mirror of
https://github.com/GrapheneOS/infrastructure.git
synced 2025-07-21 14:09:03 -04:00
nftables: explain synproxy untracked/invalid cases
This commit is contained in:
parent
26a58b2492
commit
8f047de0c3
9 changed files with 18 additions and 0 deletions
|
@ -57,6 +57,8 @@ table inet filter {
|
|||
|
||||
iif lo goto input-loopback
|
||||
meta l4proto { icmp, ipv6-icmp } accept
|
||||
|
||||
# for synproxy, SYN is untracked and first ACK is invalid which are handled via fallthrough
|
||||
ct state vmap { new : goto input-new, established : goto input-established, related : accept }
|
||||
|
||||
tcp dport 22 ip saddr @ip-connlimit-ssh counter reject with tcp reset
|
||||
|
|
|
@ -57,6 +57,8 @@ table inet filter {
|
|||
|
||||
iif lo goto input-loopback
|
||||
meta l4proto { icmp, ipv6-icmp } accept
|
||||
|
||||
# for synproxy, SYN is untracked and first ACK is invalid which are handled via fallthrough
|
||||
ct state vmap { new : goto input-new, established : goto input-established, related : accept }
|
||||
|
||||
tcp dport 22 ip saddr @ip-connlimit-ssh counter reject with tcp reset
|
||||
|
|
|
@ -57,6 +57,8 @@ table inet filter {
|
|||
|
||||
iif lo goto input-loopback
|
||||
meta l4proto { icmp, ipv6-icmp } accept
|
||||
|
||||
# for synproxy, SYN is untracked and first ACK is invalid which are handled via fallthrough
|
||||
ct state vmap { new : goto input-new, established : goto input-established, related : accept }
|
||||
|
||||
tcp dport 22 ip saddr @ip-connlimit-ssh counter reject with tcp reset
|
||||
|
|
|
@ -57,6 +57,8 @@ table inet filter {
|
|||
|
||||
iif lo goto input-loopback
|
||||
meta l4proto { icmp, ipv6-icmp } accept
|
||||
|
||||
# for synproxy, SYN is untracked and first ACK is invalid which are handled via fallthrough
|
||||
ct state vmap { new : goto input-new, established : goto input-established, related : accept }
|
||||
|
||||
tcp dport 22 ip saddr @ip-connlimit-ssh counter reject with tcp reset
|
||||
|
|
|
@ -61,6 +61,8 @@ table inet filter {
|
|||
iif lo goto input-loopback
|
||||
udp dport 123 accept
|
||||
meta l4proto { icmp, ipv6-icmp } accept
|
||||
|
||||
# for synproxy, SYN is untracked and first ACK is invalid which are handled via fallthrough
|
||||
ct state vmap { new : goto input-new, established : goto input-established, related : accept }
|
||||
|
||||
tcp dport 22 ip saddr @ip-connlimit-ssh counter reject with tcp reset
|
||||
|
|
|
@ -60,6 +60,8 @@ table inet filter {
|
|||
iif lo goto input-loopback
|
||||
udp dport 53 accept
|
||||
meta l4proto { icmp, ipv6-icmp } accept
|
||||
|
||||
# for synproxy, SYN is untracked and first ACK is invalid which are handled via fallthrough
|
||||
ct state vmap { new : goto input-new, established : goto input-established, related : accept }
|
||||
|
||||
tcp dport 22 ip saddr @ip-connlimit-ssh counter reject with tcp reset
|
||||
|
|
|
@ -65,6 +65,8 @@ table inet filter {
|
|||
iif lo goto input-loopback
|
||||
udp dport 53 accept
|
||||
meta l4proto { icmp, ipv6-icmp } accept
|
||||
|
||||
# for synproxy, SYN is untracked and first ACK is invalid which are handled via fallthrough
|
||||
ct state vmap { new : goto input-new, established : goto input-established, related : accept }
|
||||
|
||||
tcp dport 22 ip saddr @ip-connlimit-ssh counter reject with tcp reset
|
||||
|
|
|
@ -57,6 +57,8 @@ table inet filter {
|
|||
|
||||
iif lo goto input-loopback
|
||||
meta l4proto { icmp, ipv6-icmp } accept
|
||||
|
||||
# for synproxy, SYN is untracked and first ACK is invalid which are handled via fallthrough
|
||||
ct state vmap { new : goto input-new, established : goto input-established, related : accept }
|
||||
|
||||
tcp dport 22 ip saddr @ip-connlimit-ssh counter reject with tcp reset
|
||||
|
|
|
@ -61,6 +61,8 @@ table inet filter {
|
|||
|
||||
iif lo goto input-loopback
|
||||
meta l4proto { icmp, ipv6-icmp } accept
|
||||
|
||||
# for synproxy, SYN is untracked and first ACK is invalid which are handled via fallthrough
|
||||
ct state vmap { new : goto input-new, established : goto input-established, related : accept }
|
||||
|
||||
tcp dport 22 ip saddr @ip-connlimit-ssh counter reject with tcp reset
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue