Re: nf_conntrack_helper replacement?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 





Am 21.12.22 um 20:58 schrieb ToddAndMargo:
On 12/20/22 18:11, Reindl Harald wrote:


Am 20.12.22 um 23:55 schrieb ToddAndMargo:
On 12/20/22 12:01, Reindl Harald wrote:
you need exactly ONE "-m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT" rule as the first of your ruleset which handles UDP and TCP (aka don't specify -p)

[!] -p, --protocol protocol
       The  protocol of the rule or of the packet to check.
       The specified protocol can be one of tcp, udp,
       udplite, icmp, icmpv6,esp, ah,  sctp,  mh  or
       the special keyword "all"

Is leavingf off the "-p xxx" the same and "-p all"?

surely

If so, I am no sure tht I feel confortable opening
up "udplite, icmp, icmpv6, esp, ah,  sctp,  mh"
as well.

you do not open anything - when you don't even understand that "RELATED,ESTABLISHED" only hits RESPONSE packets and so there must have been any rule accepting the initial packet of a connection please refrain for setup fireall rules

how do you imagine a ESTABLISHED state packet can exist in a protocl you didn't accept the initial connect packet?

Bad guys fussing with packets to trick your stuff.

bad guys can't change how things are working

Hi Reindl,

I think that my level of paranoia is higher that
yours.  It may comes from you understand this stuff
many times more than I do

your level of paranoia is fore sure not higher that mine but i don't throw rules which make no sense and which i don't understand in my infrastructure because every single rule i don't undertand in doubt does either hram or is useless

technical rules have nothing to do with paranoia

when you don't accept any inital packet of a connection there is no way that it falls under ctstate RELATED,ESTABLISHED

if you don't accept a sctp packet there is no way that any sctp could hit RELATED,ESTABLISHED

the problem with your curent ruleset ist that you did copy&paste rules from wherever without understanding what they are doing - that's the worst case szart of a firewall ruleset





[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux