Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- UDP packet 1:
- Dec 18 15:07:00 dst-host kernel: TRACE: raw:PREROUTING:policy:5 IN=ens160 OUT= MAC=<MAC_ADDRESS> SRC=<SRC_HOST> DST=<DST_HOST> LEN=1078 TOS=0x00 PREC=0x00 TTL=64 ID=39907 DF PROTO=UDP SPT=58108 DPT=31377 LEN=1058
- Dec 18 15:07:00 dst-host kernel: TRACE: mangle:PREROUTING:policy:1 IN=ens160 OUT= MAC=<MAC_ADDRESS> SRC=<SRC_HOST> DST=<DST_HOST> LEN=1078 TOS=0x00 PREC=0x00 TTL=64 ID=39907 DF PROTO=UDP SPT=58108 DPT=31377 LEN=1058
- Dec 18 15:07:00 dst-host kernel: TRACE: mangle:INPUT:policy:1 IN=ens160 OUT= MAC=<MAC_ADDRESS> SRC=<SRC_HOST> DST=<DST_HOST> LEN=1078 TOS=0x00 PREC=0x00 TTL=64 ID=39907 DF PROTO=UDP SPT=58108 DPT=31377 LEN=1058 UID=55377 GID=10513
- Dec 18 15:07:00 dst-host kernel: TRACE: filter:INPUT:policy:7 IN=ens160 OUT= MAC=<MAC_ADDRESS> SRC=<SRC_HOST> DST=<DST_HOST> LEN=1078 TOS=0x00 PREC=0x00 TTL=64 ID=39907 DF PROTO=UDP SPT=58108 DPT=31377 LEN=1058 UID=55377 GID=10513
- UDP packet 2:
- Dec 18 15:15:32 dst-host kernel: TRACE: raw:PREROUTING:policy:5 IN=ens160 OUT= MAC=<MAC_ADDRESS> SRC=<SRC_HOST> DST=<DST_HOST> LEN=1078 TOS=0x00 PREC=0x00 TTL=64 ID=31105 DF PROTO=UDP SPT=57564 DPT=31377 LEN=1058
- Dec 18 15:15:32 dst-host kernel: TRACE: mangle:PREROUTING:policy:1 IN=ens160 OUT= MAC=<MAC_ADDRESS> SRC=<SRC_HOST> DST=<DST_HOST> LEN=1078 TOS=0x00 PREC=0x00 TTL=64 ID=31105 DF PROTO=UDP SPT=57564 DPT=31377 LEN=1058
- Dec 18 15:15:32 dst-host kernel: TRACE: mangle:INPUT:policy:1 IN=ens160 OUT= MAC=<MAC_ADDRESS> SRC=<SRC_HOST> DST=<DST_HOST> LEN=1078 TOS=0x00 PREC=0x00 TTL=64 ID=31105 DF PROTO=UDP SPT=57564 DPT=31377 LEN=1058 UID=55377 GID=10513
- Dec 18 15:15:32 dst-host kernel: TRACE: filter:INPUT:rule:4 IN=ens160 OUT= MAC=<MAC_ADDRESS> SRC=<SRC_HOST> DST=<DST_HOST> LEN=1078 TOS=0x00 PREC=0x00 TTL=64 ID=31105 DF PROTO=UDP SPT=57564 DPT=31377 LEN=1058 UID=55377 GID=10513
- INPUT chain in the filter table:
- Chain INPUT (policy ACCEPT)
- target prot opt source destination
- ACCEPT udp -- anywhere anywhere /* AppDefense_Iptable_rules */
- ACCEPT tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,PSH,ACK,URG/SYN mark match ! 0x7e/0xfe /* AppDefense_Iptable_rules */
- NFQUEUE udp -- anywhere anywhere udp spt:domain ctstate ESTABLISHED mark match ! 0x1/0x1 /* AppDefense_Iptable_rules */ NFQUEUE num 0 bypass
- NFQUEUE udp -- anywhere anywhere ctstate NEW mark match ! 0x1/0x1 /* AppDefense_Iptable_rules */ NFQUEUE num 0 bypass
- NFQUEUE tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,PSH,ACK,URG/SYN mark match ! 0x1/0x1 /* AppDefense_Iptable_rules */ NFQUEUE num 0 bypass
- vnetchain tcp -- anywhere anywhere mark match ! 0x1/0x1 tcp flags:FIN,SYN,RST,PSH,ACK/SYN
- iptables-save outout:
- # Generated by iptables-save v1.4.21 on Fri Dec 18 15:46:23 2020
- *raw
- :PREROUTING ACCEPT [1083206:121729816]
- :OUTPUT ACCEPT [945565:216273294]
- -A PREROUTING -p icmp -m icmp --icmp-type 8 -j TRACE
- -A PREROUTING -p udp -m udp --dport 4789 -j TRACE
- -A PREROUTING -p udp -m udp --dport 31377 -j TRACE
- -A PREROUTING -p tcp -m tcp --dport 31377 -j TRACE
- COMMIT
- # Completed on Fri Dec 18 15:46:23 2020
- # Generated by iptables-save v1.4.21 on Fri Dec 18 15:46:23 2020
- *mangle
- :PREROUTING ACCEPT [2666931:277032909]
- :INPUT ACCEPT [2435162:247221410]
- :FORWARD ACCEPT [231769:29811499]
- :OUTPUT ACCEPT [2326532:517379471]
- :POSTROUTING ACCEPT [2558333:547194234]
- COMMIT
- # Completed on Fri Dec 18 15:46:23 2020
- # Generated by iptables-save v1.4.21 on Fri Dec 18 15:46:23 2020
- *nat
- :PREROUTING ACCEPT [38849:2491382]
- :INPUT ACCEPT [36893:2348650]
- :OUTPUT ACCEPT [98000:6532091]
- :POSTROUTING ACCEPT [98041:6534551]
- :DOCKER - [0:0]
- -A PREROUTING -m addrtype --dst-type LOCAL -j DOCKER
- -A OUTPUT ! -d 127.0.0.0/8 -m addrtype --dst-type LOCAL -j DOCKER
- -A POSTROUTING -s 172.17.0.0/16 ! -o docker0 -j MASQUERADE
- -A POSTROUTING -s 172.18.0.0/16 ! -o docker_gwbridge -j MASQUERADE
- -A POSTROUTING -s 172.21.0.0/16 ! -o br-d6ff259af253 -j MASQUERADE
- -A POSTROUTING -s 172.21.0.2/32 -d 172.21.0.2/32 -p tcp -m tcp --dport 15672 -j MASQUERADE
- -A POSTROUTING -s 172.21.0.2/32 -d 172.21.0.2/32 -p tcp -m tcp --dport 5672 -j MASQUERADE
- -A POSTROUTING -s 172.21.0.6/32 -d 172.21.0.6/32 -p tcp -m tcp --dport 8000 -j MASQUERADE
- -A DOCKER -i docker0 -j RETURN
- -A DOCKER -i docker_gwbridge -j RETURN
- -A DOCKER -i br-d6ff259af253 -j RETURN
- -A DOCKER ! -i br-d6ff259af253 -p tcp -m tcp --dport 15672 -j DNAT --to-destination 172.21.0.2:15672
- -A DOCKER ! -i br-d6ff259af253 -p tcp -m tcp --dport 5672 -j DNAT --to-destination 172.21.0.2:5672
- -A DOCKER ! -i br-d6ff259af253 -p tcp -m tcp --dport 8000 -j DNAT --to-destination 172.21.0.6:8000
- COMMIT
- # Completed on Fri Dec 18 15:46:23 2020
- # Generated by iptables-save v1.4.21 on Fri Dec 18 15:46:23 2020
- *filter
- :INPUT ACCEPT [30871:2960204]
- :FORWARD DROP [0:0]
- :OUTPUT ACCEPT [28473:6604173]
- :DOCKER - [0:0]
- :DOCKER-ISOLATION-STAGE-1 - [0:0]
- :DOCKER-ISOLATION-STAGE-2 - [0:0]
- :DOCKER-USER - [0:0]
- :vnetchain - [0:0]
- -A INPUT -i lo -p udp -m comment --comment AppDefense_Iptable_rules -j ACCEPT
- -A INPUT -i lo -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG SYN -m mark ! --mark 0x7e/0xfe -m comment --comment AppDefense_Iptable_rules -j ACCEPT
- -A INPUT -p udp -m udp --sport 53 -m conntrack --ctstate ESTABLISHED -m mark ! --mark 0x1/0x1 -m comment --comment AppDefense_Iptable_rules -j NFQUEUE --queue-num 0 --queue-bypass
- -A INPUT -p udp -m conntrack --ctstate NEW -m mark ! --mark 0x1/0x1 -m comment --comment AppDefense_Iptable_rules -j NFQUEUE --queue-num 0 --queue-bypass
- -A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG SYN -m mark ! --mark 0x1/0x1 -m comment --comment AppDefense_Iptable_rules -j NFQUEUE --queue-num 0 --queue-bypass
- -A INPUT -p tcp -m mark ! --mark 0x1/0x1 -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK SYN -j vnetchain
- -A FORWARD -j DOCKER-USER
- -A FORWARD -j DOCKER-ISOLATION-STAGE-1
- -A FORWARD -o docker0 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
- -A FORWARD -o docker0 -j DOCKER
- -A FORWARD -i docker0 ! -o docker0 -j ACCEPT
- -A FORWARD -i docker0 -o docker0 -j ACCEPT
- -A FORWARD -o docker_gwbridge -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
- -A FORWARD -o docker_gwbridge -j DOCKER
- -A FORWARD -i docker_gwbridge ! -o docker_gwbridge -j ACCEPT
- -A FORWARD -o br-d6ff259af253 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
- -A FORWARD -o br-d6ff259af253 -j DOCKER
- -A FORWARD -i br-d6ff259af253 ! -o br-d6ff259af253 -j ACCEPT
- -A FORWARD -i br-d6ff259af253 -o br-d6ff259af253 -j ACCEPT
- -A FORWARD -i docker_gwbridge -o docker_gwbridge -j DROP
- -A OUTPUT -o lo -p udp -m comment --comment AppDefense_Iptable_rules -j ACCEPT
- -A OUTPUT -o lo -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG SYN -m comment --comment AppDefense_Iptable_rules -j ACCEPT
- -A OUTPUT -p udp -m udp --dport 53 -m comment --comment AppDefense_Iptable_rules -j ACCEPT
- -A OUTPUT -p udp -m conntrack --ctstate NEW -m mark ! --mark 0x1/0x1 -m comment --comment AppDefense_Iptable_rules -j NFQUEUE --queue-num 0 --queue-bypass
- -A OUTPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG SYN -m mark ! --mark 0x1/0x1 -m comment --comment AppDefense_Iptable_rules -j NFQUEUE --queue-num 0 --queue-bypass
- -A OUTPUT -p tcp -m mark ! --mark 0x1/0x1 -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK SYN -j vnetchain
- -A DOCKER -d 172.21.0.2/32 ! -i br-d6ff259af253 -o br-d6ff259af253 -p tcp -m tcp --dport 15672 -j ACCEPT
- -A DOCKER -d 172.21.0.2/32 ! -i br-d6ff259af253 -o br-d6ff259af253 -p tcp -m tcp --dport 5672 -j ACCEPT
- -A DOCKER -d 172.21.0.6/32 ! -i br-d6ff259af253 -o br-d6ff259af253 -p tcp -m tcp --dport 8000 -j ACCEPT
- -A DOCKER-ISOLATION-STAGE-1 -i docker0 ! -o docker0 -j DOCKER-ISOLATION-STAGE-2
- -A DOCKER-ISOLATION-STAGE-1 -i docker_gwbridge ! -o docker_gwbridge -j DOCKER-ISOLATION-STAGE-2
- -A DOCKER-ISOLATION-STAGE-1 -i br-d6ff259af253 ! -o br-d6ff259af253 -j DOCKER-ISOLATION-STAGE-2
- -A DOCKER-ISOLATION-STAGE-1 -j RETURN
- -A DOCKER-ISOLATION-STAGE-2 -o docker0 -j DROP
- -A DOCKER-ISOLATION-STAGE-2 -o docker_gwbridge -j DROP
- -A DOCKER-ISOLATION-STAGE-2 -o br-d6ff259af253 -j DROP
- -A DOCKER-ISOLATION-STAGE-2 -j RETURN
- -A DOCKER-USER -j RETURN
- -A vnetchain -j NFQUEUE --queue-num 0 --queue-bypass
- COMMIT
- # Completed on Fri Dec 18 15:46:23 2020
Add Comment
Please, Sign In to add comment