[Firehol-support] Disable ip_conntrack table
Costa Tsaousis
costa at tsaousis.gr
Mon Dec 17 20:12:59 GMT 2007
Costa Tsaousis wrote:
> From the iptables manual:
>
> raw:
> This table is used mainly for configuring exemptions from connection
> tracking in combination with the NOTRACK target. It registers at the
> netfilter hooks with higher priority and is thus called before
> ip_conntrack, or any other IP tables. It provides the following
> built-in chains: PREROUTING (for packets arriving via any network
> interface) OUTPUT (for packets generated by local processes).
>
> Give it a try by appending these commands to firehol.conf:
>
> ---
>
> # make sure we route traffic without without state information
> # this means that routers in firehol.conf are just disabled.
> iptables -t filter -I FORWARD -j ACCEPT
>
> # create a new chain
> # we need this in order to write rules to exclude local traffic from NOTRACK
> iptables -t raw -N notracking
>
> # redirect all traffic to the new chain
> iptables -t raw -A PREROUTING -j notracking
>
> # exclude all traffic coming in from eth0 and going to the local machine
> iptables -t raw -A notracking -i eth0 -d the.ip.of.this.host.on.eth0 -j
> RETURN
> iptables -t raw -A notracking -i eth0 -d the.broadcast.ip.of.eth0 -j RETURN
>
> # exclude all traffic coming in from eth1 and going to the local machine
> iptables -t raw -A notracking -i eth1 -d the.ip.of.this.host.on.eth1 -j
> RETURN
> iptables -t raw -A notracking -i eth1 -d the.broadcast.ip.of.eth1 -j RETURN
>
> # exclude the generic broadcast address
> iptables -t raw -A notracking -d 255.255.255.255 -j RETURN
>
> # exclude multicast targets
> iptables -t raw -A notracking -d 224.0.0.0/8 -j RETURN
> iptables -t raw -A notracking -d 239.0.0.0/8 -j RETURN
>
> # if the traffic reaches this point, it is routed traffic - disable the
> connection tracker
> iptables -t raw -A notracking -j NOTRACK
>
> ---
>
> Of course replace the names of the IPs above, with your real IPs.
> To see the generated list, and how it matches traffic, run this:
>
> iptables -t raw -nxvL
>
> You should see that the RETURN rules match some traffic, and that the
> NOTRACK rule at the end matches traffic too.
>
> When you start it, give it some time for the connection tracking list to
> shrink (the connections already in the connection tracker list will,
> most probably, not just disappear - only the new ones will not be
> written to the list - so the existing connections will have to
> close/timeout to be removed from the list).
>
> Please let us know if it works.
>
> Costa
>
Hm! You may need to set this in your kernel config:
CONFIG_NETFILTER_XT_TARGET_NOTRACK
Costa
More information about the Firehol-support
mailing list