Hi list, Recent versions of iptables have forbidden the use of DROP in the nat table. I can't understand, however, how one is supposed to work around this limitation: is there a howto or some kind of documentation somewhere which explains how to deal with this change? Suppose my current rules look something like this: -t nat -A OUTPUT -p tcp -d somenetwork -m tcp --syn --dport 80 -j CONTROLLED -t nat -A CONTROLLED -m limit --limit 10/hour -j RETURN -t nat -A CONTROLLED -p tcp -m statistic --mode random --probability 0.1 -j REDIRECT --to-ports 80 -t nat -A CONTROLLED -j DROP In other words, the point is that connections which are outbound to somenetwork should be dropped beyond a certain rate, except for a small portion of them which should be redirected to a local port for capturing. I'm confused about what I should do to achieve the same effect under the modified rules. I can't put the whole thing in the filter table because of the REDIRECT: but now I also can't put the whole thing in the nat table because of the DROP. I also fail to see how I can split the rules across tables (if I replace -j DROP by -j RETURN in nat and then replicate the limit check in the filter table, I'm afraid the latter might not stay synchronized with the one in the nat table). If the nat table is not allowed to just drop a packet, would it be possible to have a -j MUSTBEDROPPEDINFILTERTABLE or something of the sort, which ensures that the filter table will necessarily drop that packet? This would be a convenient workaround for the new limitation (cleaner than, say, redirecting the packet to some absurd port and then dropping on that port). Any suggestions? Happy hacking, -- David A. Madore ( http://www.madore.org/~david/ ) -- To unsubscribe from this list: send the line "unsubscribe netfilter" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html