Re: [PATCH 0/3] ipset: change 'iface' part in hash:net,iface set

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




...you are right, because "in" is equivalent with "src".
Except that it isn't. It is only "equivalent" for the 'iface' part of hash:net,iface sets and nothing else. Consider it as an alternative to select 'iface' part of a hash:net,iface set. It servers no other purpose and should *not* be used for anything else.

This creates more confusion for the users than the current state: one had to keep in mind what kind of sets are stored in a list of sets and depending on them, use "src/dst" or "in/out" in the second direction parameter.
Please explain the 'confusion' bit?

I've made it quite clear in the definition of 'in' and 'out' (not least in the various man pages which form part of these patch series - a bit like you trying to clarify the use of 'src' and 'dst' for the 'iface' part in the last ipset update) - 'in' is meant for a match on the 'incoming', 'out' on the 'outgoing' interfaces.

If one wishes to produce a match against those interfaces, then 'in' and 'out' is one possible way to go, if not - then use 'src' or 'dst' if you feel more comfortable with it.

What I am offering with my patch series is a choice (a choice I didn't have before, I might add!) - nobody is forced to use it, except those who understand that choice. If one is unwilling/unable to deploy this for one reason or another, no problem - quite simple really.

 And additionally,

iptables -A INPUT -m set --match-set list1 src,src -j ACCEPT

and

iptables -A INPUT -m set --match-set list1 src,in -j ACCEPT

produced different results for the same member sets with the same elements against the same packets. This is unacceptable for me.
You can't expect to issue two different iptables statements (as in your example above) and get the same number of matches! Not going to happen, is it? By the same token, if I execute the following two statements:

iptables -A INPUT -m set --match-set list1 src,src -j ACCEPT

and

iptables -A INPUT -m set --match-set list1 src,dst -j ACCEPT

The above will also produce "different results for the same member sets with the same elements against the same packets". So why is this not "unacceptable" then?
--
To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Netfitler Users]     [LARTC]     [Bugtraq]     [Yosemite Forum]

  Powered by Linux