-
Notifications
You must be signed in to change notification settings - Fork 674
WeaveDNS is blocked by firewall RHEL7 #2192
Comments
What is the firewall blocking? At https://www.weave.works/documentation/net-1-5-0-using-weave/#peer-connections we note which ports must be opened on firewalls for Weave Net to function. |
Although the docs seem to be wrong (!) The correct info is: you must permit traffic to flow through TCP 6783 and UDP 6783/6784, which are Weave’s control and data ports |
bboreham , WARNING: existing iptables rule '-A FORWARD -j REJECT --reject-with icmp-host-prohibited' will block name resolution via weaveDNS - please reconfigure your firewall. will block name resolution via weaveDNS - please reconfigure your firewall. im using rhel 7.3, and the last version of weave, firewall-cmd --zone=public --add-port=53/tcp --permanent sudo iptables -A INPUT -p tcp -m tcp --dport 53 -j ACCEPT In not using iptables.service cause not installed, just the firewalld, regards |
We use "iptables" as a generic name for the kernel capability; firewalld is implemented using those rules. It's difficult to figure out from that info what the setting should be; can you do |
show this Completed on Wed Apr 20 14:12:53 2016[root@pmbrklnxd02 S56490]# ^C Generated by iptables-save v1.4.21 on Wed Apr 20 14:14:45 2016*nat Completed on Wed Apr 20 14:14:45 2016Generated by iptables-save v1.4.21 on Wed Apr 20 14:14:45 2016*mangle Completed on Wed Apr 20 14:14:45 2016Generated by iptables-save v1.4.21 on Wed Apr 20 14:14:45 2016*security Completed on Wed Apr 20 14:14:45 2016Generated by iptables-save v1.4.21 on Wed Apr 20 14:14:45 2016*raw Completed on Wed Apr 20 14:14:45 2016Generated by iptables-save v1.4.21 on Wed Apr 20 14:14:45 2016*filter Completed on Wed Apr 20 14:14:45 2016 |
Thanks for the detailed dump. I can see only one rule there mentioning port 53 - the DNS port - and it is:
this is for TCP; you need to allow UDP too. As for the
I am still considering that. |
I see you posted a later dump at #1266 (comment) that has the UDP rule. |
New theory thanks to @rade is that you need to use |
How i can configure that? For using docker0? |
From the other thread, you would have run:
this should have been:
(I cannot see any |
OK, really thanks for the help , but my solution was put this on iptables |
Try this,
|
I having 2 servers with containers using weave , that works fine when my firewall is inactive
but when is up, i cant make ping between contairnes,
i made this iptables rule: iptables -A INPUT -p tcp -m tcp --dport 53 -j ACCEPT
iptables -A INPUT -p udp -m udp--dport 53 -j ACCEPT,cause weaveDns is using this port?
and when i see whe logs (docker logs weave)
INFO: 2016/04/19 21:39:57.672953 Discovered local MAC de:ad:a7:e9:8e:a5
INFO: 2016/04/19 22:05:01.421956 Discovered local MAC 46:72:a1:94:e6:9c
INFO: 2016/04/19 22:12:26.922323 Discovered remote MAC d6:fa:3d:05:84:79 at e6:54:37:ee:1a:c5(pmbrklnxd02)
INFO: 2016/04/19 22:12:29.892178 Discovered remote MAC 2a:1a:ed:dd:7a:55 at e6:54:37:ee:1a:c5(pmbrklnxd02)
INFO: 2016/04/19 22:27:23.565026 Discovered local MAC c2:5b:bd:34:1f:49
INFO: 2016/04/19 22:37:37.726727 Expired MAC c2:5b:bd:34:1f:49 at 92:e8:bb:13:32:78(pmbrklnxd01)
INFO: 2016/04/19 22:45:54.261759 overlay_switch ->[e6:54:37:ee:1a:c5(pmbrklnxd02)] fastdp timed out waiting for vxlan heartbeat
INFO: 2016/04/19 22:45:54.262785 overlay_switch ->[e6:54:37:ee:1a:c5(pmbrklnxd02)] using sleeve
INFO: 2016/04/19 22:57:37.729507 Expired MAC 22:78:00:53:1d:cd at e6:54:37:ee:1a:c5(pmbrklnxd02)
INFO: 2016/04/19 22:57:37.729555 Expired MAC 3a:c9:e8:af:5e:8c at e6:54:37:ee:1a:c5(pmbrklnxd02)
INFO: 2016/04/19 22:57:37.729592 Expired MAC de:ad:a7:e9:8e:a5 at 92:e8:bb:13:32:78(pmbrklnxd01)
INFO: 2016/04/19 22:57:37.729607 Expired MAC 46:72:a1:94:e6:9c at 92:e8:bb:13:32:78(pmbrklnxd01)
INFO: 2016/04/19 22:57:37.729620 Expired MAC 32:fb:60:85:30:2a at e6:54:37:ee:1a:c5(pmbrklnxd02)
INFO: 2016/04/19 22:57:37.729633 Expired MAC c2:b3:8d:05:02:77 at e6:54:37:ee:1a:c5(pmbrklnxd02)
INFO: 2016/04/19 22:57:37.729646 Expired MAC 82:37:db:af:f4:4b at e6:54:37:ee:1a:c5(pmbrklnxd02)
INFO: 2016/04/19 22:57:37.729660 Expired MAC 12:3d:51:1c:5d:ac at e6:54:37:ee:1a:c5(pmbrklnxd02)
INFO: 2016/04/19 22:57:37.729688 Expired MAC 7e:62:2f:21:0f:26 at e6:54:37:ee:1a:c5(pmbrklnxd02)
INFO: 2016/04/19 23:00:37.730147 Expired MAC 2a:1a:ed:dd:7a:55 at e6:54:37:ee:1a:c5(pmbrklnxd02)
INFO: 2016/04/19 23:00:37.730985 Expired MAC d6:fa:3d:05:84:79 at e6:54:37:ee:1a:c5(pmbrklnxd02)
what is happening?
thnks
Version: 1.4.6
PeerDiscovery: enabled
Targets: 0
Connections: 1 (1 established)
Peers: 2 (with 2 established connections)
TrustedSubnets: none
DefaultSubnet: 10.32.0.0/12
The text was updated successfully, but these errors were encountered: