[pve-devel] [PATCH] add ips feature v3

Dietmar Maurer dietmar at proxmox.com
Wed Mar 19 07:32:48 CET 2014



> -----Original Message-----
> From: Alexandre DERUMIER [mailto:aderumier at odiso.com]
> Sent: Mittwoch, 19. März 2014 06:33
> To: Dietmar Maurer
> Cc: pve-devel at pve.proxmox.com
> Subject: Re: [pve-devel] [PATCH] add ips feature v3
> 
> I'll send a new patch today, I found some other missing accept

OK

I am still a bit unhappy with that PVEFW-Accept chain.

>this create a new chain PVEFW-Accept
>
>-A PVEFW-FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -j PVEFW-Accept

All those checks are unnecessary, because we have already check it in tap-IN chain? And the PVEFW-Accept
can grow really large because all interfaces from all VMs are added to a single chain (not per bridge)?

>-A PVEFW-Accept -m physdev --physdev-out tapxxx --physdev-is-bridged -j NFQUEUE --queue-num 0 --queue-bypass
>-A PVEFW-Accept -m physdev --physdev-out tapxxx --physdev-is-bridged -j NFQUEUE --queue-num 0 --queue-bypass
>-A PVEFW-Accept -j ACCEPT

Then I saw that you also jump to PVEFW-Accept for OUT traffic:

	ruleset_create_chain($ruleset, "$bridge-IN");
 	ruleset_addrule($ruleset, "$bridge-FW", "-m physdev --physdev-is-out -j $bridge-IN");
-	ruleset_addrule($ruleset, "$bridge-FW", "-m mark --mark 1 -j ACCEPT"); # AFAIK this is for direction OUT
+	ruleset_addrule($ruleset, "$bridge-FW", "-m mark --mark 1 -j PVEFW-Accept");

why?




More information about the pve-devel mailing list