Category Archives: Networking

Quick and easy iptables based proxy

Today was a busy day dealing with power outage that affected 2100 businesses in downtown Calgary. Of course, couple of my clients were in the zone that went dark. I offered them to run their key infrastructure from my place for couple of days. Everything went great, except I have only 1 IP address on my connection. That’s not good when both clients want to come in on port 443. What to do?

Call up my ISP and order another IP? Nope: Takes too long, too expensive, I just need this temporarily. Also, ISP might mess it up and take me offline for a while.

Get VM with IPv4 IP and proxy the traffic over? Yes, but why go with something heavy handed like nginx?

I prefer this elegant solution brought to you by iptables:


# echo 1 >| /proc/sys/net/ipv4/ip_forward
# iptables -t nat -A PREROUTING -p tcp -d $IP_OF_VM --dport 443 -j DNAT --to $IP_WHERE_IM_FORWARDING_TO:8443
# iptables -t nat -A POSTROUTING -j MASQUERADE

[Solved] Linux PPTP client NATed behind pfsense firewall

When migrating my PPTP client configuration from an older Linux server to a new one, I could not get a PPTP tunnel up and running on the new server.   I kept getting this error flow:


using channel 15
Using interface ppp0
Connect: ppp0 <--> /dev/pts/1
sent [LCP ConfReq id=0x1 <asyncmap 0x0> <magic 0xxxxx6a93> <pcomp> <accomp>]
sent [LCP ConfReq id=0x1 <asyncmap 0x0> <magic 0xxxxx6a93> <pcomp> <accomp>]
sent [LCP ConfReq id=0x1 <asyncmap 0x0> <magic 0xxxxx6a93> <pcomp> <accomp>]
sent [LCP ConfReq id=0x1 <asyncmap 0x0> <magic 0xxxxx6a93> <pcomp> <accomp>]
sent [LCP ConfReq id=0x1 <asyncmap 0x0> <magic 0xxxxx6a93> <pcomp> <accomp>]
sent [LCP ConfReq id=0x1 <asyncmap 0x0> <magic 0xxxxx6a93> <pcomp> <accomp>]
sent [LCP ConfReq id=0x1 <asyncmap 0x0> <magic 0xxxxx6a93> <pcomp> <accomp>]
Script pptp vpn.xxxxxxxx.com --nolaunchpppd finished (pid 23704), status = 0x0
Modem hangup

So I was sending, but getting nothing back.

I tripple checked my configuration, and tweaked a few settings.  No luck.  Then I stumbled on an article that talked about the challenges of PPTP behind NAT devices.    I already knew about the common issue of not being able to dial out with more than one client session to a remote PPTP server.  For that reason I was careful not to have  more than one open at the same time,  but I thought I’d dig a bit deeper to see if NAT was the culprit.

Long story short, I noticed that pfsense -> diagnostics -> pftop was showing a GRE state from old server to the destination VPN server.  It showed age of 3+ hours (forgot the exact number) even though I was sure that the PPTP session on the old server was shut down.   I reset the firewall state on pfsense, and it started to work immediately.

The moral of the story is that pfsense likes to keep the GRE state open for hours after it’s been disconnected.   That is a problem.   Packets go out, but they are NATed to the wrong server when they come back.

Version details:

Pfsense: 2.1.4-RELEASE (i386)
PPTP: 1.7.2
Linux: Ubuntu 14.04.1 LTS

IPv6 for the impatient

I always wanted to get my feet wet with IPv6.   The problem is that my ISP doesn’t support it.   Today I found out that I don’t need to wait until they get their act together, I can get onto IPv6 imediatelly by using a tunnel from Hurricane Electric.

  • It’s free
  • You get /48 prefix of publicly routed IPv6 IPs.  (1208925819614629174706176 addressees)  I still don’t know what I will do with that many 🙂
  • Can dual stack.  IPv4 and IPv6 side by side on a single router.  You don’t need to shut down or disrupt IPv4.    You do not need to quit IPv4 cold turkey.  In fact, I had only two machines on my network dual stacked, happily coexisting with their IPv4 counterparts.
  • Not that hard to setup if you have a router that plays nice (most do)

I got it up and running in under an hour.   It was fun.  When I switched to purely IPv6 mode, it reminded me of the 90’s when every site that actually worked was  a cause for celebration.

To be honest, after a day or so, I actually ended up turning it off.  The trouble was that even though I was running dual stack, everything liked to default to IPv6 first and IPv4 second.   That’s good in theory, but in practice, I feel IPv6 is just not ready if you want 100% smooth experience.

I’ll try again in a year or so since I can see IPv6 adoption is exploding.

 

Pingb: Bandwidth Measuring

Ever needed to get an estimate of a link’s bandwidth and all you have is shell access to one of the end points?

Normally you would need access to both endpoints and run something like iperf across the link.   That’s the proper way, but it takes a lot of time to setup (poke holes through firewalls etc).   If you don’t want to go through that hassle and just need a quick estimate, you can use pingb.

Pingb estimates the bandwidth by measuring the difference between ICMP echo requests of different sizes.