On Fri, Sep 13, 2024 at 12:29:02PM +0200, Pablo Neira Ayuso wrote: > On Fri, Sep 13, 2024 at 12:23:47PM +0200, Florian Westphal wrote: > > Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx> wrote: > > > tproxy action must be terminal since the intent of the user to steal the > > > traffic and redirect to the port. > > > Align this behaviour to iptables to make it easier to migrate by issuing > > > NF_ACCEPT for packets that are redirect to userspace process socket. > > > Otherwise, NF_DROP packet if socket transparent flag is not set on. > > > > The nonterminal behaviour is intentional. This change will likely > > break existing setups. > > > > nft add rule filter divert tcp dport 80 tproxy to :50080 meta mark set 1 accept > > > > This is a documented example. > > Ouch. Example could have been: > > nft add rule filter divert tcp dport 80 socket transparent meta set 1 tproxy to :50080 > > but it is too late. > > Quick idea: extend tproxy extension to add a flag to consume it: > > tproxy to :50080 flags consume Scratch that, this is very silly: it is not different than just adding 'accept' after it...