diff options
author | Bernhard Thaler <[email protected]> | 2015-05-30 15:27:40 +0200 |
---|---|---|
committer | Pablo Neira Ayuso <[email protected]> | 2015-06-12 14:08:07 +0200 |
commit | 72b31f7271df34c6aab36c01305287924826678f (patch) | |
tree | 9fb9ccc3f92d03b3eca9fa600ce508922a768b49 /tools/perf/scripts/python/event_analyzing_sample.py | |
parent | 8cae308d2bc81f95c320e7a345b92be6c238f510 (diff) |
netfilter: bridge: detect NAT66 correctly and change MAC address
IPv4 iptables allows to REDIRECT/DNAT/SNAT any traffic over a bridge.
e.g. REDIRECT
$ sysctl -w net.bridge.bridge-nf-call-iptables=1
$ iptables -t nat -A PREROUTING -p tcp -m tcp --dport 8080 \
-j REDIRECT --to-ports 81
This does not work with ip6tables on a bridge in NAT66 scenario
because the REDIRECT/DNAT/SNAT is not correctly detected.
The bridge pre-routing (finish) netfilter hook has to check for a possible
redirect and then fix the destination mac address. This allows to use the
ip6tables rules for local REDIRECT/DNAT/SNAT REDIRECT similar to the IPv4
iptables version.
e.g. REDIRECT
$ sysctl -w net.bridge.bridge-nf-call-ip6tables=1
$ ip6tables -t nat -A PREROUTING -p tcp -m tcp --dport 8080 \
-j REDIRECT --to-ports 81
This patch makes it possible to use IPv6 NAT66 on a bridge. It was tested
on a bridge with two interfaces using SNAT/DNAT NAT66 rules.
Reported-by: Artie Hamilton <[email protected]>
Signed-off-by: Sven Eckelmann <[email protected]>
[[email protected]: rebased, add indirect call to ip6_route_input()]
[[email protected]: rebased, split into separate patches]
Signed-off-by: Bernhard Thaler <[email protected]>
Signed-off-by: Pablo Neira Ayuso <[email protected]>
Diffstat (limited to 'tools/perf/scripts/python/event_analyzing_sample.py')
0 files changed, 0 insertions, 0 deletions