1
0
mirror of https://gitlab.com/libvirt/libvirt.git synced 2024-12-22 17:34:18 +03:00
libvirt/tests/nwfilterxml2firewalldata/target2-linux.args
Daniel P. Berrangé 2a95dbd03c nwfilter: drop support for legacy iptables conntrack direction
Long ago we adapted to Linux kernel changes which inverted the
behaviour of the conntrack --ctdir setting:

  commit a6a04ea47a
  Author: Stefan Berger <stefanb@us.ibm.com>
  Date:   Wed May 15 21:02:11 2013 -0400

    nwfilter: check for inverted ctdir

    Linux netfilter at some point (Linux 2.6.39) inverted the meaning of the
    '--ctdir reply' and newer netfilter implementations now expect
    '--ctdir original' instead and vice-versa.
    We check for the kernel version and assume that all Linux kernels with version
    2.6.39 have the newer inverted logic.

    Any distro backporting the Linux kernel patch that inverts the --ctdir logic
    (Linux commit 96120d86f) must also backport this patch for Linux and
    adapt the kernel version being tested for.

    Signed-off-by: Stefan Berger <stefanb@linux.vnet.ibm.com>

Given our supported platform targets, we no longer need to
consider a version of Linux before 2.6.39, so can drop
support for the old direction behaviour.

The test suite updates are triggered because that never
probed for the ctdir direction, and so the iptables syntax
generator unconditionally dropped the ctdir args.

Reviewed-by: Laine Stump <laine@redhat.com>
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
2022-03-09 11:37:32 +00:00

79 lines
877 B
Plaintext

iptables \
-w \
-A FP-vnet0 \
-p tcp \
--dport 22 \
-j ACCEPT
iptables \
-w \
-A FJ-vnet0 \
-p tcp \
--sport 22 \
-j RETURN
iptables \
-w \
-A HJ-vnet0 \
-p tcp \
--sport 22 \
-j RETURN
iptables \
-w \
-A FJ-vnet0 \
-p tcp \
--sport 80 \
-m conntrack \
--ctstate ESTABLISHED \
-m conntrack \
--ctdir Reply \
-j RETURN
iptables \
-w \
-A FP-vnet0 \
-p tcp \
--dport 80 \
-m conntrack \
--ctstate NEW,ESTABLISHED \
-m conntrack \
--ctdir Original \
-j ACCEPT
iptables \
-w \
-A HJ-vnet0 \
-p tcp \
--sport 80 \
-m conntrack \
--ctstate ESTABLISHED \
-m conntrack \
--ctdir Reply \
-j RETURN
iptables \
-w \
-A FJ-vnet0 \
-p tcp \
-j REJECT
iptables \
-w \
-A FP-vnet0 \
-p tcp \
-j REJECT
iptables \
-w \
-A HJ-vnet0 \
-p tcp \
-j REJECT
iptables \
-w \
-A FJ-vnet0 \
-p all \
-j DROP
iptables \
-w \
-A FP-vnet0 \
-p all \
-j DROP
iptables \
-w \
-A HJ-vnet0 \
-p all \
-j DROP