Re: [nftables] economics of reverse path filtering - FIB expression vs. kernel parameter

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, 13 Feb 2020, ѽ҉ᶬḳ℠ wrote:

> > Been also wondering about potential conflicts between kernel 
> > parameters vs. firewall rules, which takes precedence?
> > 
> > Another example - here purposely creating a conflict:
> > 
> > * net.ipv6.conf.<interface>.accept_redirects = 0
> > 
> > vs.
> > 
> > * ip6 saddr fe80::/10 ip6 hoplimit 255 daddr FF02::1 icmpv6 type 137 accept;
> 
> Looked into various publications, including [1], but came up short in 
> discovering the hierarchy of /proc parameters vs firewall rules/chains, 
> i.e.
> 
> * is the kernel treating both the same or considers one or the other 
> weighing more/higher than the other?
> * if treated equally does timing in availability of structures cancels 
> out the other, e.g. first available sets the rule or the last one 
> available cancels out the earlier one?

Check out the packet flow in netfilter and the networking stack, eg:
https://upload.wikimedia.org/wikipedia/commons/3/37/Netfilter-packet-flow.svg

A networking subsystem proc/whatever setting have got a chance to tell 
what happens with the packet if the netfilter hooks let the packet pass up 
to that point. And vice versa: if a subsytem decides to drop the packet 
(say routing due to reverse path filtering), then the next netfilter hook 
won't/can't process it.

Best regards,
Jozsef
-
E-mail  : kadlec@xxxxxxxxxxxxxxxxx, kadlecsik.jozsef@xxxxxxxxxxxxx
PGP key : http://www.kfki.hu/~kadlec/pgp_public_key.txt
Address : Wigner Research Centre for Physics
          H-1525 Budapest 114, POB. 49, Hungary

[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux