netfilter-devel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Christoph Anton Mitterer <mail@christoph.anton.mitterer.name>
To: netfilter-devel@vger.kernel.org
Cc: Pablo Neira Ayuso <pablo@netfilter.org>
Subject: [PATCH 4/7] doc: add overall description of the ruleset evaluation
Date: Fri, 26 Sep 2025 03:52:46 +0200	[thread overview]
Message-ID: <20250926021136.757769-5-mail@christoph.anton.mitterer.name> (raw)
In-Reply-To: <20250926021136.757769-1-mail@christoph.anton.mitterer.name>

Signed-off-by: Christoph Anton Mitterer <mail@christoph.anton.mitterer.name>
---
 doc/nft.txt | 79 +++++++++++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 79 insertions(+)

diff --git a/doc/nft.txt b/doc/nft.txt
index f52b7fef..4bbb6b56 100644
--- a/doc/nft.txt
+++ b/doc/nft.txt
@@ -560,6 +560,85 @@ table inet filter {
 nft delete rule inet filter input handle 5
 -------------------------
 
+OVERALL EVALUATION OF THE RULESET
+---------------------------------
+This is a summary of how the ruleset is evaluated.
+
+* Even if a packet is accepted by the ruleset (and thus by netfilter), it may
+  still get discarded by other means, for example Linux generally ignores
+  various ICMP types and are sysctl options lik
+  `net.ipv{4,6}.conf.*.forwarding` or `net.ipv4.conf.*.rp_filter`.
+* With respect to the evaluation tables don’t matter at all and are not known by
+  netfilter.
+  They’re merely used to structure the ruleset.
+* Packets traverse the network stack and at various hooks they’re evaluated by
+  any base chains attached to these hooks.
+* Base chains may call regular chains and regular chains may call other regular
+  chains (via *jump* or *goto* verdicts), in which case evaluation continues in
+  the called chain.
+  Base chains themsevlves cannot be called and only chains of the same table can
+  be called.
+* For each hook, the attached chains are evaluated in order of their priorities
+  (with chains with lower priority values being evaluated before those with
+  higher values and the order of chains with the same value being undefined).
+* An *accept* verdict (including an implict one via the base chain’s policy,
+  even if caused in certain cases by a *return* verdict) ends the evaluation of
+  the current base chain and any regular chains called from that.
+  It accepts the packet only with respect to the current base chain, which does
+  not mean that the packet is ultimately accepted.
+  Any other base chain (or regular chain called by such) with a higher priority
+  of the same hook as well as any other base chain (or regular chain called by
+  such) of any later hook may still utlimately *deny*/*reject* the packet with
+  an according verdict (with consequences as described below for
+  *deny*/*reject*).
+  Thus and merely from netfilter’s point of view, a packet is only accepted if
+  none of the chains (regardless of their tables) that are attached to any of
+  the respectively relevant hooks issues a *deny*/*reject* verdict (be it
+  explicitly or implicitly by policy) and if there’s at least on *accept*
+  verdict (be it explicitly or implicitly by policy).
+  In that, the ordering	of the various base chains per hook via their priorities
+  matters (with respect to the packets utlimate fate) only in so far, if any of
+  then would modify the packet or its meta data and that has an influence on the
+  verdicts – if not, the ordering shouldn’t matter (except for performance).
+* A *drop*/*reject* verdict (including an implict one via the base chain’s
+  policy even if caused in certain cases by a *return* verdict) immediately ends
+  the evaluation of the whole ruleset and ultimately drops/rejects the packet.
+  Unlike with an *accept* verdict, no further chains of any hook and regardless
+  of their table get evaluated and it’s therefore not possible to have an
+  *drop*/*reject* verdict overturned.
+  Thus, if any base chain uses drop as it’s policy, the same base chain or any
+  regular chain directly or indirectly called by it must accept a packet or it
+  is ensured to be ultimately dropped by it.
+* A *jump* verdict causes evaluation to continue at the first rule of the
+  regular chain it calls. Called chains must be of the same table and cannot be
+  base chains.
+  If no other verdict is issued in the called chain and if all rules of that
+  have been evaluated, evaluation will continue with the next rule after the
+  calling rule of the calling chain.
+  That is, reaching the end of the called chain causes a “jump back to the
+  calling chain” respectively an implicit *return* verdict.
+  Other verdicts are processed as described above and below.
+* A *goto* verdict causes evaluation to continue at the first rule of the
+  regular chain it calls. Called chains must be of the same table and cannot be
+  base chains.
+  If no other verdict is issued in the called chain and if all rules of that
+  have been evaluated, evaluation of the current base chain and the regular
+  chains called by it end with an implicit verdict of the base chain’s policy.
+  That is, unlike with *jump*, reaching the end of the called chain does not
+  cause a “jump back to the calling chain”.
+  Other verdicts are processed as described above and below.
+* A *return* verdict’s processing depend upon in which chain it is issued.
+  In a regular chain that was called via *jump* it ends evaluation of that chain
+  and return to the calling chain as described above.
+  In a regular chain that was called via *goto* or in a base chain, the *return*
+  verdict is equivalent to the base chain’s policy.
+* All verdicts described above (that is: *accept*, *drop*, *reject*, *jump*,
+  *goto* and *return*) also end the evaluation of any later statements in their
+  respective rules (or even cause an error when loadin such rules) with the
+  exception of the `comment` statement.
+  That is, for example in `… counter accept` the `counter` statement is
+  processed, but in `… accept counter` it is not.
+
 SETS
 ----
 nftables offers two kinds of set concepts. Anonymous sets are sets that have no
-- 
2.51.0


  parent reply	other threads:[~2025-09-26  2:11 UTC|newest]

Thread overview: 63+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-09-25  0:07 nft manpage/wiki issues and improvement ideas Christoph Anton Mitterer
2025-09-25  7:35 ` Pablo Neira Ayuso
2025-09-25 20:37   ` Christoph Anton Mitterer
2025-09-26  1:52   ` [PATCH 0/7] doc: miscellaneois improvements Christoph Anton Mitterer
2025-09-26  1:52     ` [PATCH 1/7] doc: clarify evaluation of chains Christoph Anton Mitterer
2025-09-26  1:52     ` [PATCH 2/7] doc: fix/improve documentation of verdicts Christoph Anton Mitterer
2025-09-30 10:50       ` Florian Westphal
2025-10-02 14:50         ` Christoph Anton Mitterer
2025-10-02 15:21           ` Florian Westphal
2025-10-10 23:06             ` Christoph Anton Mitterer
2025-09-26  1:52     ` [PATCH 3/7] doc: minor improvements with respect to the term “ruleset” Christoph Anton Mitterer
2025-09-26  1:52     ` Christoph Anton Mitterer [this message]
2025-09-30 11:50       ` [PATCH 4/7] doc: add overall description of the ruleset evaluation Florian Westphal
2025-10-10 23:07         ` Christoph Anton Mitterer
2025-09-26  1:52     ` [PATCH 5/7] doc: add some more documentation on bitmasks Christoph Anton Mitterer
2025-09-30 11:51       ` Florian Westphal
2025-09-30 11:53         ` Florian Westphal
2025-09-26  1:52     ` [PATCH 6/7] doc: describe include’s collation order to be that of the C locale Christoph Anton Mitterer
2025-09-26  1:52     ` [PATCH 7/7] doc: describe how values match sets Christoph Anton Mitterer
2025-09-26  2:32   ` nft manpage/wiki issues and improvement ideas Christoph Anton Mitterer
2025-10-11  0:23 ` [PATCH v2 0/7] doc: miscellaneous improvements Christoph Anton Mitterer
2025-10-11  0:23   ` [PATCH v2 1/7] doc: clarify evaluation of chains Christoph Anton Mitterer
2025-10-15 11:46     ` Florian Westphal
2025-10-11  0:23   ` [PATCH v2 2/7] doc: fix/improve documentation of verdicts Christoph Anton Mitterer
2025-10-15 11:42     ` Florian Westphal
2025-10-17  2:30       ` Christoph Anton Mitterer
2025-10-18 13:25         ` Florian Westphal
2025-10-19  0:11           ` Christoph Anton Mitterer
2025-10-11  0:23   ` [PATCH v2 3/7] doc: minor improvements with respect to the term “ruleset” Christoph Anton Mitterer
2025-10-15 11:51     ` Florian Westphal
2025-10-11  0:24   ` [PATCH v2 4/7] doc: add overall description of the ruleset evaluation Christoph Anton Mitterer
2025-10-20  9:39     ` Florian Westphal
2025-10-20 23:48       ` Christoph Anton Mitterer
2025-10-11  0:24   ` [PATCH v2 5/7] doc: add some more documentation on bitmasks Christoph Anton Mitterer
2025-10-18 13:32     ` Florian Westphal
2025-10-19  1:31       ` Christoph Anton Mitterer
2025-10-11  0:24   ` [PATCH v2 6/7] doc: describe include’s collation order to be that of the C locale Christoph Anton Mitterer
2025-10-18 13:35     ` Florian Westphal
2025-10-18 22:13       ` Christoph Anton Mitterer
2025-10-11  0:24   ` [PATCH v2 7/7] doc: describe how values match sets Christoph Anton Mitterer
2025-10-18 13:51     ` Florian Westphal
2025-10-19  1:50       ` Christoph Anton Mitterer
2025-10-19  1:38 ` [PATCH v3 0/6] doc: miscellaneous improvements Christoph Anton Mitterer
2025-10-19  1:38   ` [PATCH v3 1/6] doc: fix/improve documentation of verdicts Christoph Anton Mitterer
2025-10-20  9:28     ` Florian Westphal
2025-10-20 22:13       ` Christoph Anton Mitterer
2025-10-19  1:38   ` [PATCH v3 2/6] doc: minor improvements with respect to the term “ruleset” Christoph Anton Mitterer
2025-10-20  9:04     ` Florian Westphal
2025-10-19  1:38   ` [PATCH v3 3/6] doc: add overall description of the ruleset evaluation Christoph Anton Mitterer
2025-10-19  1:38   ` [PATCH v3 4/6] doc: add more documentation on bitmasks and sets Christoph Anton Mitterer
2025-10-20  9:06     ` Florian Westphal
2025-10-20 21:57       ` Christoph Anton Mitterer
2025-10-20 22:18         ` Florian Westphal
2025-10-20 23:51           ` Christoph Anton Mitterer
2025-10-19  1:38   ` [PATCH v3 5/6] doc: describe include’s collation order to be that of the C locale Christoph Anton Mitterer
2025-10-19  1:38   ` [PATCH v3 6/6] doc: minor improvements the `reject` statement Christoph Anton Mitterer
2025-10-20 23:49 ` [PATCH v4 0/5] doc: miscellaneous improvements Christoph Anton Mitterer
2025-10-20 23:49   ` [PATCH v4 1/5] doc: fix/improve documentation of verdicts Christoph Anton Mitterer
2025-10-20 23:49   ` [PATCH v4 2/5] doc: add overall description of the ruleset evaluation Christoph Anton Mitterer
2025-10-20 23:49   ` [PATCH v4 3/5] doc: add more documentation on bitmasks and sets Christoph Anton Mitterer
2025-10-20 23:49   ` [PATCH v4 4/5] doc: describe include’s collation order to be that of the C locale Christoph Anton Mitterer
2025-10-20 23:49   ` [PATCH v4 5/5] doc: minor improvements the `reject` statement Christoph Anton Mitterer
2025-10-22 14:34     ` Florian Westphal

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20250926021136.757769-5-mail@christoph.anton.mitterer.name \
    --to=mail@christoph.anton.mitterer.name \
    --cc=netfilter-devel@vger.kernel.org \
    --cc=pablo@netfilter.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).