Mr. Blaxell, --- Zygo Blaxell <[EMAIL PROTECTED]> wrote: > In article <[EMAIL PROTECTED]>, > Derrik Pates <[EMAIL PROTECTED]> wrote: > >It would appear the mangle5hooks patch has been applied to the mainline > >kernel as part of that update. Now mangle targets can be used on all 5 > >hooks (INPUT, OUTPUT, FORWARD, PREROUTING, POSTROUTING). > > Any chance that we could get 'filter' targets in all five places as well? > > Suppose I want to migrate rules directly from ipchains to iptables, > because I don't want to have to rewrite ~235 tested and verified ipchains > firewall rules from scratch just to use one new iptables feature. > > I might use the following mappings: > > ipchains input rule -> iptables -t mangle PREROUTING rule > (except REDIRECT, which is -t nat) > ipchains forward rule -> iptables -t filter FORWARD rule > ipchains output rule -> iptables -t mangle POSTROUTING rule > (unless you are using SNAT or MASQUERADE) > > mangle-PREROUTING is called first when all incoming packets are received > for every packet, so it works reasonably well as a replacement for > ipchains-compatible input filtering (assuming your actual INPUT chain > in the forward table has policy ACCEPT). filter-FORWARD is close enough > to ipchains forward for my purposes (I usually only have one forward > rule, and never more than four, out of rule sets ranging in size from > 188 to 312 rules). > > For ipchains output rules I seem to be stuck. There is > mangle-POSTROUTING, which is the closest thing to the ipchains output > chain, but nat-POSTROUTING is called after it, which means that any > changes to the packet done by outgoing NAT (especially MASQ) can't be > filtered at all. Logically, there should be a POSTROUTING chain in the > filter table which deals with this.
There was a large discussion (I think) early on in the mailinglist about the priorities of the mangle table. I believe it was eventually agreed that mangle belongs before nat. As for having the filter table take up allfive hook points, I don't think that's feasible, IMO. > > The first thing in my ipchains output chain is usually a sanity check to > make sure that I'm not sending packets with an inappropriate source > address. I seem to have nowhere to put this check in iptables. > > Historically this check has been necessary as Linux networking never seems > to get it right in non-trivial cases--I have dropped many thousands of > outgoing packets over the years in places where they just should not be. > Especially bad problems occur when MASQ is combined with dynamic changes > to the routing table or policy routing, and there was a really mysterious > bug in the NFS kernel server code that would cause it to start sending > replies via random interfaces despite the fact that such routing disagrees > with the interface address, the routing table, the origin of the request > packet, and all common sense. ipchains could catch all of these bugs > easily, but I can't have the same confidence in iptables because it lacks > filter-POSTROUTING. OK. I understand why you want a POSTROUTING chain for filtration purposes. But I don't think that the coreteam will auhorize any new patches to change the location and number of hooks in the current tables. At least I don't think they will right now; if a good enough reason comes up, maybe they will ;) > > I and some of my clients have to deal with some ISP's with fairly > draconian policies about incorrect source addresses on packets. > That policy is: disconnect subscriber, wait about six hours, leave > rude voicemail, close ISP office, wait for someone to call back and ask > for reconnection during business hours. If Linux starts spewing wrong > packets on a Friday, I could be offline for an entire weekend. Well, TBH if you have a strong firewall policy and keep a rigid control over what packets go in and out, then this scenario may not take place. What sort of firewall rules do you have in place? > > -- > Zygo Blaxell (Laptop) <[EMAIL PROTECTED]> > GPG = D13D 6651 F446 9787 600B AD1E CCF3 6F93 2823 44AD > Brad ===== Brad Chapman Permanent e-mail: [EMAIL PROTECTED] Current e-mail: [EMAIL PROTECTED] Alternate e-mail: [EMAIL PROTECTED] __________________________________________________ Do You Yahoo!? Yahoo! Movies - coverage of the 74th Academy Awards® http://movies.yahoo.com/