Mr. Blaxell,

--- Zygo Blaxell <[EMAIL PROTECTED]> wrote:
> In article <[EMAIL PROTECTED]>,
> Derrik Pates <[EMAIL PROTECTED]> wrote:
> >It would appear the mangle5hooks patch has been applied to the mainline
> >kernel as part of that update. Now mangle targets can be used on all 5
> >hooks (INPUT, OUTPUT, FORWARD, PREROUTING, POSTROUTING).
> 
> Any chance that we could get 'filter' targets in all five places as well?
> 
> Suppose I want to migrate rules directly from ipchains to iptables,
> because I don't want to have to rewrite ~235 tested and verified ipchains
> firewall rules from scratch just to use one new iptables feature.  
> 
> I might use the following mappings:
> 
>       ipchains input rule -> iptables -t mangle PREROUTING rule
>                               (except REDIRECT, which is -t nat)
>       ipchains forward rule -> iptables -t filter FORWARD rule
>       ipchains output rule -> iptables -t mangle POSTROUTING rule
>                               (unless you are using SNAT or MASQUERADE)
> 
> mangle-PREROUTING is called first when all incoming packets are received
> for every packet, so it works reasonably well as a replacement for
> ipchains-compatible input filtering (assuming your actual INPUT chain
> in the forward table has policy ACCEPT).  filter-FORWARD is close enough
> to ipchains forward for my purposes (I usually only have one forward
> rule, and never more than four, out of rule sets ranging in size from
> 188 to 312 rules).
> 
> For ipchains output rules I seem to be stuck.  There is
> mangle-POSTROUTING, which is the closest thing to the ipchains output
> chain, but nat-POSTROUTING is called after it, which means that any
> changes to the packet done by outgoing NAT (especially MASQ) can't be
> filtered at all.  Logically, there should be a POSTROUTING chain in the
> filter table which deals with this.

      There was a large discussion (I think) early on in the mailinglist about
the priorities of the mangle table. I believe it was eventually agreed that mangle
belongs before nat. As for having the filter table take up allfive hook points, I
don't think that's feasible, IMO.

> 
> The first thing in my ipchains output chain is usually a sanity check to
> make sure that I'm not sending packets with an inappropriate source
> address.  I seem to have nowhere to put this check in iptables.
> 
> Historically this check has been necessary as Linux networking never seems
> to get it right in non-trivial cases--I have dropped many thousands of
> outgoing packets over the years in places where they just should not be.
> Especially bad problems occur when MASQ is combined with dynamic changes
> to the routing table or policy routing, and there was a really mysterious
> bug in the NFS kernel server code that would cause it to start sending
> replies via random interfaces despite the fact that such routing disagrees
> with the interface address, the routing table, the origin of the request
> packet, and all common sense.  ipchains could catch all of these bugs
> easily, but I can't have the same confidence in iptables because it lacks
> filter-POSTROUTING.

       OK. I understand why you want a POSTROUTING chain for filtration purposes.
But I don't think that the coreteam will auhorize any new patches to change the
location and number of hooks in the current tables. At least I don't think they
will right now; if a good enough reason comes up, maybe they will ;)

> 
> I and some of my clients have to deal with some ISP's with fairly
> draconian policies about incorrect source addresses on packets.
> That policy is:  disconnect subscriber, wait about six hours, leave
> rude voicemail, close ISP office, wait for someone to call back and ask
> for reconnection during business hours.  If Linux starts spewing wrong
> packets on a Friday, I could be offline for an entire weekend.

        Well, TBH if you have a strong firewall policy and keep a rigid control
over what packets go in and out, then this scenario may not take place. What sort
of firewall rules do you have in place?

> 
> -- 
> Zygo Blaxell (Laptop) <[EMAIL PROTECTED]>
> GPG = D13D 6651 F446 9787 600B AD1E CCF3 6F93 2823 44AD
>

Brad 


=====
Brad Chapman

Permanent e-mail: [EMAIL PROTECTED]
Current e-mail: [EMAIL PROTECTED]
Alternate e-mail: [EMAIL PROTECTED]

__________________________________________________
Do You Yahoo!?
Yahoo! Movies - coverage of the 74th Academy Awards®
http://movies.yahoo.com/

Reply via email to