Re: [PATCH nft] parser: support reject unreach|reset

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello,

On Mon, 2014-03-03 at 22:12 +0100, Florian Westphal wrote:
> reject did not allow to use tcp reset instead of icmp unreach.

I'm currently working on a patchset to support this and also setting the
ICMP code. But I'm fighting on the ICMP code filtering.

> 
> Signed-off-by: Florian Westphal <fw@xxxxxxxxx>
> ---
>  After this patch its possibe to do something like
> 
>  rule filter output reject reset

I found syntax a bit short ;) If we add ICMP code support
and follow the logic:

rule filter output reject administratively-prohibited

My plan was to do something like:

rule filter output reject with tcp reset
rule filter output reject with icmp|code administratively-prohibited

> 
>  Which makes kernel generate bogus tcp resets in repsonse
>  to non-tcp packets.
> 
>  In iptables this is avoided by making checkentry fail if -p tcp is not
>  specified when tcp-reset is requested.
>
>  How should this be handled in nft?

Good point. It looks a bit like what Patrick did mention in "Re:
[nftables RFC PATCH 0/1] implementing icmp code filterin"

"We do something similar in ct_expr_update_type() for ct expressions."

Idea is to update the entry and in this case to output an error if we
don't have tcp. But I'm not sure we can access to the other expressions
(and henve to the TCP or not info) in that point.

BR,
-- 
Eric Leblond <eric@xxxxxxxxx>

--
To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [Netfitler Users]     [LARTC]     [Bugtraq]     [Yosemite Forum]

  Powered by Linux