
4723 5991K ACCEPT all – * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
0 0 ACCEPT tcp – * * 0.0.0.0/0 192.168.1.2 ctorigdst 50.4.44.143 tcp dpt:8006 ctorigdstport 8006 /* Proxmox Web Access from net /
0 0 ACCEPT udp – * * 0.0.0.0/0 192.168.1.2 ctorigdst 50.4.44.143 udp dpt:8006 ctorigdstport 8006 / Proxmox Web Access from net /
0 0 ACCEPT tcp – * * 0.0.0.0/0 192.168.1.5 ctorigdst 50.4.44.143 tcp dpt:8443 ctorigdstport 8443 / OMV Web Access from net /
0 0 ACCEPT udp – * * 0.0.0.0/0 192.168.1.5 ctorigdst 50.4.44.143 udp dpt:8443 ctorigdstport 8443 / OMV Web Access from net /
0 0 ACCEPT tcp – * * 0.0.0.0/0 192.168.1.5 ctorigdst 50.4.44.143 tcp dpt:7443 ctorigdstport 7443 / NextCloud Web Access from net /
0 0 ACCEPT udp – * * 0.0.0.0/0 192.168.1.5 ctorigdst 50.4.44.143 udp dpt:7443 ctorigdstport 7443 / NextCloud Web Access from net /
0 0 ACCEPT tcp – * * 0.0.0.0/0 192.168.1.7 ctorigdst 50.4.44.143 tcp dpt:8124 ctorigdstport 8124 / Votifier from net /
0 0 ACCEPT udp – * * 0.0.0.0/0 192.168.1.7 ctorigdst 50.4.44.143 udp dpt:8124 ctorigdstport 8124 / Votifier from net /
0 0 ACCEPT tcp – * * 0.0.0.0/0 192.168.1.7 ctorigdst 50.4.44.143 tcp dpt:25420 ctorigdstport 25420 / Minecraft Server from net /
0 0 ACCEPT udp – * * 0.0.0.0/0 192.168.1.7 ctorigdst 50.4.44.143 udp dpt:25420 ctorigdstport 25420 / Minecraft Server from net /
0 0 ACCEPT tcp – * * 0.0.0.0/0 192.168.1.10 ctorigdst 50.4.44.143 tcp dpt:25566 ctorigdstport 25566 / Test Environment from net /
0 0 ACCEPT udp – * * 0.0.0.0/0 192.168.1.10 ctorigdst 50.4.44.143 udp dpt:25566 ctorigdstport 25566 / Test Environment from net /
0 0 ACCEPT tcp – * * 0.0.0.0/0 192.168.1.7 ctorigdst 50.4.44.143 tcp dpt:22 ctorigdstport 69 / ssh for Minecraft from net /
0 0 ACCEPT udp – * * 0.0.0.0/0 192.168.1.7 ctorigdst 50.4.44.143 udp dpt:22 ctorigdstport 69 / ssh for Minecraft from net /
0 0 ACCEPT tcp – * * 0.0.0.0/0 192.168.1.9 ctorigdst 50.4.44.143 tcp dpt:25569 ctorigdstport 25569 / Anarchy Minecraft Server from net /
0 0 ACCEPT udp – * * 0.0.0.0/0 192.168.1.9 ctorigdst 50.4.44.143 udp dpt:25569 ctorigdstport 25569 / Anarchy Minecraft Server from net /
0 0 ~log0 all – * * 0.0.0.0/0 192.168.1.10 [goto] / RULE#1 */
0 0 Drop all – * * 0.0.0.0/0 0.0.0.0/0
0 0 LOG all – * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 6 prefix "Shorewall:net2loc:DROP:"
0 0 DROP all – * * 0.0.0.0/0 0.0.0.0/0
[/CODE]
Here is where the firewall is blocking it.
x00 SYN URGP=0
Jul 10 11:47:15 Neth kernel: Shorewall:loc2fw:REJECT:IN=eth0 OUT= MAC=9a:d7:38:76:4f:c0:08:62:66:31:4e:c0:08:00 SRC=192.168.1.131 DST=192.168.1.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=24238 DF PROTO=TCP SPT=33558 DPT=8006 WINDOW=29200 RES=0x00 SYN URGP=0
Jul 10 11:47:15 Neth kernel: Shorewall:loc2fw:REJECT:IN=eth0 OUT= MAC=9a:d7:38:76:4f:c0:08:62:66:31:4e:c0:08:00 SRC=192.168.1.131 DST=192.168.1.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=59737 DF PROTO=TCP SPT=33560 DPT=8006 WINDOW=29200 RES=0x00 SYN URGP=0
Jul 10 11:47:16 Neth kernel: Shorewall:loc2fw:REJECT:IN=eth0 OUT= MAC=9a:d7:38:76:4f:c0:08:62:66:31:4e:c0:08:00 SRC=192.168.1.131 DST=192.168.1.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=9098 DF PROTO=TCP SPT=33562 DPT=8006 WINDOW=29200 RES=0x00 SYN URGP=0
Jul 10 11:47:16 Neth kernel: Shorewall:loc2fw:REJECT:IN=eth0 OUT= MAC=9a:d7:38:76:4f:c0:08:62:66:31:4e:c0:08:00 SRC=192.168.1.131 DST=192.168.1.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=25036 DF PROTO=TCP SPT=33564 DPT=8006 WINDOW=29200 RES=0x00 SYN URGP=0
Jul 10 11:56:01 Neth kernel: Shorewall:loc2fw:REJECT:IN=eth0 OUT= MAC=9a:d7:38:76:4f:c0:08:62:66:31:4e:c0:08:00 SRC=192.168.1.131 DST=192.168.1.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=26554 DF PROTO=TCP SPT=34010 DPT=8006 WINDOW=29200 RES=0x00 SYN URGP=0
Jul 10 11:56:01 Neth kernel: Shorewall:loc2fw:REJECT:IN=eth0 OUT= MAC=9a:d7:38:76:4f:c0:08:62:66:31:4e:c0:08:00 SRC=192.168.1.131 DST=192.168.1.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=3597 DF PROTO=TCP SPT=34012 DPT=8006 WINDOW=29200 RES=0x00 SYN URGP=0
Thanks in advance