-
Notifications
You must be signed in to change notification settings - Fork 33
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add classes encapsulating rules for DHCPv6 client traffic (in/out) #4
Conversation
|
Maybe it makes sense to provide as well |
So is this something that you want rather to use together? I mean if you want to request dhcpv6 the out are enough, not? |
|
Thanks for the review :)
Not sure I understand your point but I think it's perhaps I didn't express correctly what I was proposing to do. I was asking if as part of this patch you'd like me to add a parameter to the class |
Ah, got you now. Yes, it's the client initiating in all cases so the packets back from the server will be accepted as things stand now because they're part of an established "connection" (quoted because it's UDP). It's corrected, the patch only contains a rule for the output chain. So yes, the only pending issue is to know if you'd like to have a parameter |
|
Uhm, not convinced. The initial packet from the client is sent to the multicast addr |
|
I've reintroduced the input rule class and a parameter |
|
Our idea with the parameters for the nftables class is, that you should be able to get a as locked down as possible host by including the nftables class. Now, what you need always from our view, is putgoing dns resolution, yum repos (thus https) and ntp, as well as incoming ssh. This is what we defined as our standard baseline. |
|
Makes total sense. I've removed the commit adding the parameter. Next time you're in Genf beers are on me :) |
26fd444
to
a232a87
Compare
|
Happy to do |
Question: I understand you (and dhcpv6) correctly, that you will always need both (in&out) so that a host is able to do dhcpv6, right? So I would propose to merge them together to one class (e.g. Sorry for the back and forth and thank you a lot for the contribution! The module is quite fresh and thus not everything is yet settled how it should be. |
Yes, however one might be setting
No worries at all, patches should be discussed and agreed 👍 |
Good point, let's keep the classes separate, but then let's add one that combines the two, then we have all use-cases simplified. |
I've renamed Since rules in |
Yeah, that was also not clear to me. But maybe it would also be ok, to have a class param for that low-level option? I mean |
Makes sense. It's implemented. |
|
Thank you! |
0cf43fd Merge pull request voxpupuli#4 from cernops/dhcp6 37b2a3b Add class nftables::services::dhcpv6_client 883389d Merge pull request voxpupuli#5 from cernops/custom_log_prefix 4356626 Add rules for outgoing and incoming DHCPv6 client traffic ed82738 Allow customising the log prefix 317b8d0 Merge pull request voxpupuli#3 from cernops/ai5973 20b9636 Add support for named sets e4c3222 Use concat for table conf generation 18ec6f4 Fix rulenames which includes an index e5eb742 Allow to specify prometheus source addresses e73f2e9 Fix rule node exporter 8227cb1 Manage rule in dns cb50fd7 Add rule in node_exporter e105f14 Include table ip6 nat 248ef9d Add basic ip6 nat chains 579e27d Fix the regex for bridge names 2c00d76 Replace dashes with underlines git-subtree-dir: code git-subtree-split: 0cf43fd
No description provided.