Hi, On Tue, 30 Jun 2009 22:16:35 +0200 (CEST) Jan Engelhardt <jengelh@xxxxxxxxxx> wrote: > > On Tuesday 2009-06-30 21:06, David Miller wrote: > >Adding appropriate lists and persons to CC: > > > >> On Tue, Jun 30, 2009 at 05:27:47PM +0100, Mark McLoughlin wrote: > >>> > >>> However, because nf_conntrack introduces an skb_orphan(), it is now > >>> recommended that bridge-nf-call-iptables be disabled completely so as > >>> to ensure features like TUNSETSNDBUF work as expected. > >> > >> Patrick, does conntrack ever make sense for bridging? Perhaps > >> we should get rid of that completely? > > It makes sense absolutely. Consider: > > * packet enters bridge > * NF_HOOK(PF_INET6, NF_INET_PRE_ROUTING, ...) is called by nr_netfilter.c > * (connection tracking entry is set up) > * let bridging decision be "local delivery" I really like this feature, although it is only because I've spent time thinking about it, and it's usefulness, after having been burnt quite a lot by it, due to it's quite strange side effects on traffic. e.g. it'll defragment bridged IP packets, and then, if the outbound bridge interface MTU is big enough, will send off large single ethernet frames. If you're not expecting that, or don't work out what is going on, you'll believe you're seeing the input traffic in the form it arrived, and you'll believe it for quite a long time :-( I'm not sure if it supposed to work on IP traffic carried within bridge PPPoE/PPP, but it does - and that was very, very confusing to work out what had happened too. PPPoE comes up, as does PPP and IPCP, but forwarded IP packets are dropped unless there is a FORWARD iptables rule. I do agree though, either it should default to off, or the behaviour be made far more prominent somehow. Regards, Mark. -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html