Source Routing in LinuxAlso known as Source Policy Routing is used to route packets depending the origin of the packet. The basic concept is to provide a customized routing table for each host (or network) which reflect the routes that host (or network) should use. These customized routing tables are matched by source, achieving the required routing of packets. It is important to be clear about the hierarchy of tables in order to avoid the duplication of large routing tables. Example 1: Forcing a host/network to use a specific route.Source: http://lartc.org/howto/lartc.rpdb.html#LARTC.RPDB.SIMPLE Create the new table. echo 10 TABLE_NAME >> /etc/iproute2/rt_tables
The first number (10) indicates the table id within all the tables used by iproute2 to route packets. Add the routing rule to use the new table for the specific source host/network. ip rule add from SOURCE table TABLE_NAME or by specifying a priority ip rule add prio PRIORITY from SOURCE table TABLE_NAME being PRIORITY a number from 1 to 32767 ip rule add from SOURCE table TABLE_NAME Check the new routing table in the iproute2 table list: #ip rule ls root@nlhpc-1:/home/jcm# ip rule ls 0: from all lookup local 32765: from SOURCE lookup TABLE_NAME 32766: from all lookup main 32767: from all lookup default root@nlhpc-1:/home/jcm# Add the new route to be used to forward packets comming from SOURCE. ip route add TARGET via GW_IP table TABLE_NAME Verify the new routing table. #ip route list table TABLE_NAME TARGET via GW_IP dev DEV Verify the routing by pinging the TARGET host or an ip within the TARGET network. Packets should be routed via IP_GW instead of the routes in the other tables (main, default, etc). RationaleAs mentioned before, the basic idea is to include a new routing table before the already existing routing tables used by iproute2 to route packets. So, when routing packets from SOURCE, the route lookup will be performed, first, in this new table, and if the lookup fails (no hit), iproute2 will perform the lookup in the other tables according to the priority informed in the file /etc/iproute2/rt_tables. In this way, a policy routing scheme is established. We say "policy" since it establish a priority for route lookup, allowing the network administrator to implement safely new routes without affecting the already existing routes. Verification.With respect to the verification of the routing, always it is possible to use the traceroute application. However, as it is common to find UDP traffic blocked in routers, the traceroute might not be useful to determine whether the routing table is being used or not. To cope this problem, a network sniffer is very useful. As we are talking about routing with linux, it is possible to load a sniffer as tcpdump or tshark and peek the interface from where the packets should be departing from. Notice also that it is common to consider these tools (snifers) as security problems, so, it is strongly recommended to uninstall them after being used. |