On Tue, Jun 30, 2009 at 10:16:35PM +0200, Jan Engelhardt wrote: > > It makes sense absolutely. Consider: > > * packet enters bridge > * NF_HOOK(PF_INET6, NF_INET_PRE_ROUTING, ...) is called by nr_netfilter.c > * (connection tracking entry is set up) > * let bridging decision be "local delivery" No, my question is does it ever make sense to use conntrack as part of bridge netfilter. That is, do you ever want to test it in your rules that are run as part of bridge netfilter. conntrack is inherently a security hole when used as part of bridging, because it ignores the Ethernet header so two unrelated connections can be tracked as one. It used to be an even bigger security hole when we ignored VLAN and PPPOE headers but at least that's now off by default. Cheers, -- Visit Openswan at http://www.openswan.org/ Email: Herbert Xu ~{PmV>HI~} <herbert@xxxxxxxxxxxxxxxxxxx> Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html