Hello, On Mon, 2014-03-03 at 22:12 +0100, Florian Westphal wrote: > reject did not allow to use tcp reset instead of icmp unreach. I'm currently working on a patchset to support this and also setting the ICMP code. But I'm fighting on the ICMP code filtering. > > Signed-off-by: Florian Westphal <fw@xxxxxxxxx> > --- > After this patch its possibe to do something like > > rule filter output reject reset I found syntax a bit short ;) If we add ICMP code support and follow the logic: rule filter output reject administratively-prohibited My plan was to do something like: rule filter output reject with tcp reset rule filter output reject with icmp|code administratively-prohibited > > Which makes kernel generate bogus tcp resets in repsonse > to non-tcp packets. > > In iptables this is avoided by making checkentry fail if -p tcp is not > specified when tcp-reset is requested. > > How should this be handled in nft? Good point. It looks a bit like what Patrick did mention in "Re: [nftables RFC PATCH 0/1] implementing icmp code filterin" "We do something similar in ct_expr_update_type() for ct expressions." Idea is to update the entry and in this case to output an error if we don't have tcp. But I'm not sure we can access to the other expressions (and henve to the TCP or not info) in that point. BR, -- Eric Leblond <eric@xxxxxxxxx> -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html