From: Pablo Neira Ayuso <pablo@netfilter.org>
To: Patrick McHardy <kaber@trash.net>
Cc: Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>,
netfilter-devel@vger.kernel.org
Subject: Re: [PATCH 2/3] netfilter: xtables: add PKTTYPE target
Date: Wed, 11 Feb 2009 15:51:25 +0100 [thread overview]
Message-ID: <4992E5ED.70607@netfilter.org> (raw)
In-Reply-To: <4992E219.2090409@trash.net>
Patrick McHardy wrote:
> Pablo Neira Ayuso wrote:
>> Patrick McHardy wrote:
>>> Pablo Neira Ayuso wrote:
>>>> Patrick McHardy wrote:
>>>>> Jozsef Kadlecsik wrote:
>>>>>> On Tue, 10 Feb 2009, Patrick McHardy wrote:
>>>>>>
>>>>>>> Yes, I know, I'm just wondering why you're using TCP at all for
>>>>>>> synchronizing. Its not for traffic from the Internet I assume
>>>>>>> since the node it ends up on is unknown to the outside anyways.
>>>>>> No, that's not the syncronizing traffic, but the "normal" TCP traffic
>>>>>> to be filtered by the firewalls, which have got multicast MAC
>>>>>> addresses on their interfaces.
>>>>> Multicast traffic is accepted for forwarding just fine, its just
>>>>> local TCP delivery thats refusing it. So it can't be forwarded
>>>>> traffic.
>>>> You usually have some administration facility (like ssh) that would
>>>> break. Please, think that this can be also used to replace CLUSTERIP
>>>> (to
>>>> be used in back-end servers, not only stateful firewalls).
>>> I see. Still, this module has only one purpose, which is to circumvent
>>> valid checks to make a different hack (although a nicer one) work.
>>> Perhaps simply move it into the cluster match (yes yes, I know). That
>>> way we can also avoid a bit of the new-module overhead.
>>
>> Then, the cluster match would become the target match, since skbuff
>> cannot be modified from matches (they are passed as const). Becoming a
>> target means less flexibility :(
>
> Well, a cast should "fix" that :) But feel free to suggest a
> better method that doesn't need to expose this as a standalone
> feature.
Hm, I forgot another point that is the fact that the PKTTYPE target is
not always required. Actually, if the switch can flood the same packets
to a set of nodes that are part of the cluster via "port mirroring" or
if the switch interprets the VRRP reserved MAC address range correctly
(I did not find any yet), the nodes in the cluster would not need to use
with a multicast MAC address, in that case, the PKTTYPE target would not
be required.
Well, I'll do the hackish solution if that relieves the possible extra
bloat of one target that indeed only has this purpose ;). I'll send you
a new version of the patch asap.
--
"Los honestos son inadaptados sociales" -- Les Luthiers
next prev parent reply other threads:[~2009-02-11 14:51 UTC|newest]
Thread overview: 24+ messages / expand[flat|nested] mbox.gz Atom feed top
2009-01-28 14:58 [PATCH 1/3] netfilter: arptables: add mcmangle target Pablo Neira Ayuso
2009-01-28 14:58 ` [PATCH 2/3] netfilter: xtables: add PKTTYPE target Pablo Neira Ayuso
2009-01-28 16:11 ` Jan Engelhardt
2009-01-28 16:51 ` Pablo Neira Ayuso
2009-02-09 15:13 ` Patrick McHardy
2009-02-09 23:15 ` Pablo Neira Ayuso
2009-02-10 14:03 ` Patrick McHardy
2009-02-10 14:18 ` Jozsef Kadlecsik
2009-02-10 14:22 ` Patrick McHardy
2009-02-10 18:12 ` Pablo Neira Ayuso
2009-02-11 12:26 ` Patrick McHardy
2009-02-11 14:19 ` Pablo Neira Ayuso
2009-02-11 14:35 ` Patrick McHardy
2009-02-11 14:51 ` Pablo Neira Ayuso [this message]
2009-02-11 14:54 ` Patrick McHardy
2009-01-28 14:58 ` [PATCH 3/3] netfilter: xtables: add cluster match Pablo Neira Ayuso
2009-01-28 16:07 ` Jan Engelhardt
2009-01-28 16:38 ` Pablo Neira Ayuso
2009-02-09 15:25 ` Patrick McHardy
2009-02-09 23:23 ` Pablo Neira Ayuso
2009-02-09 15:11 ` [PATCH 1/3] netfilter: arptables: add mcmangle target Patrick McHardy
2009-02-09 23:13 ` Pablo Neira Ayuso
2009-02-10 11:16 ` Pablo Neira Ayuso
-- strict thread matches above, loose matches on Subject: below --
2009-02-06 7:41 Pablo Neira Ayuso
2009-02-06 7:42 ` [PATCH 2/3] netfilter: xtables: add PKTTYPE target Pablo Neira Ayuso
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4992E5ED.70607@netfilter.org \
--to=pablo@netfilter.org \
--cc=kaber@trash.net \
--cc=kadlec@blackhole.kfki.hu \
--cc=netfilter-devel@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).