Skip to content

Conversation

@brada4
Copy link

@brada4 brada4 commented May 11, 2025

Flush conntrack if fw4 is started with fw4 table absent
Approximates fw3 ct flush when no iptables rules are present
Prevents (deletes) eternal ghost states created at early boot.
Also treat flush action called stopping the service, emulate 'destroy table' to to stay v23 compatible

Signed-off-by: Andris PE neandris@gmail.com

Flush conntrack if fw4 is started with fw4 table absent

Approximates fw3 ct flush when no iptables rules are present

Prevents (deletes) eternal ghost states created at early boot.

Signed-off-by: Andris PE <neandris@gmail.com>
@brada4
Copy link
Author

brada4 commented May 11, 2025

Raised here first
https://forum.openwrt.org/t/firewall-control-over-established-sessions/228684
Request to fully document nft table create upstream
https://bugzilla.netfilter.org/show_bug.cgi?id=1800
Alternative would be to create and add test chain which fails in absence of parent table

Limit flush (called from service stop action) to our own table and
discard conntrack as in fw3

Signed-off-by: Andris PE <neandris@gmail.com>
@brada4 brada4 marked this pull request as draft June 19, 2025 11:28
@brada4
Copy link
Author

brada4 commented Jun 19, 2025

Changed to draft, got better (performant) idea in works not needeing echo f kernel patch.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant