On Apr 5, 2013, at 11:29, Daniel Curtis <[email protected]> wrote:

> Hi Matthew
> 
> How can I use Reverse Path filtering in the kernel? You 
> mean this option, right?; /proc/sys/net/ipv4/conf/*/rp_filter
> 
Yes, this is what I am referring to. I would double check the documentation to 
see if there are other settings to switch for RP filtering.

> Sorry, but I do not understand how to drop "out of state" 
> packets with the INVALID  rules.
> 

Like you had before
-A INPUT -conntrac.... 

I know iptables -A INPUT -m state --state INVALID -j DROP works well. And it 
does pick out invalid (aka out of state) UDP packets. DNS is one additional 
example.

> My logs:
> 
> Apr  5 17:18:18 t4 kernel: [13107.296065] INVALID OUT: IN= 
> OUT=eth0 SRC=192.168.5.200 DST=173.194.44.32 LEN=446 
> TOS=0x00 PREC=0x00 TTL=64 ID=36621 DF PROTO=TCP 
> SPT=59041 DPT=443 WINDOW=14600 RES=0x00 ACK PSH 
> FIN URGP=0 
> 
> Apr  5 15:29:40 t4 kernel: [ 6589.698710] INVALID IN: IN=eth0 
> OUT= MAC=mac_address_ SRC=173.194.44.32 DST=192.168.5.200 
> LEN=40 TOS=0x00 PREC=0x00 TTL=50 ID=40504 PROTO=TCP 
> SPT=443 DPT=56236 WINDOW=0 RES=0x00 RST URGP=0 
> 
> and so on... Is there something wrong, strange?
> 
Maybe, maybe not. 

Reply via email to