1. 28 8月, 2013 2 次提交
  2. 13 8月, 2013 2 次提交
  3. 11 8月, 2013 1 次提交
  4. 09 8月, 2013 1 次提交
  5. 07 8月, 2013 1 次提交
  6. 06 8月, 2013 1 次提交
  7. 05 8月, 2013 2 次提交
  8. 01 8月, 2013 7 次提交
  9. 31 7月, 2013 5 次提交
  10. 28 7月, 2013 1 次提交
  11. 15 7月, 2013 2 次提交
  12. 01 7月, 2013 1 次提交
    • F
      netfilter: nf_queue: add NFQA_SKB_CSUM_NOTVERIFIED info flag · 496e4ae7
      Florian Westphal 提交于
      The common case is that TCP/IP checksums have already been
      verified, e.g. by hardware (rx checksum offload), or conntrack.
      
      Userspace can use this flag to determine when the checksum
      has not been validated yet.
      
      If the flag is set, this doesn't necessarily mean that the packet has
      an invalid checksum, e.g. if NIC doesn't support rx checksum.
      
      Userspace that sucessfully enabled NFQA_CFG_F_GSO queue feature flag can
      infer that IP/TCP checksum has already been validated if either the
      SKB_INFO attribute is not present or the NFQA_SKB_CSUM_NOTVERIFIED
      flag is unset.
      Signed-off-by: NFlorian Westphal <fw@strlen.de>
      Signed-off-by: NPablo Neira Ayuso <pablo@netfilter.org>
      496e4ae7
  13. 26 6月, 2013 6 次提交
  14. 24 6月, 2013 2 次提交
  15. 21 6月, 2013 1 次提交
    • E
      netfilter: xt_socket: add XT_SOCKET_NOWILDCARD flag · 681f130f
      Eric Dumazet 提交于
      xt_socket module can be a nice replacement to conntrack module
      in some cases (SYN filtering for example)
      
      But it lacks the ability to match the 3rd packet of TCP
      handshake (ACK coming from the client).
      
      Add a XT_SOCKET_NOWILDCARD flag to disable the wildcard mechanism.
      
      The wildcard is the legacy socket match behavior, that ignores
      LISTEN sockets bound to INADDR_ANY (or ipv6 equivalent)
      
      iptables -I INPUT -p tcp --syn -j SYN_CHAIN
      iptables -I INPUT -m socket --nowildcard -j ACCEPT
      Signed-off-by: NEric Dumazet <edumazet@google.com>
      Cc: Patrick McHardy <kaber@trash.net>
      Cc: Jesper Dangaard Brouer <brouer@redhat.com>
      Signed-off-by: NPablo Neira Ayuso <pablo@netfilter.org>
      681f130f
  16. 20 6月, 2013 2 次提交
    • F
      netfilter: nf_conntrack: avoid large timeout for mid-stream pickup · 6547a221
      Florian Westphal 提交于
      When loose tracking is enabled (default), non-syn packets cause
      creation of new conntracks in established state with default timeout for
      established state (5 days).  This causes the table to fill up with UNREPLIED
      when the 'new ack' packet happened to be the last-ack of a previous,
      already timed-out connection.
      
      Consider:
      
      A 192.168.x.52792 > 10.184.y.80: F, 426:426(0) ack 9237 win 255
      B 10.184.y.80 > 192.168.x.52792: ., ack 427 win 123
      <61 second pause>
      C 10.184.y.80 > 192.168.x.52792: F, 9237:9237(0) ack 427 win 123
      D 192.168.x.52792 > 10.184.y.80: ., ack 9238 win 255
      
      B moves conntrack to CLOSE_WAIT and will kill it after 60 second timeout,
      C is ignored (FIN set), but last packet (D) causes new ct with 5-days timeout.
      
      Use UNACK timeout (5 minutes) instead to get rid of these entries sooner
      when in ESTABLISHED state without having seen traffic in both directions.
      Signed-off-by: NFlorian Westphal <fw@strlen.de>
      Acked-by: NJozsef Kadlecsik <kadlec@blackhole.kfki.hu>
      Signed-off-by: NPablo Neira Ayuso <pablo@netfilter.org>
      6547a221
    • D
      netfilter: check return code from nla_parse_tested · 130ffbc2
      Daniel Borkmann 提交于
      These are the only calls under net/ that do not check nla_parse_nested()
      for its error code, but simply continue execution. If parsing of netlink
      attributes fails, we should return with an error instead of continuing.
      In nearly all of these calls we have a policy attached, that is being
      type verified during nla_parse_nested(), which we would miss checking
      for otherwise.
      Signed-off-by: NDaniel Borkmann <dborkman@redhat.com>
      Signed-off-by: NPablo Neira Ayuso <pablo@netfilter.org>
      130ffbc2
  17. 19 6月, 2013 1 次提交
  18. 13 6月, 2013 1 次提交
  19. 12 6月, 2013 1 次提交