David Ahern <dsahern@xxxxxxxxx> wrote: > Thanks for the detailed summary and possible solutions. > > NAT/MASQ rules with VRF were not really thought about during > development; it was not a use case (or use cases) Cumulus or other NOS > vendors cared about. Community users were popping up fairly early and > patches would get sent, but no real thought about how to handle both > sets of rules - VRF device and port devices. > > What about adding an attribute on the VRF device to declare which side > to take -- rules against the port device or rules against the VRF device > and control the nf resets based on it? This would need a way to suppress the NF_HOOK invocation from the normal IP path. Any idea on how to do that? AFAICS there is no way to get to the vrf device at that point, so no way to detect the toggle. Or did you mean to only suppress the 2nd conntrack round? For packets that get forwarded we'd always need to run those in the vrf context, afaics, because doing an nf_reset() may create a new conntrack entry (if flow has DNAT, then incoming address has been reversed already, so it won't match existing REPLY entry in the conntrack table anymore). For locally generated packets, we could skip conntrack for VRF context via 'skb->_nfct = UNTRACKED' + nf_reset_ct before xmit to lower device, and for lower device by eliding the reset entirely.