Am 09.10.20 um 11:37 schrieb Phil Sutter:
I guess fundamentally this is due to legacy design which keeps builtin
chains in place at all times. We could copy that in iptables-nft, but I
like the current design where we just delete the whole table and start
from scratch.
Florian made a related remark a while ago about flushing chains with
DROP policy: He claims it is almost always a mistake and we should reset
the policy to ACCEPT in order to avoid people from locking themselves
out. I second that idea, but am not sure if such a change is tolerable
at all.
bad idea!
nothing is locking you out just because of a short drop phase, at least
not over the past 12 years, that's what tcp retransmits are for
when you once accept i have someone which should never have been
accepted in the conntracking - sorry - but when i say drop i literally
mean drop at any point in time