Re: Drop Input Policy

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Le mardi 14 février 2006 à 12:02 -0700, netfilter@xxxxxxxxxxxxxx a
écrit :
> If the default INPUT chain policy is set to drop is there any reason to
> explicitly add rules to drop packets within the firewall script?

Well, it depends...

Take a very specific configuration in which you use a user chains tree
to reduce your ruleset complexity and thus increase performance compared
to a flat ruleset. In this very case, you want to drop packets at the
end of terminal user chains. As user chains do not have policy, you have
to set a DROP rule at the end.

To be less specific, you may want to drop packets as soon as you know
they must be, again for performance matters. As an example, if you don't
want to accept INVALID packets, it's useless (and a loss of processing)
to have them go through your entire ruleset so they get dropped by
policy. You will put an -m state --state INVALID -j DROP rule very
early, in the same mind lots of people accept ESTABLISHED/RELATED
packets at top of ruleset for they constitute the very big part of the
traffic.


-- 
http://sid.rstack.org/
PGP KeyID: 157E98EE FingerPrint: FA62226DA9E72FA8AECAA240008B480E157E98EE
>> Hi! I'm your friendly neighbourhood signature virus.
>> Copy me to your signature file and help me spread!



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux