Re: [PATCH 1/1] netfilter: Add possibility to turn off netfilters defrag per netns

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, 5 Jan 2012, Hans Schillstrom wrote:

> On Wednesday 04 January 2012 22:40:09 Jozsef Kadlecsik wrote:
> > On Wed, 4 Jan 2012, Hans Schillstrom wrote:
> > 
> > > On Wednesday, January 04, 2012 19:05:10 Jozsef Kadlecsik wrote:
> > > > On Wed, 4 Jan 2012, Pablo Neira Ayuso wrote:
> > > > 
> > > > > On Wed, Jan 04, 2012 at 12:48:35PM +0100, Hans Schillstrom wrote:
> > > > > > I like that idea, an "early" table at prio -500 with PREROUTING.
> > > > > > There is also a need for a new flag "--allfrags"
> > > > > > i.e. all fragments needs to be sorted out and sent to same dest for defrag.
> > > > > > 
> > > > > > ex.
> > > > > > iptables -t early -A PREROUTING -i eth0 --allfrags -j NOTRACK
> > > > > 
> > > > > New tables add too much overhead. We have discussed this before with
> > > > > Patrick.
> > > > > 
> > > > > Since this still remains specific to your needs, I think you can
> > > > > remove nf_conntrack module in your setup.
> > > > > 
> > > > > I don't come with one sane setup that may want selectively defragment
> > > > > some traffic yes and other not.
> > > > > 
> > > > > Am I missing anything else?
> > > > 
> > > > I agree. If you don't want defragmentation at all, then make sure you 
> > > > don't load the nf_conntrack module directly/indirectly. Conntrack doesn't 
> > > > work without defragmentation anyway.
> > > 
> > > We are using LXC and it's only in the container that holds the external 
> > > interface that can't have defragmentation.
> > > The problem is if it's loaded you have it in all namespaces :-(
> > 
> > Conntrack is per net namespaces. You may have one container with conntrack 
> > enabled and another one without conntrack.
> 
> How do you disable conntrack per netns ?
> I can't see how to do it except for NOTRACK
> Then the nf_defrag issue is still there...

OK, I see. Conntrack is per net namespace but it's enabled globally.
 
So at the moment I think the best solution is something like your patch 
variant (but the condition is wrong, it should be "&& !skb->nfct"):

--- a/net/ipv4/netfilter/nf_defrag_ipv4.c
+++ b/net/ipv4/netfilter/nf_defrag_ipv4.c
@@ -74,6 +74,14 @@ static unsigned int ipv4_conntrack_defrag(unsigned int
hooknum,
...
+       const struct net_device *dev = (hooknum == NF_INET_LOCAL_OUT ?
+                                       out : in);
+
+       /* No defrag and not Previously seen (loopback)? */
+       if (dev_net(dev)->ct.sysctl_notrac_defrag && skb->nfct) {
+               /* Attach fake conntrack entry. as in NOTRACK */
+               skb->nfct = &nf_ct_untracked_get()->ct_general;
+               skb->nfctinfo = IP_CT_NEW;
+               nf_conntrack_get(skb->nfct);
+               return NF_ACCEPT;
+       }
...

Best regards,
Jozsef
-
E-mail  : kadlec@xxxxxxxxxxxxxxxxx, kadlecsik.jozsef@xxxxxxxxxxxxx
PGP key : http://www.kfki.hu/~kadlec/pgp_public_key.txt
Address : Wigner Research Centre for Physics, Hungarian Academy of Sciences
          H-1525 Budapest 114, POB. 49, Hungary
--
To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Netfitler Users]     [LARTC]     [Bugtraq]     [Yosemite Forum]

  Powered by Linux