Traceroute response endless?

Alexander Dalloz alexander.dalloz at uni-bielefeld.de
Tue Jan 6 02:25:10 UTC 2004


Am Di, den 06.01.2004 schrieb Bevan C. Bennett um 02:47:
> Alexander Dalloz wrote:
> 
> > If above you ment last hop as your station, then do you have defined any
> > iptables rules for icmp handling?
> >  
> > 
> > On my Fedora Core 1 installations I can not agree such traceroute
> > behaviour.
> 
> Unexpectedly, I -can- reproduce the behavior he describes.
> 
> to a RH8.0 system:
> [bevan]> traceroute saladin
> traceroute to saladin.internal.avlsi.com (10.0.0.45), 30 hops max, 38 
> byte packets
>   1  saladin.internal.avlsi.com (10.0.0.45)  0.216 ms  0.253 ms  0.227 ms
> 
> to a FC1.3 system:
> [bevan]> traceroute wallace
> traceroute to wallace.internal.avlsi.com (10.0.0.28), 30 hops max, 38 
> byte packets
>   1  wallace.internal.avlsi.com (10.0.0.28)  0.914 ms !<10>  0.169 ms 
> !<10>  0.158 ms !<10>
> 
> The traceroute data appears to be returning correctly, although the 
> aforementioned disturbing !<10> entries have been added.
> 
> This is using the -stock- iptables configuration, and iptables does 
> indeed appear to be the cause.
> 
> to the FC1.3 system with iptables turned off:
> [bevan]> traceroute wallace
> traceroute to wallace.internal.avlsi.com (10.0.0.28), 30 hops max, 38 
> byte packets
>   1  wallace.internal.avlsi.com (10.0.0.28)  0.202 ms  0.182 ms  0.154 ms
> 
> /etc/sysconfig/iptables contains (should be stock):
> # Firewall configuration written by redhat-config-securitylevel
> # Manual customization of this file is not recommended.
> *filter
> :INPUT ACCEPT [0:0]
> :FORWARD ACCEPT [0:0]
> :OUTPUT ACCEPT [0:0]
> :RH-Firewall-1-INPUT - [0:0]
> -A INPUT -j RH-Firewall-1-INPUT
> -A FORWARD -j RH-Firewall-1-INPUT
> -A RH-Firewall-1-INPUT -i lo -j ACCEPT
> -A RH-Firewall-1-INPUT -p icmp --icmp-type any -j ACCEPT
> -A RH-Firewall-1-INPUT -p 50 -j ACCEPT
> -A RH-Firewall-1-INPUT -p 51 -j ACCEPT
> -A RH-Firewall-1-INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
> -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j 
> ACCEPT
> -A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited
> COMMIT
> 
> I'd have thought that '-p icmp' line would cover this, but apparantly 
> there's something else at work. I'll try watching both cases with 
> tcpdump to see if I can isolate the difference.

Hi Bevan!

Your reply is really interesting. Thanks for it. Seems you really
discover the same as the OP.

!<10> means:
ICMP type 3 Destination Unreachable [RFC792] with Code 10 Communication
with Destination Host is Administratively Prohibited

But looking at your iptables rules chain it is obvious that all ICMP
traffic in the INPUT chain is allowed and in the OUTPUT chain by policy
too.

Curious indeed.

Alexander


-- 
Alexander Dalloz | Enger, Germany
PGP key valid: made 13.07.1999
PGP fingerprint: 2307 88FD 2D41 038E 7416  14CD E197 6E88 ED69 5653





More information about the fedora-list mailing list