Re: Connection timeouts due to INVALID state rule

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




Am 08.07.19 um 22:05 schrieb Will Storey:
> On Mon 2019-07-08 21:07:16 +0200, Reindl Harald wrote:
>> Am 08.07.19 um 20:43 schrieb Florian Westphal:
>>>> Another thing I'm wondering is whether this rule could be impacting
>>>> connections beyond lo, but I just don't know about it.
>>>
>>> NORACK? If you restrict it via -i lo / -o lo, then no, it won't affect
>>> anything else.
>>>
>>> NAT for such connections won't work but thats normally not an issue
>>> in the loopback case.
>>
>> i think the question was if "iptables -t mangle -A PREROUTING -p all -m
>> conntrack --ctstate INVALID -j DROP" also breaks things beyond the "lo"
>> interface which it shouldn't and don't appear to, but who knows
>>
>> it shouldn't break anything at all, also not on "lo"
> 
> Right, sorry, I was wondering about the INVALID rule given it would still
> be applied to non-lo traffic.
> 
>> if you wan't to reproduce this setup SSH-forwarding to a VNC server, let
>> the VNC window in the background and after a realtive short amount of
>> time the tunneled connection with tigervnc-1.9.0-3.fc29.x86_64 just
>> freezes with the last picture
> 
> That is concerning if it's the same issue!

it is, th eversion with "! -i lo" has no problem

iptables -t mangle -A PREROUTING -p all -m conntrack --ctstate INVALID
-j DROP

iptables -t mangle -A PREROUTING -p all -m conntrack --ctstate INVALID !
-i lo -j DROP

-t mangle for DROP rules because you don't need to write the same rules
in INPUT and FORWARD and it skips NAT / routing decision while you still
can have your EST/RELATED quick path on top



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux