[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20090701062737.6cac2193.lk-netdev@lk-netdev.nosense.org>
Date: Wed, 1 Jul 2009 06:27:37 +0930
From: Mark Smith <lk-netdev@...netdev.nosense.org>
To: Jan Engelhardt <jengelh@...ozas.de>
Cc: David Miller <davem@...emloft.net>, herbert@...dor.apana.org.au,
markmc@...hat.com, netdev@...r.kernel.org, kaber@...sh.net,
netfilter-devel@...r.kernel.org
Subject: Re: [PATCH] bridge: make bridge-nf-call-*tables default
configurable
Hi,
On Tue, 30 Jun 2009 22:16:35 +0200 (CEST)
Jan Engelhardt <jengelh@...ozas.de> wrote:
>
> On Tuesday 2009-06-30 21:06, David Miller wrote:
> >Adding appropriate lists and persons to CC:
> >
> >> On Tue, Jun 30, 2009 at 05:27:47PM +0100, Mark McLoughlin wrote:
> >>>
> >>> However, because nf_conntrack introduces an skb_orphan(), it is now
> >>> recommended that bridge-nf-call-iptables be disabled completely so as
> >>> to ensure features like TUNSETSNDBUF work as expected.
> >>
> >> Patrick, does conntrack ever make sense for bridging? Perhaps
> >> we should get rid of that completely?
>
> It makes sense absolutely. Consider:
>
> * packet enters bridge
> * NF_HOOK(PF_INET6, NF_INET_PRE_ROUTING, ...) is called by nr_netfilter.c
> * (connection tracking entry is set up)
> * let bridging decision be "local delivery"
I really like this feature, although it is only because I've spent
time thinking about it, and it's usefulness, after having been burnt
quite a lot by it, due to it's quite strange side effects on traffic.
e.g. it'll defragment bridged IP packets, and then, if the outbound
bridge interface MTU is big enough, will send off large single ethernet
frames. If you're not expecting that, or don't work out what is
going on, you'll believe you're seeing the input traffic in the form
it arrived, and you'll believe it for quite a long time :-(
I'm not sure if it supposed to work on IP traffic carried within
bridge PPPoE/PPP, but it does - and that was very, very confusing to
work out what had happened too. PPPoE comes up, as does PPP and IPCP,
but forwarded IP packets are dropped unless there is a FORWARD
iptables rule.
I do agree though, either it should default to off, or the behaviour be
made far more prominent somehow.
Regards,
Mark.
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists