Skip to main content
Added more details about how to correlate the packets and about the network setup.
Source Link

enter image description here Here is the appropriate log:

Mar 03 10:16:23 rs3 kernel: [IPTABLES INPUT IPv4] DROP IN=eth0 OUT= MAC=ae:12:7b:9b:5d:e4:00:15:c7:c9:45:80:08:00 SRC=<MyIPAddress>.117 DST=<ServerIPAddress>.116 LEN=40 TOS=0x00 PREC=0x00 TTL=55 ID=11550 DF PROTO=TCP SPT=63526 DPT=1194 WINDOW=32038 RES=0x00 ACK URGP=0 

I used the IP ID (11550) to find the packet in wireshark. And this is the only IP packet with this ID.

Wireshark Details of Logged packet

Edit: The server IP is a fixed IP. My dynamically assigned IP address was not changed during the the test. Connections are initiated by the LocalComputer towards the Server. The setup is as follows:

================= =================== =============== | LocalComputer | ---- | NAT Router .117 | ---- | Server .116 | ================= =================== =============== Private IP Dynam. Assigned Fixed IP but fixed during test 

enter image description here

Here is the appropriate log:

Mar 03 10:16:23 rs3 kernel: [IPTABLES INPUT IPv4] DROP IN=eth0 OUT= MAC=ae:12:7b:9b:5d:e4:00:15:c7:c9:45:80:08:00 SRC=<MyIPAddress>.117 DST=<ServerIPAddress>.116 LEN=40 TOS=0x00 PREC=0x00 TTL=55 ID=11550 DF PROTO=TCP SPT=63526 DPT=1194 WINDOW=32038 RES=0x00 ACK URGP=0 

I used the IP ID (11550) to find the packet in wireshark. And this is the only IP packet with this ID.

Wireshark Details of Logged packet

Edit: The server IP is a fixed IP. My dynamically assigned IP address was not changed during the the test. Connections are initiated by the LocalComputer towards the Server. The setup is as follows:

================= =================== =============== | LocalComputer | ---- | NAT Router .117 | ---- | Server .116 | ================= =================== =============== Private IP Dynam. Assigned Fixed IP but fixed during test 
Added section about protocols
Source Link

I'm setting up a server running Debian Jessie with some applications like iptables firewall, fail2ban, openvpn, apache, ...

The iptables firewall is configured in the way, that it logs every packet that is dropped. A small excerpt from the iptables configuration:

... -A INPUT -m comment --comment "003 accept related established rules IPv4" -m state --state RELATED,ESTABLISHED -j ACCEPT ... -A INPUT -p tcp -m multiport --dports 1194 -m comment --comment "303 allow incoming OpenVPN" -m state --state NEW -j ACCEPT ... -A INPUT -m comment --comment "900 IPv4 log dropped input chain" -j LOG --log-prefix "[IPTABLES INPUT IPv4] DROP " --log-level 6 -A INPUT -m comment --comment "910 IPv4 deny all other input requests" -j DROP 

OpenVPN (which uses port 1194) works well. I can connect, use the connection and work for hours, up to the point when I need to transfer larger amount of data. At this point some lines like the following appear in the log:

Mar 02 20:39:27 rs3 kernel: [IPTABLES INPUT IPv4] DROP IN=eth0 OUT= MAC=ae:12:7b:9b:5d:e4:00:15:c7:c9:45:80:08:00 SRC=<MyIPAddress> DST=<ServerIPAddress> LEN=40 TOS=0x00 PREC=0x00 TTL=55 ID=20713 DF PROTO=TCP SPT=61941 DPT=1194 WINDOW=3040 RES=0x00 ACK URGP=0 Mar 02 20:39:27 rs3 kernel: [IPTABLES INPUT IPv4] DROP IN=eth0 OUT= MAC=ae:12:7b:9b:5d:e4:00:15:c7:c9:45:80:08:00 SRC=<MyIPAddress> DST=<ServerIPAddress> LEN=40 TOS=0x00 PREC=0x00 TTL=55 ID=20718 DF PROTO=TCP SPT=61941 DPT=1194 WINDOW=3040 RES=0x00 ACK URGP=0 Mar 02 20:39:27 rs3 kernel: [IPTABLES INPUT IPv4] DROP IN=eth0 OUT= MAC=ae:12:7b:9b:5d:e4:00:15:c7:c9:45:80:08:00 SRC=<MyIPAddress> DST=<ServerIPAddress> LEN=40 TOS=0x00 PREC=0x00 TTL=55 ID=20719 DF PROTO=TCP SPT=61941 DPT=1194 WINDOW=3040 RES=0x00 ACK URGP=0 

[These logs are picked up from fail2ban and the server closes the connection to my local computer.]

Q: Why are those packets dropped (and logged)? That means: Why are those packets not processed by the 'RELATED,ESTABLISHED' rule?

What I did so far: read documentation, thought about the problem ;-), checked the rules again and again, googled the Internet - but without any result.

Edit: maybe this is important: the DROP list that was created by fail2ban has about 500 entries.

Edit: I want to know the reason (this is why I'm using 'Why' in my question). I'm not interested in workarounds.

Edit: This behavior is not limited to OpenVPN, using other protocols (e.g. ssh) has the same problem.

Edit: To give you an impression, have a look at the wireshark screenshot: the highlighted packet was droped / logged - all other packets from the screenshot not.

enter image description here

I'm setting up a server running Debian Jessie with some applications like iptables firewall, fail2ban, openvpn, apache, ...

The iptables firewall is configured in the way, that it logs every packet that is dropped. A small excerpt from the iptables configuration:

... -A INPUT -m comment --comment "003 accept related established rules IPv4" -m state --state RELATED,ESTABLISHED -j ACCEPT ... -A INPUT -p tcp -m multiport --dports 1194 -m comment --comment "303 allow incoming OpenVPN" -m state --state NEW -j ACCEPT ... -A INPUT -m comment --comment "900 IPv4 log dropped input chain" -j LOG --log-prefix "[IPTABLES INPUT IPv4] DROP " --log-level 6 -A INPUT -m comment --comment "910 IPv4 deny all other input requests" -j DROP 

OpenVPN (which uses port 1194) works well. I can connect, use the connection and work for hours, up to the point when I need to transfer larger amount of data. At this point some lines like the following appear in the log:

Mar 02 20:39:27 rs3 kernel: [IPTABLES INPUT IPv4] DROP IN=eth0 OUT= MAC=ae:12:7b:9b:5d:e4:00:15:c7:c9:45:80:08:00 SRC=<MyIPAddress> DST=<ServerIPAddress> LEN=40 TOS=0x00 PREC=0x00 TTL=55 ID=20713 DF PROTO=TCP SPT=61941 DPT=1194 WINDOW=3040 RES=0x00 ACK URGP=0 Mar 02 20:39:27 rs3 kernel: [IPTABLES INPUT IPv4] DROP IN=eth0 OUT= MAC=ae:12:7b:9b:5d:e4:00:15:c7:c9:45:80:08:00 SRC=<MyIPAddress> DST=<ServerIPAddress> LEN=40 TOS=0x00 PREC=0x00 TTL=55 ID=20718 DF PROTO=TCP SPT=61941 DPT=1194 WINDOW=3040 RES=0x00 ACK URGP=0 Mar 02 20:39:27 rs3 kernel: [IPTABLES INPUT IPv4] DROP IN=eth0 OUT= MAC=ae:12:7b:9b:5d:e4:00:15:c7:c9:45:80:08:00 SRC=<MyIPAddress> DST=<ServerIPAddress> LEN=40 TOS=0x00 PREC=0x00 TTL=55 ID=20719 DF PROTO=TCP SPT=61941 DPT=1194 WINDOW=3040 RES=0x00 ACK URGP=0 

[These logs are picked up from fail2ban and the server closes the connection to my local computer.]

Q: Why are those packets dropped (and logged)? That means: Why are those packets not processed by the 'RELATED,ESTABLISHED' rule?

What I did so far: read documentation, thought about the problem ;-), checked the rules again and again, googled the Internet - but without any result.

Edit: maybe this is important: the DROP list that was created by fail2ban has about 500 entries.

Edit: I want to know the reason (this is why I'm using 'Why' in my question). I'm not interested in workarounds.

I'm setting up a server running Debian Jessie with some applications like iptables firewall, fail2ban, openvpn, apache, ...

The iptables firewall is configured in the way, that it logs every packet that is dropped. A small excerpt from the iptables configuration:

... -A INPUT -m comment --comment "003 accept related established rules IPv4" -m state --state RELATED,ESTABLISHED -j ACCEPT ... -A INPUT -p tcp -m multiport --dports 1194 -m comment --comment "303 allow incoming OpenVPN" -m state --state NEW -j ACCEPT ... -A INPUT -m comment --comment "900 IPv4 log dropped input chain" -j LOG --log-prefix "[IPTABLES INPUT IPv4] DROP " --log-level 6 -A INPUT -m comment --comment "910 IPv4 deny all other input requests" -j DROP 

OpenVPN (which uses port 1194) works well. I can connect, use the connection and work for hours, up to the point when I need to transfer larger amount of data. At this point some lines like the following appear in the log:

Mar 02 20:39:27 rs3 kernel: [IPTABLES INPUT IPv4] DROP IN=eth0 OUT= MAC=ae:12:7b:9b:5d:e4:00:15:c7:c9:45:80:08:00 SRC=<MyIPAddress> DST=<ServerIPAddress> LEN=40 TOS=0x00 PREC=0x00 TTL=55 ID=20713 DF PROTO=TCP SPT=61941 DPT=1194 WINDOW=3040 RES=0x00 ACK URGP=0 Mar 02 20:39:27 rs3 kernel: [IPTABLES INPUT IPv4] DROP IN=eth0 OUT= MAC=ae:12:7b:9b:5d:e4:00:15:c7:c9:45:80:08:00 SRC=<MyIPAddress> DST=<ServerIPAddress> LEN=40 TOS=0x00 PREC=0x00 TTL=55 ID=20718 DF PROTO=TCP SPT=61941 DPT=1194 WINDOW=3040 RES=0x00 ACK URGP=0 Mar 02 20:39:27 rs3 kernel: [IPTABLES INPUT IPv4] DROP IN=eth0 OUT= MAC=ae:12:7b:9b:5d:e4:00:15:c7:c9:45:80:08:00 SRC=<MyIPAddress> DST=<ServerIPAddress> LEN=40 TOS=0x00 PREC=0x00 TTL=55 ID=20719 DF PROTO=TCP SPT=61941 DPT=1194 WINDOW=3040 RES=0x00 ACK URGP=0 

[These logs are picked up from fail2ban and the server closes the connection to my local computer.]

Q: Why are those packets dropped (and logged)? That means: Why are those packets not processed by the 'RELATED,ESTABLISHED' rule?

What I did so far: read documentation, thought about the problem ;-), checked the rules again and again, googled the Internet - but without any result.

Edit: maybe this is important: the DROP list that was created by fail2ban has about 500 entries.

Edit: I want to know the reason (this is why I'm using 'Why' in my question). I'm not interested in workarounds.

Edit: This behavior is not limited to OpenVPN, using other protocols (e.g. ssh) has the same problem.

Edit: To give you an impression, have a look at the wireshark screenshot: the highlighted packet was droped / logged - all other packets from the screenshot not.

enter image description here

Clarified the question; added section about workarounds.
Source Link

I'm setting up a server running Debian Jessie with some applications like iptables firewall, fail2ban, openvpn, apache, ...

The iptables firewall is configured in the way, that it logs every packet that is dropped. A small excerpt from the iptables configuration:

... -A INPUT -m comment --comment "003 accept related established rules IPv4" -m state --state RELATED,ESTABLISHED -j ACCEPT ... -A INPUT -p tcp -m multiport --dports 1194 -m comment --comment "303 allow incoming OpenVPN" -m state --state NEW -j ACCEPT ... -A INPUT -m comment --comment "900 IPv4 log dropped input chain" -j LOG --log-prefix "[IPTABLES INPUT IPv4] DROP " --log-level 6 -A INPUT -m comment --comment "910 IPv4 deny all other input requests" -j DROP 

OpenVPN (which uses port 1194) works well. I can connect, use the connection and work for hours, up to the point when I need to transfer larger amount of data. At this point some lines like the following appear in the log:

Mar 02 20:39:27 rs3 kernel: [IPTABLES INPUT IPv4] DROP IN=eth0 OUT= MAC=ae:12:7b:9b:5d:e4:00:15:c7:c9:45:80:08:00 SRC=<MyIPAddress> DST=<ServerIPAddress> LEN=40 TOS=0x00 PREC=0x00 TTL=55 ID=20713 DF PROTO=TCP SPT=61941 DPT=1194 WINDOW=3040 RES=0x00 ACK URGP=0 Mar 02 20:39:27 rs3 kernel: [IPTABLES INPUT IPv4] DROP IN=eth0 OUT= MAC=ae:12:7b:9b:5d:e4:00:15:c7:c9:45:80:08:00 SRC=<MyIPAddress> DST=<ServerIPAddress> LEN=40 TOS=0x00 PREC=0x00 TTL=55 ID=20718 DF PROTO=TCP SPT=61941 DPT=1194 WINDOW=3040 RES=0x00 ACK URGP=0 Mar 02 20:39:27 rs3 kernel: [IPTABLES INPUT IPv4] DROP IN=eth0 OUT= MAC=ae:12:7b:9b:5d:e4:00:15:c7:c9:45:80:08:00 SRC=<MyIPAddress> DST=<ServerIPAddress> LEN=40 TOS=0x00 PREC=0x00 TTL=55 ID=20719 DF PROTO=TCP SPT=61941 DPT=1194 WINDOW=3040 RES=0x00 ACK URGP=0 

[These logs are picked up from fail2ban and the server closes the connection to my local computer.]

Q: Why are those packets dropped (and logged)? That means: Why are those packets not processed by the 'RELATED,ESTABLISHED' rule?

What I did so far: read documentation, thought about the problem ;-), checked the rules again and again, googled the Internet - but without any result.

Edit: maybe this is important: the DROP list that was created by fail2ban has about 500 entries.

Edit: I want to know the reason (this is why I'm using 'Why' in my question). I'm not interested in workarounds.

I'm setting up a server running Debian Jessie with some applications like iptables firewall, fail2ban, openvpn, apache, ...

The iptables firewall is configured in the way, that it logs every packet that is dropped. A small excerpt from the iptables configuration:

... -A INPUT -m comment --comment "003 accept related established rules IPv4" -m state --state RELATED,ESTABLISHED -j ACCEPT ... -A INPUT -p tcp -m multiport --dports 1194 -m comment --comment "303 allow incoming OpenVPN" -m state --state NEW -j ACCEPT ... -A INPUT -m comment --comment "900 IPv4 log dropped input chain" -j LOG --log-prefix "[IPTABLES INPUT IPv4] DROP " --log-level 6 -A INPUT -m comment --comment "910 IPv4 deny all other input requests" -j DROP 

OpenVPN (which uses port 1194) works well. I can connect, use the connection and work for hours, up to the point when I need to transfer larger amount of data. At this point some lines like the following appear in the log:

Mar 02 20:39:27 rs3 kernel: [IPTABLES INPUT IPv4] DROP IN=eth0 OUT= MAC=ae:12:7b:9b:5d:e4:00:15:c7:c9:45:80:08:00 SRC=<MyIPAddress> DST=<ServerIPAddress> LEN=40 TOS=0x00 PREC=0x00 TTL=55 ID=20713 DF PROTO=TCP SPT=61941 DPT=1194 WINDOW=3040 RES=0x00 ACK URGP=0 Mar 02 20:39:27 rs3 kernel: [IPTABLES INPUT IPv4] DROP IN=eth0 OUT= MAC=ae:12:7b:9b:5d:e4:00:15:c7:c9:45:80:08:00 SRC=<MyIPAddress> DST=<ServerIPAddress> LEN=40 TOS=0x00 PREC=0x00 TTL=55 ID=20718 DF PROTO=TCP SPT=61941 DPT=1194 WINDOW=3040 RES=0x00 ACK URGP=0 Mar 02 20:39:27 rs3 kernel: [IPTABLES INPUT IPv4] DROP IN=eth0 OUT= MAC=ae:12:7b:9b:5d:e4:00:15:c7:c9:45:80:08:00 SRC=<MyIPAddress> DST=<ServerIPAddress> LEN=40 TOS=0x00 PREC=0x00 TTL=55 ID=20719 DF PROTO=TCP SPT=61941 DPT=1194 WINDOW=3040 RES=0x00 ACK URGP=0 

[These logs are picked up from fail2ban and the server closes the connection to my local computer.]

Q: Why are those packets dropped (and logged)?

What I did so far: read documentation, thought about the problem ;-), checked the rules again and again, googled the Internet - but without any result.

Edit: maybe this is important: the DROP list that was created by fail2ban has about 500 entries.

I'm setting up a server running Debian Jessie with some applications like iptables firewall, fail2ban, openvpn, apache, ...

The iptables firewall is configured in the way, that it logs every packet that is dropped. A small excerpt from the iptables configuration:

... -A INPUT -m comment --comment "003 accept related established rules IPv4" -m state --state RELATED,ESTABLISHED -j ACCEPT ... -A INPUT -p tcp -m multiport --dports 1194 -m comment --comment "303 allow incoming OpenVPN" -m state --state NEW -j ACCEPT ... -A INPUT -m comment --comment "900 IPv4 log dropped input chain" -j LOG --log-prefix "[IPTABLES INPUT IPv4] DROP " --log-level 6 -A INPUT -m comment --comment "910 IPv4 deny all other input requests" -j DROP 

OpenVPN (which uses port 1194) works well. I can connect, use the connection and work for hours, up to the point when I need to transfer larger amount of data. At this point some lines like the following appear in the log:

Mar 02 20:39:27 rs3 kernel: [IPTABLES INPUT IPv4] DROP IN=eth0 OUT= MAC=ae:12:7b:9b:5d:e4:00:15:c7:c9:45:80:08:00 SRC=<MyIPAddress> DST=<ServerIPAddress> LEN=40 TOS=0x00 PREC=0x00 TTL=55 ID=20713 DF PROTO=TCP SPT=61941 DPT=1194 WINDOW=3040 RES=0x00 ACK URGP=0 Mar 02 20:39:27 rs3 kernel: [IPTABLES INPUT IPv4] DROP IN=eth0 OUT= MAC=ae:12:7b:9b:5d:e4:00:15:c7:c9:45:80:08:00 SRC=<MyIPAddress> DST=<ServerIPAddress> LEN=40 TOS=0x00 PREC=0x00 TTL=55 ID=20718 DF PROTO=TCP SPT=61941 DPT=1194 WINDOW=3040 RES=0x00 ACK URGP=0 Mar 02 20:39:27 rs3 kernel: [IPTABLES INPUT IPv4] DROP IN=eth0 OUT= MAC=ae:12:7b:9b:5d:e4:00:15:c7:c9:45:80:08:00 SRC=<MyIPAddress> DST=<ServerIPAddress> LEN=40 TOS=0x00 PREC=0x00 TTL=55 ID=20719 DF PROTO=TCP SPT=61941 DPT=1194 WINDOW=3040 RES=0x00 ACK URGP=0 

[These logs are picked up from fail2ban and the server closes the connection to my local computer.]

Q: Why are those packets dropped (and logged)? That means: Why are those packets not processed by the 'RELATED,ESTABLISHED' rule?

What I did so far: read documentation, thought about the problem ;-), checked the rules again and again, googled the Internet - but without any result.

Edit: maybe this is important: the DROP list that was created by fail2ban has about 500 entries.

Edit: I want to know the reason (this is why I'm using 'Why' in my question). I'm not interested in workarounds.

Added number of bans from file2ban.
Source Link
Loading
Source Link
Loading