Hello Arne, > On 18 Feb 2022, at 06:57, Arne Fitzenreiter wrote: > > Hi Peter, > > i ack that this fixes the empty loglines but i have seen an other problem with dropping all "invalid" packets. > The ICMP reject messages if something is not allowed has --ctstate INVALID and should processed. No this is correct. Peter’s patches are not changing this behaviour. We have been dropping those packets since forever. Peter’s patches only add that we log them now which might be helpful finding any networking problems. > Also i miss a switch to disable the logging. Why? -Michael > Arne > > > Am 2022-02-17 21:16, schrieb Peter Müller: >> Fixes: #12778 >> Signed-off-by: Peter Müller >> --- >> src/initscripts/system/firewall | 6 +++++- >> 1 file changed, 5 insertions(+), 1 deletion(-) >> diff --git a/src/initscripts/system/firewall b/src/initscripts/system/firewall >> index fc355cd5d..2f4b4e30e 100644 >> --- a/src/initscripts/system/firewall >> +++ b/src/initscripts/system/firewall >> @@ -119,9 +119,13 @@ iptables_init() { >> iptables -A FORWARD -p tcp -j BADTCP >> # Connection tracking chains >> + iptables -N CTINVALID >> + iptables -A CTINVALID -m limit --limit 10/second -j LOG >> --log-prefix "DROP_CTINVALID " >> + iptables -A CTINVALID -j DROP -m comment --comment "DROP_CTINVALID" >> + >> iptables -N CONNTRACK >> iptables -A CONNTRACK -m conntrack --ctstate ESTABLISHED -j ACCEPT >> - iptables -A CONNTRACK -m conntrack --ctstate INVALID -j LOG_DROP >> + iptables -A CONNTRACK -m conntrack --ctstate INVALID -j CTINVALID >> iptables -A CONNTRACK -p icmp -m conntrack --ctstate RELATED -j ACCEPT >> # Restore any connection marks