* [PATCHv2] suricata: Do not create silly forward rules.
@ 2022-04-06 19:23 Stefan Schantl
2022-04-07 8:55 ` Michael Tremer
0 siblings, 1 reply; 3+ messages in thread
From: Stefan Schantl @ 2022-04-06 19:23 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 896 bytes --]
Skip creating forward rules if the input and the output device are the
same.
Signed-off-by: Stefan Schantl <stefan.schantl(a)ipfire.org>
---
src/initscripts/system/suricata | 5 +++++
1 file changed, 5 insertions(+)
diff --git a/src/initscripts/system/suricata b/src/initscripts/system/suricata
index 5ede405ce..79c105c23 100644
--- a/src/initscripts/system/suricata
+++ b/src/initscripts/system/suricata
@@ -171,6 +171,11 @@ function generate_fw_rules {
# Create rules which are required to handle forwarded traffic.
for enabled_ips_zone_forward in "${enabled_ips_zones[@]}"; do
+ # Skip loop iteration if both zones are the same.
+ if [ "$enabled_ips_zone" == "$enabled_ips_zone_forward" ]; then
+ continue
+ fi
+
# Check if the whetelist file is not empty.
if [ -s "$WHITELIST_FILE" ]; then
# Create rules to handle whitelisted hosts.
--
2.30.2
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [PATCHv2] suricata: Do not create silly forward rules.
2022-04-06 19:23 [PATCHv2] suricata: Do not create silly forward rules Stefan Schantl
@ 2022-04-07 8:55 ` Michael Tremer
2022-05-06 16:30 ` Stefan Schantl
0 siblings, 1 reply; 3+ messages in thread
From: Michael Tremer @ 2022-04-07 8:55 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 1103 bytes --]
Why do you think these rules are not needed?
> On 6 Apr 2022, at 20:23, Stefan Schantl <stefan.schantl(a)ipfire.org> wrote:
>
> Skip creating forward rules if the input and the output device are the
> same.
>
> Signed-off-by: Stefan Schantl <stefan.schantl(a)ipfire.org>
> ---
> src/initscripts/system/suricata | 5 +++++
> 1 file changed, 5 insertions(+)
>
> diff --git a/src/initscripts/system/suricata b/src/initscripts/system/suricata
> index 5ede405ce..79c105c23 100644
> --- a/src/initscripts/system/suricata
> +++ b/src/initscripts/system/suricata
> @@ -171,6 +171,11 @@ function generate_fw_rules {
>
> # Create rules which are required to handle forwarded traffic.
> for enabled_ips_zone_forward in "${enabled_ips_zones[@]}"; do
> + # Skip loop iteration if both zones are the same.
> + if [ "$enabled_ips_zone" == "$enabled_ips_zone_forward" ]; then
> + continue
> + fi
> +
> # Check if the whetelist file is not empty.
> if [ -s "$WHITELIST_FILE" ]; then
> # Create rules to handle whitelisted hosts.
> --
> 2.30.2
>
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [PATCHv2] suricata: Do not create silly forward rules.
2022-04-07 8:55 ` Michael Tremer
@ 2022-05-06 16:30 ` Stefan Schantl
0 siblings, 0 replies; 3+ messages in thread
From: Stefan Schantl @ 2022-05-06 16:30 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 2300 bytes --]
For the records,
I had a short talk with Michael on the phone about that topic.
My intension of the patch was, if there are no packets which have the
same input and output device, these rules are not needed.
He answered that there are some reasons, why this could happened. In
case you are using DNAT, SNAT or some kind of asynchronous routing etc.
So the iptables rules are required to pass such traffic to the IDS/IPS
and the patch can be ignored.
Best regards,
-Stefan
> Why do you think these rules are not needed?
>
> > On 6 Apr 2022, at 20:23, Stefan Schantl <stefan.schantl(a)ipfire.org>
> > wrote:
> >
> > Skip creating forward rules if the input and the output device are
> > the
> > same.
> >
> > Signed-off-by: Stefan Schantl <stefan.schantl(a)ipfire.org>
> > ---
> > src/initscripts/system/suricata | 5 +++++
> > 1 file changed, 5 insertions(+)
> >
> > diff --git a/src/initscripts/system/suricata
> > b/src/initscripts/system/suricata
> > index 5ede405ce..79c105c23 100644
> > --- a/src/initscripts/system/suricata
> > +++ b/src/initscripts/system/suricata
> > @@ -171,6 +171,11 @@ function generate_fw_rules {
> >
> > # Create rules which are required to handle
> > forwarded traffic.
> > for enabled_ips_zone_forward in
> > "${enabled_ips_zones[@]}"; do
> > + # Skip loop iteration if both zones
> > are the same.
> > + if [ "$enabled_ips_zone" ==
> > "$enabled_ips_zone_forward" ]; then
> > + continue
> > + fi
> > +
> > # Check if the whetelist file is
> > not empty.
> > if [ -s "$WHITELIST_FILE" ]; then
> > # Create rules to handle
> > whitelisted hosts.
> > --
> > 2.30.2
> >
>
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2022-05-06 16:30 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-04-06 19:23 [PATCHv2] suricata: Do not create silly forward rules Stefan Schantl
2022-04-07 8:55 ` Michael Tremer
2022-05-06 16:30 ` Stefan Schantl
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox