is it possible to track ipip tunneled packets using conntrack












0














I want to track all the flows coming and going out of host machine with conntrack tool.



I have an ipip tunnel packet coming into host machine:



22:56:00.776013 IP 10.0.35.0 > 10.233.67.58: IP 10.0.5.2.46056 > 2.2.2.10.http: Flags [.], ack 7241, win 171, options [nop,nop,TS val 2539294815 ecr 3333684669], length 0 (ipip-proto-4)



10.0.5.2 is client creating http request to 2.2.2.10.



In this case I am only observing the response to above incoming flow using conntrack -L command. I am not able to track the request packet which is part of the header of above ipip tunnel packet.



Is there a way to track this tunneled request packet with conntrack?










share|improve this question



























    0














    I want to track all the flows coming and going out of host machine with conntrack tool.



    I have an ipip tunnel packet coming into host machine:



    22:56:00.776013 IP 10.0.35.0 > 10.233.67.58: IP 10.0.5.2.46056 > 2.2.2.10.http: Flags [.], ack 7241, win 171, options [nop,nop,TS val 2539294815 ecr 3333684669], length 0 (ipip-proto-4)



    10.0.5.2 is client creating http request to 2.2.2.10.



    In this case I am only observing the response to above incoming flow using conntrack -L command. I am not able to track the request packet which is part of the header of above ipip tunnel packet.



    Is there a way to track this tunneled request packet with conntrack?










    share|improve this question

























      0












      0








      0







      I want to track all the flows coming and going out of host machine with conntrack tool.



      I have an ipip tunnel packet coming into host machine:



      22:56:00.776013 IP 10.0.35.0 > 10.233.67.58: IP 10.0.5.2.46056 > 2.2.2.10.http: Flags [.], ack 7241, win 171, options [nop,nop,TS val 2539294815 ecr 3333684669], length 0 (ipip-proto-4)



      10.0.5.2 is client creating http request to 2.2.2.10.



      In this case I am only observing the response to above incoming flow using conntrack -L command. I am not able to track the request packet which is part of the header of above ipip tunnel packet.



      Is there a way to track this tunneled request packet with conntrack?










      share|improve this question













      I want to track all the flows coming and going out of host machine with conntrack tool.



      I have an ipip tunnel packet coming into host machine:



      22:56:00.776013 IP 10.0.35.0 > 10.233.67.58: IP 10.0.5.2.46056 > 2.2.2.10.http: Flags [.], ack 7241, win 171, options [nop,nop,TS val 2539294815 ecr 3333684669], length 0 (ipip-proto-4)



      10.0.5.2 is client creating http request to 2.2.2.10.



      In this case I am only observing the response to above incoming flow using conntrack -L command. I am not able to track the request packet which is part of the header of above ipip tunnel packet.



      Is there a way to track this tunneled request packet with conntrack?







      linux tunneling






      share|improve this question













      share|improve this question











      share|improve this question




      share|improve this question










      asked Dec 17 at 11:14









      Mahesh Jadhav

      11




      11



























          active

          oldest

          votes











          Your Answer








          StackExchange.ready(function() {
          var channelOptions = {
          tags: "".split(" "),
          id: "106"
          };
          initTagRenderer("".split(" "), "".split(" "), channelOptions);

          StackExchange.using("externalEditor", function() {
          // Have to fire editor after snippets, if snippets enabled
          if (StackExchange.settings.snippets.snippetsEnabled) {
          StackExchange.using("snippets", function() {
          createEditor();
          });
          }
          else {
          createEditor();
          }
          });

          function createEditor() {
          StackExchange.prepareEditor({
          heartbeatType: 'answer',
          autoActivateHeartbeat: false,
          convertImagesToLinks: false,
          noModals: true,
          showLowRepImageUploadWarning: true,
          reputationToPostImages: null,
          bindNavPrevention: true,
          postfix: "",
          imageUploader: {
          brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
          contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
          allowUrls: true
          },
          onDemand: true,
          discardSelector: ".discard-answer"
          ,immediatelyShowMarkdownHelp:true
          });


          }
          });














          draft saved

          draft discarded


















          StackExchange.ready(
          function () {
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f489451%2fis-it-possible-to-track-ipip-tunneled-packets-using-conntrack%23new-answer', 'question_page');
          }
          );

          Post as a guest















          Required, but never shown






























          active

          oldest

          votes













          active

          oldest

          votes









          active

          oldest

          votes






          active

          oldest

          votes
















          draft saved

          draft discarded




















































          Thanks for contributing an answer to Unix & Linux Stack Exchange!


          • Please be sure to answer the question. Provide details and share your research!

          But avoid



          • Asking for help, clarification, or responding to other answers.

          • Making statements based on opinion; back them up with references or personal experience.


          To learn more, see our tips on writing great answers.





          Some of your past answers have not been well-received, and you're in danger of being blocked from answering.


          Please pay close attention to the following guidance:


          • Please be sure to answer the question. Provide details and share your research!

          But avoid



          • Asking for help, clarification, or responding to other answers.

          • Making statements based on opinion; back them up with references or personal experience.


          To learn more, see our tips on writing great answers.




          draft saved


          draft discarded














          StackExchange.ready(
          function () {
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f489451%2fis-it-possible-to-track-ipip-tunneled-packets-using-conntrack%23new-answer', 'question_page');
          }
          );

          Post as a guest















          Required, but never shown





















































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown

































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown







          Popular posts from this blog

          Morgemoulin

          Scott Moir

          Souastre