From mboxrd@z Thu Jan 1 00:00:00 1970 From: Pablo Neira Ayuso Subject: Re: UDP packets sent with wrong source address after routing change [AV#3431] Date: Sat, 10 Nov 2012 15:07:20 +0100 Message-ID: <20121110140720.GA9610@1984> References: Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: Jan Engelhardt , netfilter-devel@vger.kernel.org To: Chris Wilson Return-path: Received: from mail.us.es ([193.147.175.20]:36683 "EHLO mail.us.es" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751356Ab2KJOHb (ORCPT ); Sat, 10 Nov 2012 09:07:31 -0500 Content-Disposition: inline In-Reply-To: Sender: netfilter-devel-owner@vger.kernel.org List-ID: On Thu, Nov 08, 2012 at 06:37:24PM +0000, Chris Wilson wrote: [...] > >>Another option which doesn't violate layering might be to update > >>the NAT rule when the outgoing address is known (after routing), > > > >That is what MASQUERADE is usually for. > > Unfortunately I am using MASQUERADE and this still happens. If it > could just be fixed in the MASQUERADE target that would be a big > win. MASQUERADE already cleans up the entries in the conntrack table once you get your device down, that code is still there in 2.6.18: http://lxr.linux.no/#linux+v2.6.18/net/ipv4/netfilter/ipt_MASQUERADE.c#L111