On Tue, Nov 04, 2014 at 04:04:11PM +0100, Arturo Borrero Gonzalez wrote: > On 4 November 2014 15:44, Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx> wrote: > > On Tue, Nov 04, 2014 at 02:56:58PM +0100, Arturo Borrero Gonzalez wrote: > >> On 4 November 2014 14:37, Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx> wrote: > >> > > >> > I think this needs to be: > >> > > >> > % nft add rule nat prerouting redirect [port] [nat_flags] > >> > > >> > >> The port and nat_flags arguments are mutually exclusives. That's why I > >> used the [port|nat_flags] syntax. > > > > iptables allows this: > > > > -j REDIRECT --to-ports 8000-8010 --random > > Then, should I change the behaviour of the nft redirect parser? > The code in my patch doesn't allow that. Yes, you have to fix this. > I think it makes no sense: "redirect to this port; no sorry, redirect > to a random one." --to-ports reads as "redirect all traffic from ports 8000 to 8010" --random refers to --to-ports, it reads as "select the port from the 8000-8010 range at random" If --random is not specified, then the NAT engines selects the destination port in that range one after another (8000, 8001, 8002, ...) IIRC. -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html