nftables: explain synproxy untracked/invalid cases

This commit is contained in:
Daniel Micay 2024-04-11 10:19:39 -04:00
parent 26a58b2492
commit 8f047de0c3
9 changed files with 18 additions and 0 deletions

View File

@ -57,6 +57,8 @@ table inet filter {
iif lo goto input-loopback
meta l4proto { icmp, ipv6-icmp } accept
# for synproxy, SYN is untracked and first ACK is invalid which are handled via fallthrough
ct state vmap { new : goto input-new, established : goto input-established, related : accept }
tcp dport 22 ip saddr @ip-connlimit-ssh counter reject with tcp reset

View File

@ -57,6 +57,8 @@ table inet filter {
iif lo goto input-loopback
meta l4proto { icmp, ipv6-icmp } accept
# for synproxy, SYN is untracked and first ACK is invalid which are handled via fallthrough
ct state vmap { new : goto input-new, established : goto input-established, related : accept }
tcp dport 22 ip saddr @ip-connlimit-ssh counter reject with tcp reset

View File

@ -57,6 +57,8 @@ table inet filter {
iif lo goto input-loopback
meta l4proto { icmp, ipv6-icmp } accept
# for synproxy, SYN is untracked and first ACK is invalid which are handled via fallthrough
ct state vmap { new : goto input-new, established : goto input-established, related : accept }
tcp dport 22 ip saddr @ip-connlimit-ssh counter reject with tcp reset

View File

@ -57,6 +57,8 @@ table inet filter {
iif lo goto input-loopback
meta l4proto { icmp, ipv6-icmp } accept
# for synproxy, SYN is untracked and first ACK is invalid which are handled via fallthrough
ct state vmap { new : goto input-new, established : goto input-established, related : accept }
tcp dport 22 ip saddr @ip-connlimit-ssh counter reject with tcp reset

View File

@ -61,6 +61,8 @@ table inet filter {
iif lo goto input-loopback
udp dport 123 accept
meta l4proto { icmp, ipv6-icmp } accept
# for synproxy, SYN is untracked and first ACK is invalid which are handled via fallthrough
ct state vmap { new : goto input-new, established : goto input-established, related : accept }
tcp dport 22 ip saddr @ip-connlimit-ssh counter reject with tcp reset

View File

@ -60,6 +60,8 @@ table inet filter {
iif lo goto input-loopback
udp dport 53 accept
meta l4proto { icmp, ipv6-icmp } accept
# for synproxy, SYN is untracked and first ACK is invalid which are handled via fallthrough
ct state vmap { new : goto input-new, established : goto input-established, related : accept }
tcp dport 22 ip saddr @ip-connlimit-ssh counter reject with tcp reset

View File

@ -65,6 +65,8 @@ table inet filter {
iif lo goto input-loopback
udp dport 53 accept
meta l4proto { icmp, ipv6-icmp } accept
# for synproxy, SYN is untracked and first ACK is invalid which are handled via fallthrough
ct state vmap { new : goto input-new, established : goto input-established, related : accept }
tcp dport 22 ip saddr @ip-connlimit-ssh counter reject with tcp reset

View File

@ -57,6 +57,8 @@ table inet filter {
iif lo goto input-loopback
meta l4proto { icmp, ipv6-icmp } accept
# for synproxy, SYN is untracked and first ACK is invalid which are handled via fallthrough
ct state vmap { new : goto input-new, established : goto input-established, related : accept }
tcp dport 22 ip saddr @ip-connlimit-ssh counter reject with tcp reset

View File

@ -61,6 +61,8 @@ table inet filter {
iif lo goto input-loopback
meta l4proto { icmp, ipv6-icmp } accept
# for synproxy, SYN is untracked and first ACK is invalid which are handled via fallthrough
ct state vmap { new : goto input-new, established : goto input-established, related : accept }
tcp dport 22 ip saddr @ip-connlimit-ssh counter reject with tcp reset