Hello, On Thu, 17 Apr 2008, Jason Stubbs wrote: > > - do not play with packets accounted for sockets (skb->sk != NULL). > > There was check you removed. Please, reconsider. > > With this check restored, the director can't access the virtual server. I > haven't found any solid documentation, but skb->sk seems to be the local > socket that the packet is tied to? Is there some badness that can happen by > allowing these packets to be LVS'd? Hm, I didn't know that with your patch director can be client. The problem was that IPVS didn't touched packets owned by sockets before, I remember that there are rules when such skbs should be modified, related to sharing and cloning, may be skbs should be copied if modified. But I assume now skb_make_writable() handles it properly. > > - ability to throttle IPVS traffic with netfilter modules. How > > we can benefit from such modules, can they protect us, can we avoid > > IPVS scheduling on overload (such modules should work before IPVS conn > > scheduling, which should be true if you schedule in POST_ROUTING). > > Was true for LOCAL_IN scheduling. > > Are you referring to ipt_RECENT here? That module tested ok. Yes, for example, -m limit for SYN packets _BEFORE_ IPVS scheduling to protect IPVS from SYN floods. But this should be checked only for changes that move IPVS scheduling at PRE_ROUTING. Regards -- Julian Anastasov <ja@xxxxxx> -- To unsubscribe from this list: send the line "unsubscribe lvs-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html