Hi,
Just an update ... the wireguard tunnel does not seem to help.
The communication seems to be working fine but packtdrill seems to not get any responses and does not print anything after listen syscall...
Main reason for the effort is to measure correctness of TCP behaviour across chain of TCP port forwarders.
Client:
robert@nuc2-kom:~/TCP/git/packetdrill/gtests/net/tcp/blocking$ sudo ../../packetdrill/packetdrill -v --wire_client --wire_client_dev=wg0 --wire_server_ip=10.10.10.80 --local_ip=172.16.0.1 --gateway_ip=172.16.0.2 --netmask_ip=255.255.255.0 --remote_ip=
172.16.1.1/24 blocking-accept.pkt
socket syscall: 1629991381.191720
setsockopt syscall: 1629991381.191738
bind syscall: 1629991381.191765
listen syscall: 1629991381.191770
^C
Server:
raszuk@rr-vm1-waw:~/TCP/packetdrill/gtests/net/packetdrill$ sudo ./packetdrill -v --wire_server --wire_server_dev=wg0
inbound injected packet: 0.101050 S 0:0(0) win 32792 <mss 1000,nop,wscale 7>
Client tcpdump:
root@nuc2-kom:~# tcpdump -i wg0
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on wg0, link-type RAW (Raw IP), capture size 262144 bytes
17:26:51.614888 IP nuc2-kom.35352 > 10.10.10.80.tproxy: Flags [S], seq 1028864393, win 65535, options [mss 1380,sackOK,TS val 1532714946 ecr 0,nop,wscale 2], length 0
17:26:51.635920 IP 10.10.10.80.tproxy > nuc2-kom.35352: Flags [S.], seq 2383691374, ack 1028864394, win 65072, options [mss 1340,sackOK,TS val 1472353682 ecr 1532714946,nop,wscale 7], length 0
17:26:51.635959 IP nuc2-kom.35352 > 10.10.10.80.tproxy: Flags [.], ack 1, win 16384, options [nop,nop,TS val 1532714967 ecr 1472353682], length 0
17:26:51.636023 IP nuc2-kom.35352 > 10.10.10.80.tproxy: Flags [P.], seq 1:9, ack 1, win 16384, options [nop,nop,TS val 1532714967 ecr 1472353682], length 8
17:26:51.636039 IP nuc2-kom.35352 > 10.10.10.80.tproxy: Flags [P.], seq 9:190, ack 1, win 16384, options [nop,nop,TS val 1532714967 ecr 1472353682], length 181
17:26:51.636162 IP nuc2-kom.35352 > 10.10.10.80.tproxy: Flags [P.], seq 190:711, ack 1, win 16384, options [nop,nop,TS val 1532714967 ecr 1472353682], length 521
17:26:51.657784 IP 10.10.10.80.tproxy > nuc2-kom.35352: Flags [.], ack 9, win 509, options [nop,nop,TS val 1472353704 ecr 1532714967], length 0
17:26:51.657810 IP 10.10.10.80.tproxy > nuc2-kom.35352: Flags [.], ack 190, win 508, options [nop,nop,TS val 1472353704 ecr 1532714967], length 0
17:26:51.823437 IP nuc2-kom.35352 > 10.10.10.80.tproxy: Flags [P.], seq 711:719, ack 9, win 16384, options [nop,nop,TS val 1532715155 ecr 1472353739], length 8
17:26:51.824384 IP nuc2-kom.35352 > 10.10.10.80.tproxy: Flags [P.], seq 719:727, ack 9, win 16384, options [nop,nop,TS val 1532715156 ecr 1472353739], length 8
17:26:51.824566 IP nuc2-kom.35352 > 10.10.10.80.tproxy: Flags [P.], seq 727:731, ack 9, win 16384, options [nop,nop,TS val 1532715156 ecr 1472353739], length 4
17:26:51.843246 IP 10.10.10.80.tproxy > nuc2-kom.35352: Flags [.], ack 719, win 504, options [nop,nop,TS val 1472353891 ecr 1532715155], length 0
17:26:51.843266 IP 10.10.10.80.tproxy > nuc2-kom.35352: Flags [.], ack 727, win 504, options [nop,nop,TS val 1472353891 ecr 1532715156], length 0
17:26:51.843266 IP 10.10.10.80.tproxy > nuc2-kom.35352: Flags [.], ack 731, win 504, options [nop,nop,TS val 1472353892 ecr 1532715156], length 0
17:26:53.569535 IP nuc2-kom.35352 > 10.10.10.80.tproxy: Flags [F.], seq 731, ack 9, win 16384, options [nop,nop,TS val 1532716901 ecr 1472353892], length 0
17:26:53.629356 IP 10.10.10.80.tproxy > nuc2-kom.35352: Flags [.], ack 732, win 504, options [nop,nop,TS val 1472355678 ecr 1532716901], length 0
Server tcpdump:
root@rr-vm1-waw:/etc/wireguard# tcpdump -i wg0
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on wg0, link-type RAW (Raw IP), capture size 262144 bytes
15:26:51.626357 IP 10.10.10.70.35352 > rr-vm1-waw.tproxy: Flags [S], seq 1028864393, win 65535, options [mss 1380,sackOK,TS val 1532714946 ecr 0,nop,wscale 2], length 0
15:26:51.626424 IP rr-vm1-waw.tproxy > 10.10.10.70.35352: Flags [S.], seq 2383691374, ack 1028864394, win 65072, options [mss 1340,sackOK,TS val 1472353682 ecr 1532714946,nop,wscale 7], length 0
15:26:51.647763 IP 10.10.10.70.35352 > rr-vm1-waw.tproxy: Flags [.], ack 1, win 16384, options [nop,nop,TS val 1532714967 ecr 1472353682], length 0
15:26:51.648194 IP 10.10.10.70.35352 > rr-vm1-waw.tproxy: Flags [P.], seq 1:9, ack 1, win 16384, options [nop,nop,TS val 1532714967 ecr 1472353682], length 8
15:26:51.648222 IP rr-vm1-waw.tproxy > 10.10.10.70.35352: Flags [.], ack 9, win 509, options [nop,nop,TS val 1472353704 ecr 1532714967], length 0
15:26:51.648234 IP 10.10.10.70.35352 > rr-vm1-waw.tproxy: Flags [P.], seq 9:190, ack 1, win 16384, options [nop,nop,TS val 1532714967 ecr 1472353682], length 181
15:26:51.648244 IP rr-vm1-waw.tproxy > 10.10.10.70.35352: Flags [.], ack 190, win 508, options [nop,nop,TS val 1472353704 ecr 1532714967], length 0
15:26:51.649725 IP 10.10.10.70.35352 > rr-vm1-waw.tproxy: Flags [P.], seq 190:711, ack 1, win 16384, options [nop,nop,TS val 1532714967 ecr 1472353682], length 521
15:26:51.649750 IP rr-vm1-waw.tproxy > 10.10.10.70.35352: Flags [.], ack 711, win 504, options [nop,nop,TS val 1472353706 ecr 1532714967], length 0
15:26:51.683310 IP rr-vm1-waw.tproxy > 10.10.10.70.35352: Flags [P.], seq 1:9, ack 711, win 504, options [nop,nop,TS val 1472353739 ecr 1532714967], length 8
15:26:51.703289 IP 10.10.10.70.35352 > rr-vm1-waw.tproxy: Flags [.], ack 9, win 16384, options [nop,nop,TS val 1532715023 ecr 1472353739], length 0
15:26:51.834488 IP 10.10.10.70.35352 > rr-vm1-waw.tproxy: Flags [P.], seq 711:719, ack 9, win 16384, options [nop,nop,TS val 1532715155 ecr 1472353739], length 8
15:26:51.834532 IP rr-vm1-waw.tproxy > 10.10.10.70.35352: Flags [.], ack 719, win 504, options [nop,nop,TS val 1472353891 ecr 1532715155], length 0
15:26:51.835218 IP 10.10.10.70.35352 > rr-vm1-waw.tproxy: Flags [P.], seq 719:727, ack 9, win 16384, options [nop,nop,TS val 1532715156 ecr 1472353739], length 8
15:26:51.835240 IP rr-vm1-waw.tproxy > 10.10.10.70.35352: Flags [.], ack 727, win 504, options [nop,nop,TS val 1472353891 ecr 1532715156], length 0
15:26:51.835512 IP 10.10.10.70.35352 > rr-vm1-waw.tproxy: Flags [P.], seq 727:731, ack 9, win 16384, options [nop,nop,TS val 1532715156 ecr 1472353739], length 4
15:26:51.835527 IP rr-vm1-waw.tproxy > 10.10.10.70.35352: Flags [.], ack 731, win 504, options [nop,nop,TS val 1472353892 ecr 1532715156], length 0
15:26:51.935635 unknown ip 0
15:26:53.580342 IP 10.10.10.70.35352 > rr-vm1-waw.tproxy: Flags [F.], seq 731, ack 9, win 16384, options [nop,nop,TS val 1532716901 ecr 1472353892], length 0
15:26:53.621735 IP rr-vm1-waw.tproxy > 10.10.10.70.35352: Flags [.], ack 732, win 504, options [nop,nop,TS val 1472355678 ecr 1532716901], length 0
Rgs,
R.