#17690: Iptables conntrack bug -- no mach for --ctstate RELATED,ESTABLISHED rule
--------------------------+-----------------------------------
  Reporter:  morfik       |      Owner:  developers
      Type:  defect       |     Status:  closed
  Priority:  high         |  Milestone:
 Component:  base system  |    Version:  Barrier Breaker 14.07
Resolution:  not_a_bug    |   Keywords:  iptables, conntrack
--------------------------+-----------------------------------

Comment (by anonymous):

 When is it needed? What are examples for where it should be set to 0? I am
 using OpenVPN for example on my router, which worked great until now, but
 I always wasnt sure, if my firewall rules were perfectly correct, for
 example this line always bugged me:

 {{{
 iptables -A forwarding_rule -i br-lan -o tun+ -j ACCEPT
 }}}

 Doesnt it mean anything from the tun devices is allowd in to my network,
 and the VPN hoster theoretically can hack inside my router if he wanted
 to? Ive tried something like this for example:

 {{{
 iptables -A FORWARD -i br-lan -o tun+ -m state --state RELATED,ESTABLISHED
 -j ACCEPT
 }}}

 That, in my logic, only connections my network already initiated were
 allowed, but it never worked. Is this where I have to set it to 0?

--
Ticket URL: <https://dev.openwrt.org/ticket/17690#comment:9>
OpenWrt <http://openwrt.org>
Opensource Wireless Router Technology
_______________________________________________
openwrt-tickets mailing list
[email protected]
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-tickets

Reply via email to