mirror of
https://github.com/GrapheneOS/infrastructure.git
synced 2025-01-03 11:00:49 -05:00
nftables: explain synproxy untracked/invalid cases
This commit is contained in:
parent
26a58b2492
commit
8f047de0c3
@ -57,6 +57,8 @@ table inet filter {
|
|||||||
|
|
||||||
iif lo goto input-loopback
|
iif lo goto input-loopback
|
||||||
meta l4proto { icmp, ipv6-icmp } accept
|
meta l4proto { icmp, ipv6-icmp } accept
|
||||||
|
|
||||||
|
# for synproxy, SYN is untracked and first ACK is invalid which are handled via fallthrough
|
||||||
ct state vmap { new : goto input-new, established : goto input-established, related : accept }
|
ct state vmap { new : goto input-new, established : goto input-established, related : accept }
|
||||||
|
|
||||||
tcp dport 22 ip saddr @ip-connlimit-ssh counter reject with tcp reset
|
tcp dport 22 ip saddr @ip-connlimit-ssh counter reject with tcp reset
|
||||||
|
@ -57,6 +57,8 @@ table inet filter {
|
|||||||
|
|
||||||
iif lo goto input-loopback
|
iif lo goto input-loopback
|
||||||
meta l4proto { icmp, ipv6-icmp } accept
|
meta l4proto { icmp, ipv6-icmp } accept
|
||||||
|
|
||||||
|
# for synproxy, SYN is untracked and first ACK is invalid which are handled via fallthrough
|
||||||
ct state vmap { new : goto input-new, established : goto input-established, related : accept }
|
ct state vmap { new : goto input-new, established : goto input-established, related : accept }
|
||||||
|
|
||||||
tcp dport 22 ip saddr @ip-connlimit-ssh counter reject with tcp reset
|
tcp dport 22 ip saddr @ip-connlimit-ssh counter reject with tcp reset
|
||||||
|
@ -57,6 +57,8 @@ table inet filter {
|
|||||||
|
|
||||||
iif lo goto input-loopback
|
iif lo goto input-loopback
|
||||||
meta l4proto { icmp, ipv6-icmp } accept
|
meta l4proto { icmp, ipv6-icmp } accept
|
||||||
|
|
||||||
|
# for synproxy, SYN is untracked and first ACK is invalid which are handled via fallthrough
|
||||||
ct state vmap { new : goto input-new, established : goto input-established, related : accept }
|
ct state vmap { new : goto input-new, established : goto input-established, related : accept }
|
||||||
|
|
||||||
tcp dport 22 ip saddr @ip-connlimit-ssh counter reject with tcp reset
|
tcp dport 22 ip saddr @ip-connlimit-ssh counter reject with tcp reset
|
||||||
|
@ -57,6 +57,8 @@ table inet filter {
|
|||||||
|
|
||||||
iif lo goto input-loopback
|
iif lo goto input-loopback
|
||||||
meta l4proto { icmp, ipv6-icmp } accept
|
meta l4proto { icmp, ipv6-icmp } accept
|
||||||
|
|
||||||
|
# for synproxy, SYN is untracked and first ACK is invalid which are handled via fallthrough
|
||||||
ct state vmap { new : goto input-new, established : goto input-established, related : accept }
|
ct state vmap { new : goto input-new, established : goto input-established, related : accept }
|
||||||
|
|
||||||
tcp dport 22 ip saddr @ip-connlimit-ssh counter reject with tcp reset
|
tcp dport 22 ip saddr @ip-connlimit-ssh counter reject with tcp reset
|
||||||
|
@ -61,6 +61,8 @@ table inet filter {
|
|||||||
iif lo goto input-loopback
|
iif lo goto input-loopback
|
||||||
udp dport 123 accept
|
udp dport 123 accept
|
||||||
meta l4proto { icmp, ipv6-icmp } accept
|
meta l4proto { icmp, ipv6-icmp } accept
|
||||||
|
|
||||||
|
# for synproxy, SYN is untracked and first ACK is invalid which are handled via fallthrough
|
||||||
ct state vmap { new : goto input-new, established : goto input-established, related : accept }
|
ct state vmap { new : goto input-new, established : goto input-established, related : accept }
|
||||||
|
|
||||||
tcp dport 22 ip saddr @ip-connlimit-ssh counter reject with tcp reset
|
tcp dport 22 ip saddr @ip-connlimit-ssh counter reject with tcp reset
|
||||||
|
@ -60,6 +60,8 @@ table inet filter {
|
|||||||
iif lo goto input-loopback
|
iif lo goto input-loopback
|
||||||
udp dport 53 accept
|
udp dport 53 accept
|
||||||
meta l4proto { icmp, ipv6-icmp } accept
|
meta l4proto { icmp, ipv6-icmp } accept
|
||||||
|
|
||||||
|
# for synproxy, SYN is untracked and first ACK is invalid which are handled via fallthrough
|
||||||
ct state vmap { new : goto input-new, established : goto input-established, related : accept }
|
ct state vmap { new : goto input-new, established : goto input-established, related : accept }
|
||||||
|
|
||||||
tcp dport 22 ip saddr @ip-connlimit-ssh counter reject with tcp reset
|
tcp dport 22 ip saddr @ip-connlimit-ssh counter reject with tcp reset
|
||||||
|
@ -65,6 +65,8 @@ table inet filter {
|
|||||||
iif lo goto input-loopback
|
iif lo goto input-loopback
|
||||||
udp dport 53 accept
|
udp dport 53 accept
|
||||||
meta l4proto { icmp, ipv6-icmp } accept
|
meta l4proto { icmp, ipv6-icmp } accept
|
||||||
|
|
||||||
|
# for synproxy, SYN is untracked and first ACK is invalid which are handled via fallthrough
|
||||||
ct state vmap { new : goto input-new, established : goto input-established, related : accept }
|
ct state vmap { new : goto input-new, established : goto input-established, related : accept }
|
||||||
|
|
||||||
tcp dport 22 ip saddr @ip-connlimit-ssh counter reject with tcp reset
|
tcp dport 22 ip saddr @ip-connlimit-ssh counter reject with tcp reset
|
||||||
|
@ -57,6 +57,8 @@ table inet filter {
|
|||||||
|
|
||||||
iif lo goto input-loopback
|
iif lo goto input-loopback
|
||||||
meta l4proto { icmp, ipv6-icmp } accept
|
meta l4proto { icmp, ipv6-icmp } accept
|
||||||
|
|
||||||
|
# for synproxy, SYN is untracked and first ACK is invalid which are handled via fallthrough
|
||||||
ct state vmap { new : goto input-new, established : goto input-established, related : accept }
|
ct state vmap { new : goto input-new, established : goto input-established, related : accept }
|
||||||
|
|
||||||
tcp dport 22 ip saddr @ip-connlimit-ssh counter reject with tcp reset
|
tcp dport 22 ip saddr @ip-connlimit-ssh counter reject with tcp reset
|
||||||
|
@ -61,6 +61,8 @@ table inet filter {
|
|||||||
|
|
||||||
iif lo goto input-loopback
|
iif lo goto input-loopback
|
||||||
meta l4proto { icmp, ipv6-icmp } accept
|
meta l4proto { icmp, ipv6-icmp } accept
|
||||||
|
|
||||||
|
# for synproxy, SYN is untracked and first ACK is invalid which are handled via fallthrough
|
||||||
ct state vmap { new : goto input-new, established : goto input-established, related : accept }
|
ct state vmap { new : goto input-new, established : goto input-established, related : accept }
|
||||||
|
|
||||||
tcp dport 22 ip saddr @ip-connlimit-ssh counter reject with tcp reset
|
tcp dport 22 ip saddr @ip-connlimit-ssh counter reject with tcp reset
|
||||||
|
Loading…
Reference in New Issue
Block a user