Bug 12162 - firewall: NAT rules for RED are applied to IPsec tunnels
Summary: firewall: NAT rules for RED are applied to IPsec tunnels
Status: CLOSED FIXED
Alias: None
Product: IPFire
Classification: Unclassified
Component: --- (show other bugs)
Version: 2
Hardware: unspecified Unspecified
: Will only affect a few users Crash
Assignee: Stefan Schantl
QA Contact: Alexander Marx
URL:
Keywords:
: 11937 (view as bug list)
Depends on:
Blocks: FWBUGS
  Show dependency treegraph
 
Reported: 2019-09-05 14:35 UTC by Michael Tremer
Modified: 2020-04-25 14:52 UTC (History)
2 users (show)

See Also:


Attachments
Screenshot of the rule (291.74 KB, image/png)
2019-09-09 14:26 UTC, Michael Tremer
Details

Note You need to log in before you can comment on or make changes to this bug.
Description Michael Tremer 2019-09-05 14:35:17 UTC
This is quite a bad issue because there is no workaround.

When I create an SNAT rule for a host to a different public IP address and select RED as destination it will also apply for IPsec tunnels (because those are routed to red0).

Please add something to check if an IPsec policy applies and only enforce this rule then.
Comment 1 Alexander Marx 2019-09-09 12:47:56 UTC
Can you please give me a detailed configuration of the rule?
If i use SNAT i am only able to assign RED ORANGE or GREEN as Source address.
Comment 2 Michael Tremer 2019-09-09 14:26:31 UTC
Created attachment 705 [details]
Screenshot of the rule

Is this screenshot okay?

The particular problem here is that the SNAT rule will match when a packet is being sent from zeiterfassung01.haj.lightningwirelabs.com to a host on an IPsec network.

The NAT rule will apply and change the source IP address of the packet which should NOT happen for the VPN. Hence the packet cannot be routed properly and the connection is never being established.

Disabling the rule allows that the host can talk to all hosts on the VPN networks.
Comment 3 Michael Tremer 2020-02-20 14:40:33 UTC
*** Bug 11937 has been marked as a duplicate of this bug. ***
Comment 4 Stefan Schantl 2020-02-20 16:28:58 UTC
Patch has been sent to the development mailing list:

https://patchwork.ipfire.org/patch/2799/
Comment 6 Peter Müller 2020-04-10 10:37:45 UTC
This will be shipped with Core Update 143 although the release notes do not mention it.

https://blog.ipfire.org/post/ipfire-2-25-core-update-143-is-available-for-testing