Skip to content
Commit 8b83bc77 authored by Harald Welte's avatar Harald Welte Committed by Linus Torvalds
Browse files

[PATCH] don't try to do any NAT on untracked connections



With the introduction of 'rustynat' in 2.6.11, the old tricks of preventing
NAT of 'untracked' connections (e.g. NOTRACK target in 'raw' table) are no
longer sufficient.

The ip_conntrack_untracked.status |= IPS_NAT_DONE_MASK effectively
prevents iteration of the 'nat' table, but doesn't prevent nat_packet()
to be executed.  Since nr_manips is gone in 'rustynat', nat_packet() now
implicitly thinks that it has to do NAT on the packet.

This patch fixes that problem by explicitly checking for
ip_conntrack_untracked in ip_nat_fn().

Signed-off-by: default avatarHarald Welte <laforge@netfilter.org>
Signed-off-by: default avatarLinus Torvalds <torvalds@osdl.org>
parent 48de5bee
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment