On 26.11, Pablo Neira Ayuso wrote: > On Thu, Nov 26, 2015 at 03:24:11PM +0000, Patrick McHardy wrote: > > Consider: > > > > -i eth0 -j CT --track > > -i eth0 -p sctp --dport 1234 -j ACCEPT > > -i eth0 -m state --state ESTABLISHED -j ACCEPT > > > > The explicit tracking rule *still* has no knowledge that the SCTP module > > is required. Depending on how the rule is built, there's no difference to > > automatic tracking since it might simply be a catch all rule. > > > > Sure, you could require users to enable it manually for each and every > > protocol, but I expect we agree that this is not a very nice way. > > > > What we have to do is: > > > > *If* we're using stateful tracking, *and* it is possible that connection > > state is based on a user selected connection identity (by using the protocol > > specific matches), then we have to enable connection tracking for that > > protocol to make sure we don't mix up connections with different identities. > > There are OSPF routers in active-active HA setups outthere that still > need to rely on stateless filtering. Think of asymmetric paths. > Conntrack needs to see packets in both directions. Sure. I'm saying *if* we're using stateful filtering. I don't intend to force it upon anyone. > IMO we should skip enabling things by default. When we enable things > by default someone else follow up later on with some scenario we > didn't consider and then we've got problems. I think we should go in > the direction of explicit configurations, we already do this for > conntrack helpers. Well as I already said, it doesn't solve anything regarding this problem, so how is it relevant? -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html