From mboxrd@z Thu Jan 1 00:00:00 1970 From: Pablo Neira Ayuso Subject: Re: [PATCH] NETFILTER module xt_hmark new target for HASH MARK Date: Thu, 03 Feb 2011 17:08:37 +0100 Message-ID: <4D4AD305.2060505@netfilter.org> References: <1296740050-6311-1-git-send-email-hans.schillstrom@ericsson.com> <1296740050-6311-2-git-send-email-hans.schillstrom@ericsson.com> <4D4AB2D6.7070302@netfilter.org> <1296742995.6662.57.camel@seasc0214> <4D4ACCCB.8030902@netfilter.org> <4D4AD157.50707@netfilter.org> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Cc: Hans Schillstrom , "kaber@trash.net" , "netfilter-devel@vger.kernel.org" , "netdev@vger.kernel.org" , "hans@schillstrom.com" To: Jan Engelhardt Return-path: In-Reply-To: Sender: netdev-owner@vger.kernel.org List-Id: netfilter-devel.vger.kernel.org On 03/02/11 17:06, Jan Engelhardt wrote: > On Thursday 2011-02-03 17:01, Pablo Neira Ayuso wrote: > >> On 03/02/11 16:42, Pablo Neira Ayuso wrote: >>> On 03/02/11 15:23, Hans Schillstrom wrote: >>>> On Thu, 2011-02-03 at 14:51 +0100, Pablo Neira Ayuso wrote: >>>>> On 03/02/11 14:34, Hans Schillstrom wrote: >>>>> this assumption is not valid in NAT handlings. >>>> >>>> That's true, because I want to avoid conntrack >>>> >>>>> If you want consistent hashing with NAT handlings you'll have to make >>>>> this stateful and use the conntrack source and reply directions of the >>>>> original tuples (thus making it stateful). That may be a problem because >>>>> some people may want to use this without enabling connection tracking. >>>> >>>> What about a compilation switch or a sysctl ? >>> >>> or better some option for iptables. >> >> Hm, this is actually not straight forward to implement, you'll have to >> use hook functions to avoid the module dependencies with conntrack and >> that's pretty annoying. >> >> I don't come up with a good solution for this. > > If it loads conntrack always, there is the option to shovel it > into xt_connmark.c. the problem is that Hans wants this not to depend on conntrack always.