Invalidate conntrack using iptables rule

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello List,

Is there a way to (mis-)use an iptables rule to invalidate the
currently established conntrack entry related to an packet being
processed? The packet can be identified due to violating connbytes
and u32 match criteria.

One solution I came up so far to emulate that behaviour was to
set a mark/label on the conntrack when the criteria is met the
first time and then DROP all packets with that mark/label from
here on. But that somehow would bloat the ruleset and keep an
useless conntrack entry in memory where just terminating the
conntrack would do all of it at once.

Another solution might be to modify the conntrack timeout later
in the raw table using "-j CT --timeout [policy]" applying a
timer value of "-1" and thus hopefully immediately invalidating
the conntrack entry.



Is there an easier solution to that problem? If no, which one
of the two solutions from above seems to be easier to implement
and maintain in a stable, riskfree way in the long run?

Kind regards,
hd




[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux