<feed xmlns='http://www.w3.org/2005/Atom'>
<title>firewall4/tests/02_zones/05_subnet_mask_matches, branch master</title>
<subtitle>OpenWrt nftables firewall</subtitle>
<id>https://git.openwrt.org/project/firewall4/atom?h=master</id>
<link rel='self' href='https://git.openwrt.org/project/firewall4/atom?h=master'/>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/'/>
<updated>2023-11-03T13:11:06Z</updated>
<entry>
<title>ruleset: reduce ksoftirqd load by refering to looopback by numeric id</title>
<updated>2023-11-03T13:11:06Z</updated>
<author>
<name>Andris PE</name>
</author>
<published>2023-09-19T15:23:59Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/commit/?id=a5553dae70439c7e4fa910490fcf12a1ffff5bd2'/>
<id>urn:sha1:a5553dae70439c7e4fa910490fcf12a1ffff5bd2</id>
<content type='text'>
Reduce ksoftirq load by half using more efficient reference to loopback
which always has index equal to one.

Should help a lot with openwrt/openwrt#12914, openwrt/openwrt#12121 and
similar iperf3 cases clamping against 100% CPU usage.

Signed-off-by: Andris PE &lt;neandris@gmail.com&gt;
[fix S-o-b tag, fix commit author, rewrap commit message]
Signed-off-by: Jo-Philipp Wich &lt;jo@mein.io&gt;
</content>
</entry>
<entry>
<title>ruleset: dispatch ct states using verdict map</title>
<updated>2023-11-03T13:09:43Z</updated>
<author>
<name>Andris PE</name>
</author>
<published>2023-09-07T19:04:35Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/commit/?id=19a8caf614ec338513e58535ea02c6ee52988170'/>
<id>urn:sha1:19a8caf614ec338513e58535ea02c6ee52988170</id>
<content type='text'>
In case the dropping of invalid conntrack states is enabled, using a verdict
map allows us to use only one rule instead of two, lowering the initial rule
match overhead.

Signed-off-by: Andris PE &lt;neandris@gmail.com&gt;
[whitespace cleanup, rebase, extend commit subject and message]
Signed-off-by: Jo-Philipp Wich &lt;jo@mein.io&gt;
</content>
</entry>
<entry>
<title>Revert "ruleset: dispatch ct states using verdict map"</title>
<updated>2023-11-03T13:09:16Z</updated>
<author>
<name>Jo-Philipp Wich</name>
</author>
<published>2023-11-03T13:09:12Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/commit/?id=22c53921c11115e5437385719b6e73800a68cd33'/>
<id>urn:sha1:22c53921c11115e5437385719b6e73800a68cd33</id>
<content type='text'>
This reverts commit 785798c8fd72ff3c4c8940922173290bb25bc18e.

Revert commit due to bad commit metadata.

Signed-off-by: Jo-Philipp Wich &lt;jo@mein.io&gt;
</content>
</entry>
<entry>
<title>ruleset: dispatch ct states using verdict map</title>
<updated>2023-11-03T13:04:39Z</updated>
<author>
<name>User User-User</name>
</author>
<published>2023-09-07T19:04:35Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/commit/?id=785798c8fd72ff3c4c8940922173290bb25bc18e'/>
<id>urn:sha1:785798c8fd72ff3c4c8940922173290bb25bc18e</id>
<content type='text'>
In case the dropping of invalid conntrack states is enabled, using a verdict
map allows us to use only one rule instead of two, lowering the initial rule
match overhead.

Signed-off-by: Andris PE &lt;neandris@gmail.com&gt;
[whitespace cleanup, rebase, extend commit subject and message]
Signed-off-by: Jo-Philipp Wich &lt;jo@mein.io&gt;
</content>
</entry>
<entry>
<title>ruleset: reorder declarations &amp; output tweaks</title>
<updated>2022-06-14T14:27:26Z</updated>
<author>
<name>Jo-Philipp Wich</name>
</author>
<published>2022-06-14T14:23:50Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/commit/?id=11410b80eb9c442c4850cfc3034267f3f72a196c'/>
<id>urn:sha1:11410b80eb9c442c4850cfc3034267f3f72a196c</id>
<content type='text'>
 - Omit "Set definitions" header if no sets are declared
 - Always emit ${zone}_devices and ${zone}_subnets defines, even if empty
 - Move CT helper definitions to the top
 - Move ${zone}_helper chain definitions after ${zone}_forward chain defs
 - Consistently use two line spacing for output sections

Signed-off-by: Jo-Philipp Wich &lt;jo@mein.io&gt;
</content>
</entry>
<entry>
<title>ruleset: reuse zone-jump.uc template for notrack and helper chain jumps</title>
<updated>2022-06-14T14:27:26Z</updated>
<author>
<name>Jo-Philipp Wich</name>
</author>
<published>2022-06-14T12:59:58Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/commit/?id=e1cb763b65262eef5958d19fe922380aa1e96570'/>
<id>urn:sha1:e1cb763b65262eef5958d19fe922380aa1e96570</id>
<content type='text'>
Avoid some code-duplication by reusing the zone-jump.uc partial template
to emit the helper_* chain jump rules.

Also add some test coverage for notrack rules.

Signed-off-by: Jo-Philipp Wich &lt;jo@mein.io&gt;
</content>
</entry>
<entry>
<title>ruleset: fix conntrack helpers</title>
<updated>2022-06-14T14:26:07Z</updated>
<author>
<name>Stijn Tintel</name>
</author>
<published>2022-06-13T15:00:26Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/commit/?id=a063317d96c6c85e4c909eab017ef2813f93ff05'/>
<id>urn:sha1:a063317d96c6c85e4c909eab017ef2813f93ff05</id>
<content type='text'>
In nftables, helper assignments need to be performed after the conntrack
lookup has completed. Using the raw priority results in the assignment
being done before the conntrack lookup, which breaks conntrack helpers.

Fix this by moving the jumps helper rule chains to a new toplevel
`prerouting` and the existing `output` chain respectively.

Signed-off-by: Stijn Tintel &lt;stijn@linux-ipv6.be&gt;
[new toplevel `prerouting` chain + reuse existing `output` chain]
Signed-off-by: Jo-Philipp Wich &lt;jo@mein.io&gt;
</content>
</entry>
<entry>
<title>ruleset: correct mangle_output chain type</title>
<updated>2022-05-30T18:59:27Z</updated>
<author>
<name>Jo-Philipp Wich</name>
</author>
<published>2022-05-30T18:59:27Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/commit/?id=fb9a6b2ba85bb434e6634808fd4530ac2fb2c2c0'/>
<id>urn:sha1:fb9a6b2ba85bb434e6634808fd4530ac2fb2c2c0</id>
<content type='text'>
Use the `route` chain type for the `mangle_output` chain since rules in
this chain influence egress packet routing.

Fixes: #9955
Signed-off-by: Jo-Philipp Wich &lt;jo@mein.io&gt;
</content>
</entry>
<entry>
<title>ruleset: support non-contiguous address masks</title>
<updated>2022-01-27T15:22:15Z</updated>
<author>
<name>Jo-Philipp Wich</name>
</author>
<published>2022-01-26T11:05:39Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/commit/?id=e60bb4b47ff9aad6806afc0468f4217a344a7cf0'/>
<id>urn:sha1:e60bb4b47ff9aad6806afc0468f4217a344a7cf0</id>
<content type='text'>
Support non-contiguous address masks (such as `::1234/::ffff`) for zone
subnet and rule src_ip / dest_ip options and translate them into appropriate
bitwise &amp; expressions internally.

Add appropriate logic to calculate permutations of inverted, non-inverted,
contiguous and non-contiguous address matches since bitwise calculation
expressions can not appear within sets which means that any non-inverted,
non-contiguous mask addresses must be put into separate rules while the
remaining addresses (if any) may be grouped into a common set.

Signed-off-by: Jo-Philipp Wich &lt;jo@mein.io&gt;
</content>
</entry>
</feed>
