I mean, I we have a bad packet (smurf or bad tcpflags) attack,

for each packet it need to go to the whole chains (vmbrxxx,tapxxx,..) to match 
the nosmurf or tcpflag block rule.


just put the rule in PVEFW-FORWARD, after

-A PVEFW-FORWARD -m conntrack --ctstate INVALID -j DROP
-A PVEFW-FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT



-A PVEFW-FORWARD -m conntrack --ctstate INVALID,NEW -j PVEFW-smurfs
-A PVEFW-FORWARD -p tcp -j PVEFW-tcpflags


----- Mail original ----- 

De: "Dietmar Maurer" <diet...@proxmox.com> 
À: "Alexandre DERUMIER" <aderum...@odiso.com> 
Cc: pve-devel@pve.proxmox.com 
Envoyé: Vendredi 18 Avril 2014 09:01:43 
Objet: RE: firewall option nosmurfs and tcpflags 

> Yes, I think it's ok. It could also improve performance, for bad packets, 
> less 
> lookups in vmbr, tap chains. 

oh, how can we improve performance? 
_______________________________________________
pve-devel mailing list
pve-devel@pve.proxmox.com
http://pve.proxmox.com/cgi-bin/mailman/listinfo/pve-devel

Reply via email to