kernel-fxtec-pro1x/net/ipv4/netfilter
Andrew Collins c65ef8dc7b netfilter: nf_nat: Also handle non-ESTABLISHED routing changes in MASQUERADE
Since (a0ecb85 netfilter: nf_nat: Handle routing changes in MASQUERADE
target), the MASQUERADE target handles routing changes which affect
the output interface of a connection, but only for ESTABLISHED
connections.  It is also possible for NEW connections which
already have a conntrack entry to be affected by routing changes.

This adds a check to drop entries in the NEW+conntrack state
when the oif has changed.

Signed-off-by: Andrew Collins <bsderandrew@gmail.com>
Acked-by: Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
2012-12-16 23:28:30 +01:00
..
arp_tables.c
arpt_mangle.c
arptable_filter.c
ip_tables.c
ipt_ah.c
ipt_CLUSTERIP.c
ipt_ECN.c
ipt_MASQUERADE.c
ipt_REJECT.c
ipt_rpfilter.c
ipt_ULOG.c
iptable_filter.c
iptable_mangle.c
iptable_nat.c netfilter: nf_nat: Also handle non-ESTABLISHED routing changes in MASQUERADE 2012-12-16 23:28:30 +01:00
iptable_raw.c
iptable_security.c
Kconfig
Makefile
nf_conntrack_l3proto_ipv4.c
nf_conntrack_l3proto_ipv4_compat.c
nf_conntrack_proto_icmp.c
nf_defrag_ipv4.c
nf_nat_h323.c
nf_nat_l3proto_ipv4.c
nf_nat_pptp.c
nf_nat_proto_gre.c
nf_nat_proto_icmp.c
nf_nat_snmp_basic.c