From: Christoph Anton Mitterer <mail@christoph.anton.mitterer.name>
To: netfilter-devel@vger.kernel.org
Cc: Pablo Neira Ayuso <pablo@netfilter.org>
Subject: [PATCH 4/7] doc: add overall description of the ruleset evaluation
Date: Fri, 26 Sep 2025 03:52:46 +0200 [thread overview]
Message-ID: <20250926021136.757769-5-mail@christoph.anton.mitterer.name> (raw)
In-Reply-To: <20250926021136.757769-1-mail@christoph.anton.mitterer.name>
Signed-off-by: Christoph Anton Mitterer <mail@christoph.anton.mitterer.name>
---
doc/nft.txt | 79 +++++++++++++++++++++++++++++++++++++++++++++++++++++
1 file changed, 79 insertions(+)
diff --git a/doc/nft.txt b/doc/nft.txt
index f52b7fef..4bbb6b56 100644
--- a/doc/nft.txt
+++ b/doc/nft.txt
@@ -560,6 +560,85 @@ table inet filter {
nft delete rule inet filter input handle 5
-------------------------
+OVERALL EVALUATION OF THE RULESET
+---------------------------------
+This is a summary of how the ruleset is evaluated.
+
+* Even if a packet is accepted by the ruleset (and thus by netfilter), it may
+ still get discarded by other means, for example Linux generally ignores
+ various ICMP types and are sysctl options lik
+ `net.ipv{4,6}.conf.*.forwarding` or `net.ipv4.conf.*.rp_filter`.
+* With respect to the evaluation tables don’t matter at all and are not known by
+ netfilter.
+ They’re merely used to structure the ruleset.
+* Packets traverse the network stack and at various hooks they’re evaluated by
+ any base chains attached to these hooks.
+* Base chains may call regular chains and regular chains may call other regular
+ chains (via *jump* or *goto* verdicts), in which case evaluation continues in
+ the called chain.
+ Base chains themsevlves cannot be called and only chains of the same table can
+ be called.
+* For each hook, the attached chains are evaluated in order of their priorities
+ (with chains with lower priority values being evaluated before those with
+ higher values and the order of chains with the same value being undefined).
+* An *accept* verdict (including an implict one via the base chain’s policy,
+ even if caused in certain cases by a *return* verdict) ends the evaluation of
+ the current base chain and any regular chains called from that.
+ It accepts the packet only with respect to the current base chain, which does
+ not mean that the packet is ultimately accepted.
+ Any other base chain (or regular chain called by such) with a higher priority
+ of the same hook as well as any other base chain (or regular chain called by
+ such) of any later hook may still utlimately *deny*/*reject* the packet with
+ an according verdict (with consequences as described below for
+ *deny*/*reject*).
+ Thus and merely from netfilter’s point of view, a packet is only accepted if
+ none of the chains (regardless of their tables) that are attached to any of
+ the respectively relevant hooks issues a *deny*/*reject* verdict (be it
+ explicitly or implicitly by policy) and if there’s at least on *accept*
+ verdict (be it explicitly or implicitly by policy).
+ In that, the ordering of the various base chains per hook via their priorities
+ matters (with respect to the packets utlimate fate) only in so far, if any of
+ then would modify the packet or its meta data and that has an influence on the
+ verdicts – if not, the ordering shouldn’t matter (except for performance).
+* A *drop*/*reject* verdict (including an implict one via the base chain’s
+ policy even if caused in certain cases by a *return* verdict) immediately ends
+ the evaluation of the whole ruleset and ultimately drops/rejects the packet.
+ Unlike with an *accept* verdict, no further chains of any hook and regardless
+ of their table get evaluated and it’s therefore not possible to have an
+ *drop*/*reject* verdict overturned.
+ Thus, if any base chain uses drop as it’s policy, the same base chain or any
+ regular chain directly or indirectly called by it must accept a packet or it
+ is ensured to be ultimately dropped by it.
+* A *jump* verdict causes evaluation to continue at the first rule of the
+ regular chain it calls. Called chains must be of the same table and cannot be
+ base chains.
+ If no other verdict is issued in the called chain and if all rules of that
+ have been evaluated, evaluation will continue with the next rule after the
+ calling rule of the calling chain.
+ That is, reaching the end of the called chain causes a “jump back to the
+ calling chain” respectively an implicit *return* verdict.
+ Other verdicts are processed as described above and below.
+* A *goto* verdict causes evaluation to continue at the first rule of the
+ regular chain it calls. Called chains must be of the same table and cannot be
+ base chains.
+ If no other verdict is issued in the called chain and if all rules of that
+ have been evaluated, evaluation of the current base chain and the regular
+ chains called by it end with an implicit verdict of the base chain’s policy.
+ That is, unlike with *jump*, reaching the end of the called chain does not
+ cause a “jump back to the calling chain”.
+ Other verdicts are processed as described above and below.
+* A *return* verdict’s processing depend upon in which chain it is issued.
+ In a regular chain that was called via *jump* it ends evaluation of that chain
+ and return to the calling chain as described above.
+ In a regular chain that was called via *goto* or in a base chain, the *return*
+ verdict is equivalent to the base chain’s policy.
+* All verdicts described above (that is: *accept*, *drop*, *reject*, *jump*,
+ *goto* and *return*) also end the evaluation of any later statements in their
+ respective rules (or even cause an error when loadin such rules) with the
+ exception of the `comment` statement.
+ That is, for example in `… counter accept` the `counter` statement is
+ processed, but in `… accept counter` it is not.
+
SETS
----
nftables offers two kinds of set concepts. Anonymous sets are sets that have no
--
2.51.0
next prev parent reply other threads:[~2025-09-26 2:11 UTC|newest]
Thread overview: 63+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-09-25 0:07 nft manpage/wiki issues and improvement ideas Christoph Anton Mitterer
2025-09-25 7:35 ` Pablo Neira Ayuso
2025-09-25 20:37 ` Christoph Anton Mitterer
2025-09-26 1:52 ` [PATCH 0/7] doc: miscellaneois improvements Christoph Anton Mitterer
2025-09-26 1:52 ` [PATCH 1/7] doc: clarify evaluation of chains Christoph Anton Mitterer
2025-09-26 1:52 ` [PATCH 2/7] doc: fix/improve documentation of verdicts Christoph Anton Mitterer
2025-09-30 10:50 ` Florian Westphal
2025-10-02 14:50 ` Christoph Anton Mitterer
2025-10-02 15:21 ` Florian Westphal
2025-10-10 23:06 ` Christoph Anton Mitterer
2025-09-26 1:52 ` [PATCH 3/7] doc: minor improvements with respect to the term “ruleset” Christoph Anton Mitterer
2025-09-26 1:52 ` Christoph Anton Mitterer [this message]
2025-09-30 11:50 ` [PATCH 4/7] doc: add overall description of the ruleset evaluation Florian Westphal
2025-10-10 23:07 ` Christoph Anton Mitterer
2025-09-26 1:52 ` [PATCH 5/7] doc: add some more documentation on bitmasks Christoph Anton Mitterer
2025-09-30 11:51 ` Florian Westphal
2025-09-30 11:53 ` Florian Westphal
2025-09-26 1:52 ` [PATCH 6/7] doc: describe include’s collation order to be that of the C locale Christoph Anton Mitterer
2025-09-26 1:52 ` [PATCH 7/7] doc: describe how values match sets Christoph Anton Mitterer
2025-09-26 2:32 ` nft manpage/wiki issues and improvement ideas Christoph Anton Mitterer
2025-10-11 0:23 ` [PATCH v2 0/7] doc: miscellaneous improvements Christoph Anton Mitterer
2025-10-11 0:23 ` [PATCH v2 1/7] doc: clarify evaluation of chains Christoph Anton Mitterer
2025-10-15 11:46 ` Florian Westphal
2025-10-11 0:23 ` [PATCH v2 2/7] doc: fix/improve documentation of verdicts Christoph Anton Mitterer
2025-10-15 11:42 ` Florian Westphal
2025-10-17 2:30 ` Christoph Anton Mitterer
2025-10-18 13:25 ` Florian Westphal
2025-10-19 0:11 ` Christoph Anton Mitterer
2025-10-11 0:23 ` [PATCH v2 3/7] doc: minor improvements with respect to the term “ruleset” Christoph Anton Mitterer
2025-10-15 11:51 ` Florian Westphal
2025-10-11 0:24 ` [PATCH v2 4/7] doc: add overall description of the ruleset evaluation Christoph Anton Mitterer
2025-10-20 9:39 ` Florian Westphal
2025-10-20 23:48 ` Christoph Anton Mitterer
2025-10-11 0:24 ` [PATCH v2 5/7] doc: add some more documentation on bitmasks Christoph Anton Mitterer
2025-10-18 13:32 ` Florian Westphal
2025-10-19 1:31 ` Christoph Anton Mitterer
2025-10-11 0:24 ` [PATCH v2 6/7] doc: describe include’s collation order to be that of the C locale Christoph Anton Mitterer
2025-10-18 13:35 ` Florian Westphal
2025-10-18 22:13 ` Christoph Anton Mitterer
2025-10-11 0:24 ` [PATCH v2 7/7] doc: describe how values match sets Christoph Anton Mitterer
2025-10-18 13:51 ` Florian Westphal
2025-10-19 1:50 ` Christoph Anton Mitterer
2025-10-19 1:38 ` [PATCH v3 0/6] doc: miscellaneous improvements Christoph Anton Mitterer
2025-10-19 1:38 ` [PATCH v3 1/6] doc: fix/improve documentation of verdicts Christoph Anton Mitterer
2025-10-20 9:28 ` Florian Westphal
2025-10-20 22:13 ` Christoph Anton Mitterer
2025-10-19 1:38 ` [PATCH v3 2/6] doc: minor improvements with respect to the term “ruleset” Christoph Anton Mitterer
2025-10-20 9:04 ` Florian Westphal
2025-10-19 1:38 ` [PATCH v3 3/6] doc: add overall description of the ruleset evaluation Christoph Anton Mitterer
2025-10-19 1:38 ` [PATCH v3 4/6] doc: add more documentation on bitmasks and sets Christoph Anton Mitterer
2025-10-20 9:06 ` Florian Westphal
2025-10-20 21:57 ` Christoph Anton Mitterer
2025-10-20 22:18 ` Florian Westphal
2025-10-20 23:51 ` Christoph Anton Mitterer
2025-10-19 1:38 ` [PATCH v3 5/6] doc: describe include’s collation order to be that of the C locale Christoph Anton Mitterer
2025-10-19 1:38 ` [PATCH v3 6/6] doc: minor improvements the `reject` statement Christoph Anton Mitterer
2025-10-20 23:49 ` [PATCH v4 0/5] doc: miscellaneous improvements Christoph Anton Mitterer
2025-10-20 23:49 ` [PATCH v4 1/5] doc: fix/improve documentation of verdicts Christoph Anton Mitterer
2025-10-20 23:49 ` [PATCH v4 2/5] doc: add overall description of the ruleset evaluation Christoph Anton Mitterer
2025-10-20 23:49 ` [PATCH v4 3/5] doc: add more documentation on bitmasks and sets Christoph Anton Mitterer
2025-10-20 23:49 ` [PATCH v4 4/5] doc: describe include’s collation order to be that of the C locale Christoph Anton Mitterer
2025-10-20 23:49 ` [PATCH v4 5/5] doc: minor improvements the `reject` statement Christoph Anton Mitterer
2025-10-22 14:34 ` Florian Westphal
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20250926021136.757769-5-mail@christoph.anton.mitterer.name \
--to=mail@christoph.anton.mitterer.name \
--cc=netfilter-devel@vger.kernel.org \
--cc=pablo@netfilter.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).