On Dec 30, 2013 7:31 PM, "shawn wilson" <ag4ve...@gmail.com> wrote:
>
> Minor additions to what Pandu said...
>
> On Mon, Dec 30, 2013 at 7:02 AM, Pandu Poluan <pa...@poluan.info> wrote:
> > On Mon, Dec 30, 2013 at 6:07 PM, Tanstaafl <tansta...@libertytrek.org>
wrote:
>
> > The numbers within [brackets] are statistics/countes. Just replace
> > them with [0:0], unless you really really really have a good reason to
> > not start counting from 0...
> >
>
> AFAIK, there's no reason this shouldn't alway be set to 0. If you want
> to keep your counter do --noflush
>
> > NOTE: In that ServerFault posting, I suggested using the anti-attack
> > rules in -t raw -A PREROUTING. This saves a great deal of processing,
> > becase the "raw" table is just that: raw, unadulterated, unanalyzed
> > packets. The CPU assumes nothing, it merely tries to match well-known
> > fields' values.
> >
>
> And because nothing is assumed, you can't prepend a conntrack rule. I
> can't think of why you'd ever want those packets (and I should
> probably move at least those 4 masks to raw) but just an FYI - no
> processing means no processing.
>
> Also see nftables: http://netfilter.org/projects/nftables/
>

Very interesting... were they aiming for something similar to *BSD's pf
firewall?

I personally prefer iptables-style firewall; no guessing about how a state
machine will respond in strange situations. Especially since I greatly
leverage ipset and '-m condition' (part of xtables-addons), which might or
might not be fully supported by nftables.

Rgds,
--

Reply via email to