[pve-devel] firewall : cluster.fw [rules] section ?
    Alexandre DERUMIER 
    aderumier at odiso.com
       
    Mon Jul  7 07:46:14 CEST 2014
    
    
  
>>My feeling is that we should use nft, else we will do all work twice. 
>>
yes. 
>>But the current iptables implementation is a good start for the first release. 
I'll try to build a nftables rules sample manually to see what's missing.
maybe can we release current iptables code for ipv4+ipset   and later nftables for ipv4+ipv6+etables ?
I think nft it's almost ready, 0.3 release note said that some parts are not yet ready
(masquerading, unicast/multicast/broacast rules).
So it should be ready in some months I think.
"
Ongoing works
=============
There are several open fronts in terms of development:
* Full logging support for all the supported families (ip, ip6, arp,
  bridge and inet).
* Masquerading support.
* Better reject support, which allows you to indicate the explicit reject
  reason.
* JSON/XML import.
* reverse set lookups, eg.
ip saddr != { 192.168.0.1, 192.168.0.10, 192.168.0.11 }
         ^^
* more new meta selectors, packet type (unicast, multicast and broadcast),
  cpu, physical interface, realm, etc.
* support for concatenations - multidimensional exact matches in O(1) types
* set selection - automatic selection of the optimal set
  implementation.
"
----- Mail original ----- 
De: "Dietmar Maurer" <dietmar at proxmox.com> 
À: "Alexandre DERUMIER" <aderumier at odiso.com> 
Cc: "pve-devel" <pve-devel at pve.proxmox.com> 
Envoyé: Lundi 7 Juillet 2014 06:02:08 
Objet: RE: [pve-devel] firewall : cluster.fw [rules] section ? 
> another interesting feature since nftables 0.2, is to be able to manage ipv4 and 
> ipv6 
> in the same filter table 
My feeling is that we should use nft, else we will do all work twice. 
But the current iptables implementation is a good start for the first release. 
    
    
More information about the pve-devel
mailing list