Re: DROP still returns -EPERM to userspace in OUTPUT chain

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Saturday 2009-05-23 13:43, Pablo Neira Ayuso wrote:
>>> Returning
>>> -EPERM seems to me quite sane to note that the kernel is explicit (via
>>> iptables, for example) not allowing permission to send().
>> 
>> Yeah but DROP is perceived by users to be "silently ignore it",
>> while the "you don't have permission" is REJECT's job.
>
>But the DROP and REJECT behaviours refer to the packet logic, ie. with
>DROP nothing is done, with REJECT we send some explicit packet (like an
>ICMP administratively prohibited). That still applies to user-space.

-EPERM is an "administrative prohibited" for userspace, just like a
returned ICMP packet. Here, functions overlap.

>Reporting -EPERM seems to me a good practise to report user-space
>applications that the kernel is explicit dropping the packet. Otherwise,
>while diagnosing problems, people cannot be sure where the packet has
>been lost.

Then again, people might be using -m limit -j DROP to simulate actual
packet loss, for whatever scientific interests they currently have.
So just wanting to know - are people supposed to use xt_STEAL instead
if they really want it silently dropped?

>I'm more like in favour of forcing people to fix their applications,
>they are doing a broken error handling.

Think UDP :)
--
To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Netfitler Users]     [LARTC]     [Bugtraq]     [Yosemite Forum]

  Powered by Linux