Re:[bwm-tools-tech] error during #bwmd --foreground
Brought to you by:
nkukard
From: rajveer s. <raj...@re...> - 2006-02-27 13:20:12
|
=0AHello guys,=0A=0AI'm sorry, but I'm trying so hard to get success with= this tool.=0AI don't want to leave any of the possible way to try this too= l. I appreciate u guys providing help. I'm sending this mail lastly in hope= , possibly, i may be able to do running this tool.=0A=0A=0ASo today, I tri= ed a last and new way. I'm trying to monitor the traffice of main line whic= h is connected to this system. so My configuration file is as below=0A=0AST= EP:#1=0A=0Alinux:~ # cat /etc/bwm_tools/firewall.xml=0A<firewall>=0A = # Global configuration and access classes=0A <global>=0A<modules>= =0A <load name=3D"ip_queue"/>=0A</modules>=0A</global>=0A # A= ccess control lists=0A # Network address translation=0A # Tra= ffic flows=0A <traffic>=0A # Rate can be specified in either = IN, OUT or TOTAL (rate-total)=0A # If rate-total =3D=3D 0, no rate l= imits=0A<flow name=3D"traffic" max-rate=3D"64000" report-timeout=3D"60" nfm= ark=3D"100"/>=0A</traffic>=0A</firewall>=0Alinux:~ #=0A=0ASTEP:#2=0A=0AI co= nfigured my firewall as below: =0Alinux:~ # iptables -L -n -v=0AChain INPUT= (policy ACCEPT 8274 packets, 2729K bytes)=0A pkts bytes target prot op= t in out source destination=0A 0 0 QUEUE = all -- * * 0.0.0.0/0 0.0.0.0/0 MARK match= !0x0=0A=0AChain FORWARD (policy ACCEPT 0 packets, 0 bytes)=0A pkts bytes t= arget prot opt in out source destination=0A 15 = 955 QUEUE all -- * * 0.0.0.0/0 0.0.0.0/0 = MARK match !0x0=0A 0 0 QUEUE all -- * * 0.0= .0.0/0 0.0.0.0/0 MARK match !0x0=0A=0AChain OUTPUT (po= licy ACCEPT 6564 packets, 1344K bytes)=0A pkts bytes target prot opt in= out source destination=0A 0 0 QUEUE all = -- * * 0.0.0.0/0 0.0.0.0/0 MARK match !0x= 0=0Alinux:~ #=0A=0Alinux:~ # iptables -L -n -v -t mangle=0AChain PREROUTING= (policy ACCEPT 9720 packets, 2911K bytes)=0A pkts bytes target prot op= t in out source destination=0A=0AChain INPUT (policy = ACCEPT 8292 packets, 2731K bytes)=0A pkts bytes target prot opt in = out source destination=0A=0AChain FORWARD (policy ACCEPT = 20 packets, 1265 bytes)=0A pkts bytes target prot opt in out so= urce destination=0A 15 955 MARK all -- * * = 0.0.0.0/0 0.0.0.0/0 MARK set 0x64=0A=0AChain OUTP= UT (policy ACCEPT 6564 packets, 1344K bytes)=0A pkts bytes target prot = opt in out source destination=0A=0AChain POSTROUTING = (policy ACCEPT 6581 packets, 1346K bytes)=0A pkts bytes target prot opt= in out source destination=0A=0AChain bwmd (0 referen= ces)=0A pkts bytes target prot opt in out source = destination=0A 0 0 QUEUE all -- * * 0.0.0.0/0 = 0.0.0.0/0 MARK match !0x0=0A 0 0 ACCEPT all --= * * 0.0.0.0/0 0.0.0.0/0=0Alinux:~ #=0A=0ASTEP:#3=0A= =0Astarted my bwmd daemon=0A=0AThen i run the following command; -=0A=0A#bw= m_monitor=0A=0AIt shows some traffic going through it. I was really so happ= y but only 15 packets forwared through it. after it stops working. i contin= uously tried access internet. but neiter the counter were increasing in #ip= tabls -L -v -n -t mangle nor any traffic through bwm_monitor.=0A=0A=0AI got= totally hopeless with this tool. If u guys have any other tools to try out= . Please suggest.=0A=0A=0AWith thanks & regards=0A=0ARajveer Singh=0A=0AOn = Mon, 27 Feb 2006 Kobe Lenjou wrote :=0A>Then your rules are wrong ;-)=0A>= =0A>You should be able to figure this ons out!=0A>=0A>Check:=0A>- the ip ad= resses used=0A>- try other 'general rules' like 'each packet coming on 'eth= 0' (or whatever you lan interface is)=0A>=0A>rajveer singh wrote:=0A>>=0A>>= Dear Mr, Kobe,=0A>>i checked it with bwm_monitor, there was not movement in= traffice. I'm 100% sure that bwmd deamen is already running as u can see t= he following output: -=0A>>linux:~ # ps -aux|grep bwmd=0A>>Warning: bad ps = syntax, perhaps a bogus '-'? See http://procps.sf.net/faq.html=0A>>root = 6842 0.0 0.3 12144 1632 ? Ssl 10:24 0:00 bwmd=0A>>root = 7196 0.0 0.1 1828 612 pts/1 S+ 10:34 0:00 grep bwmd=0A>>linux:~ #= =0A>>=0A>>And this please this is the output of bwm_monitor=0A>>=0A>>BWM Mo= nitor v0.2.2 - Copyright (c) 2003-2005 Linux Based Systems Design ├&#= 9472;──────────= ──────────γ= 2;──────────	= 472;──────────&= #9472;───┐│ = = ││ ┌─────γ= 2;────────┐ = = ││ │ main_line │ = = ││ │-flow_machine1│ = = ││ │ flow_machine2│ ┌= ─┤ Traffic Flow: flow_machine1 ├───^= 72;──────────&#= 9472;──────┐ = ││ └────&#= 9472;─────────┘= │ │ = ││ = │ Limits: │ = ││ &#= 9474; │ = ││ │= ; Max Rate : 16000 Burst Rate: 32000 │ = ││ │ Qu= eue Len: 64 Queue Size: 16384 │ = ││ │ = │ = ││ │ Current: = │ = ││ │ = │ = ││ │ Rate : = 0 Rate Avg : 0 │ = ││ │ Pkt/s : 0 = Pkt/s Avg : 0 │ = ││ │ Queue Len: 0.00% Queue= Size: 0.00% │ 	= 474;│ │ Bursts : 0 Drops : = 0 │ │	= 474; │ = │ ││= │ = │ ││ = │ Press any key to quit... = │ ││ = └───────γ= 2;──────────	= 472;──────────&= #9472;──────────= ;──────────^= 72;──┘ =0A>>=0A>>this is a output of iptables -L -n= -v=0A>>linux:~ # iptables -L -v -n=0A>>Chain INPUT (policy ACCEPT 185 pack= ets, 49326 bytes)=0A>>pkts bytes target prot opt in out source = destination=0A>>8484 3253K bwmd all -- * * 0.0.0= .0/0 0.0.0.0/0=0A>>=0A>>Chain FORWARD (policy ACCEPT 0 packets, = 0 bytes)=0A>>pkts bytes target prot opt in out source = destination=0A>> 5 310 bwmd all -- * * 0.0.0.0/0 = 0.0.0.0/0=0A>>=0A>>Chain OUTPUT (policy ACCEPT 8732 packets, 3148K = bytes)=0A>>pkts bytes target prot opt in out source d= estination=0A>>=0A>>Chain bwmd (2 references)=0A>>pkts bytes target prot= opt in out source destination=0A>> 5 310 QUEUE = all -- * * 0.0.0.0/0 0.0.0.0/0 MARK match= !0x0=0A>>8483 3253K ACCEPT all -- * * 0.0.0.0/0 = 0.0.0.0/0=0A>>linux:~ #=0A>>=0A>>and this is a output of iptables -L -n -v = -t mangle=0A>>linux:~ # iptables -L -v -n -t mangle=0A>>Chain PREROUTING (p= olicy ACCEPT 10069 packets, 3604K bytes)=0A>>pkts bytes target prot opt = in out source destination=0A>>=0A>>Chain INPUT (policy A= CCEPT 9160 packets, 3494K bytes)=0A>>pkts bytes target prot opt in ou= t source destination=0A>>=0A>>Chain FORWARD (policy ACCEPT = 5 packets, 310 bytes)=0A>>pkts bytes target prot opt in out source= destination=0A>> 0 0 MARK tcp -- * * = 192.168.0.1 0.0.0.0/0 MARK set 0x3e9=0A>> 5 310 MARK= udp -- * * 192.168.0.1 0.0.0.0/0 MARK s= et 0x3e9=0A>> 0 0 MARK tcp -- * * 192.168.0.2 = 0.0.0.0/0 MARK set 0x3ea=0A>> 0 0 MARK udp -- * = * 192.168.0.2 0.0.0.0/0 MARK set 0x3ea=0A>>=0A>= >Chain OUTPUT (policy ACCEPT 9253 packets, 3338K bytes)=0A>>pkts bytes targ= et prot opt in out source destination=0A>>=0A>>Chain = POSTROUTING (policy ACCEPT 9258 packets, 3338K bytes)=0A>>pkts bytes target= prot opt in out source destination=0A>>=0A>>Chain bw= md (0 references)=0A>>pkts bytes target prot opt in out source = destination=0A>> 0 0 QUEUE all -- * * 0.0= .0.0/0 0.0.0.0/0 MARK match !0x0=0A>> 0 0 ACCEPT= all -- * * 0.0.0.0/0 0.0.0.0/0=0A>>linux:~ #=0A>= >=0A>>You can see in mangle table's bwmd chain, the counter is not going up= where as the bwmd chain of filter chain is happening something. Please see= and suggest me where i'm making mistakes=0A>>=0A>>With thanks & regards=0A= >>=0A>>Rajveer Singh=0A>>=0A>>On Sun, 26 Feb 2006 Kobe Lenjou wrote :=0A>> = >Did you check the good working with 'bwm_monitor' and is the bwmd deamon r= unning?=0A>> >=0A>> >Also, try iptables -L -n -v to see any counters going = up=0A>> >=0A>> >Greetz=0A>> >Kobe=0A>> >=0A>> >rajveer singh wrote:=0A>> >>= =0A>> >> Hi all,=0A>> >>=0A>> >>Thanks Mr. Kobe for providing steps it hel= ps me a lot. but i goes to monitor there nothing is happening.=0A>> >>my /e= tc/bwm_tools/firewall's contents are as below=0A>> >>=0A>> >> # Global c= onfiguration and access classes=0A>> >>=0A>> >>=0A>> >>=0A>> >> <glo= bal>=0A>> >><modules>=0A>> >> <load name=3D"ip_queue"/>=0A>> >></mod= ules>=0A>> >> <class name=3D"out_machine1">=0A>> >><address name=3D"= out_machine1_tcp" proto=3D"tcp" src=3D"192.168.0.1"/>=0A>> >><address name= =3D"out_machine1_udp" proto=3D"udp" src=3D"192.168.0.1"/>=0A>> >></class>= =0A>> >>=0A>> >> <class name=3D"out_machine2">=0A>> >><address name= =3D"out_machine2_tcp" proto=3D"tcp" src=3D"192.168.0.2"/>=0A>> >><address = name=3D"out_machine2_udp" proto=3D"udp" src=3D"192.168.0.2"/>=0A>> >></cla= ss>=0A>> >>=0A>> >></global>=0A>> >>=0A>> >>=0A>> >> # Access contro= l lists=0A>> >> # Network address translation=0A>> >> # Traff= ic flows=0A>> >>=0A>> >> <traffic>=0A>> >>=0A>> >> # Rate can= be specified in either IN, OUT or TOTAL (rate-total)=0A>> >> # If r= ate-total =3D=3D 0, no rate limits=0A>> >>=0A>> >>=0A>> >><flow name=3D"mai= n_line" stats-len=3D"5" queue-size=3D"262144" queue-len=3D"400" max-rate=3D= "64000" burst-rate=3D"65000" report-timeout=3D"60">=0A>> >> <flow na= me=3D"flow_machine1" max-rate=3D"16000" burst-rate=3D"32000" queue-size=3D"= 16384" report-timeout=3D"60">=0A>> >> <queue prio=3D"99" nfm= ark=3D"1001">=0A>> >> out_machine1;=0A>> >> = </queue>=0A>> >> </flow>=0A>> >> <flow name=3D"flow_ma= chine2" max-rate=3D"16000" burst-rate=3D"32000" queue-size=3D"16384" report= -timeout=3D"60">=0A>> >> <queue prio=3D"99" nfmark=3D"1002">= =0A>> >> out_machine2;=0A>> >> </queu= e>=0A>> >> </flow>=0A>> >></flow>=0A>> >></traffic>=0A>> >></firewal= l>=0A>> >>=0A>> >>and my contents of /etc/sysconfig/iptables are as below:= =0A>> >>=0A>> >># Generated using BWM Firewall v0.2.2: Sat Feb 25 18:06:44 = 2006=0A>> >>=0A>> >>*mangle=0A>> >>:OUTPUT ACCEPT=0A>> >>:INPUT ACCEPT=0A>>= >>:FORWARD ACCEPT=0A>> >>-A FORWARD --source 192.168.0.1 --protocol tcp -= j MARK --set-mark 1001=0A>> >>-A FORWARD --source 192.168.0.1 --protocol u= dp -j MARK --set-mark 1001=0A>> >>-A FORWARD --source 192.168.0.2 --proto= col tcp -j MARK --set-mark 1002=0A>> >>-A FORWARD --source 192.168.0.2 --= protocol udp -j MARK --set-mark 1002=0A>> >>COMMIT=0A>> >>*filter=0A>> >>= :OUTPUT ACCEPT=0A>> >>:bwmd -=0A>> >>:INPUT ACCEPT=0A>> >>:FORWARD ACCEPT= =0A>> >>-A bwmd -m mark ! --mark 0 -j QUEUE=0A>> >>COMMIT=0A>> >>=0A>> >>wh= en i tried to create graph as per below=0A>> >>linux:~ # bwm_graph --flow= =3D"out_machine1 --start=3D"2006/02/25 18:28" --end=3D"2006/02/25 18:30" ou= tput=3D/etc/file1=0A>> >> >=0A>> >> >=0A>> >> >=0A>> >> >=0A>> >> >=0A>> >>= >=0A>> >>nothing happen=0A>> >>=0A>> >>I'm thinking it's some problem in m= y firewall setup. I tried to recognise it. but unable to find it.=0A>> >>= =0A>> >>=0A>> >>=0A>>=0A>>=0A>>=0A>><http://adworks.rediff.com/cgi-bin/AdWo= rks/sigclick.cgi/www.rediff.com/signature-home.htm/1507191490@Middle5?PARTN= ER=3D3>=0A>=0A>=0A>=0A>----------------------------------------------------= ---=0A>This SF.Net email is sponsored by xPML, a groundbreaking scripting l= anguage=0A>that extends applications into web and mobile media. Attend the = live webcast=0A>and join the prime developer group breaking into this new c= oding territory!=0A>http://sel.as-us.falkag.net/sel?cmd=3Dlnk&kid=3D110944&= bid=3D241720&dat=3D121642=0A>______________________________________________= _=0A>bwm-tools-tech mailing list=0A>bwm...@li...=0A= >https://lists.sourceforge.net/lists/listinfo/bwm-tools-tech=0A |