Fwd: iptables-1.4.1-1.4.2 change "Warn about use of DROP in nat table"

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



---------- Forwarded message ----------
Date: Mon, 12 Jan 2009 21:35:44
From: Marek Kierdelewicz <marek@xxxxxxx>
To: jengelh
Subject: iptables-1.4.1-1.4.2 change "Warn about use of DROP in nat table"

Hello,

Is there any particular reason for removing DROP target from nat table?
Some people may be using this functionality (like me). Access
control for lan clients on my routers is done in PREROUTING chain of nat
table in following way (in great simplification):
- DNAT to infoHost:infoPort1 tcp packets to port 80 from IP/MAC pair in
ipset INFO-GRP1
- RETURN packets from IP/MAC pair in ipset
- DNAT tcp packets to port 80 to infoHost:infoPort2
- DROP rest of the packets

I know DROPping in nat table isn't perfect (doesn't filterout already
established "connections"), but it should be less cpu-intensive as it's
done for the first packet of a "connection". Removing DROP from nat
table would force me use DROPs in filter table. Wouldn't it be a bit
more cpu-intensive?

Anyway thanks for the warning :-).

Regards,
-- 
Marek Kierdelewicz
Kierownik Działu Systemów Sieciowych, KoBa
Manager of Network Systems Department, KoBa
tel. (85) 7406466; fax. (85) 7406467
e-mail: admin@xxxxxxx

--
To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Netfitler Users]     [LARTC]     [Bugtraq]     [Yosemite Forum]

  Powered by Linux