From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753737Ab1HLPi0 (ORCPT ); Fri, 12 Aug 2011 11:38:26 -0400 Received: from stinky.trash.net ([213.144.137.162]:40333 "EHLO stinky.trash.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752720Ab1HLPiY (ORCPT ); Fri, 12 Aug 2011 11:38:24 -0400 Message-ID: <4E4548EA.9020604@trash.net> Date: Fri, 12 Aug 2011 17:38:18 +0200 From: Patrick McHardy User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.1.10) Gecko/20100620 Icedove/3.0.5 MIME-Version: 1.0 To: Eric Dumazet CC: Tonda , davem@davemloft.net, kuznet@ms2.inr.ac.ru, jmorris@namei.org, yoshfuji@linux-ipv6.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: TCP port firewall incl. description and english variable names References: <1313161843-18226-1-git-send-email-as@strmilov.cz> <1313163276.2354.32.camel@edumazet-HP-Compaq-6005-Pro-SFF-PC> In-Reply-To: <1313163276.2354.32.camel@edumazet-HP-Compaq-6005-Pro-SFF-PC> X-Enigmail-Version: 1.0.1 Content-Type: text/plain; charset=ISO-8859-15 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 12.08.2011 17:34, Eric Dumazet wrote: > Le vendredi 12 août 2011 à 17:10 +0200, Tonda a écrit : >> Module that is used to open, close or filter specified TCP port by >> sending certain sequence of UDP packets to predefined UDP ports >> (password-like firewall). One sequence of UDP ports is the opening key >> and sending packets successively to them opens the TCP port and the >> second sequence of UDP ports is the closing key and sending packets >> successively to them closes the TCP port. If between two UDP packets >> in the sequence comes more than 16 another UDP packets, the sequence >> (either opening or closing) is aborted. The configuration and view of >> affected TCP port, opening and closing key and other firewall >> parameters is made throw use of sysfs. >> >> Signed-off-by: Antoine Steinhauser > > Antoine > > There is no chance this can be added in official linux kernel, its > really too ugly, and can be implemented using standard iptables rules, > and userland controller, adding encryption and other high level stuff if > needed. Fully agreed. There are also standarized protocols for this.