<feed xmlns='http://www.w3.org/2005/Atom'>
<title>firewall4/tests/02_zones, branch master</title>
<subtitle>OpenWrt nftables firewall</subtitle>
<id>https://git.openwrt.org/project/firewall4/atom?h=master</id>
<link rel='self' href='https://git.openwrt.org/project/firewall4/atom?h=master'/>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/'/>
<updated>2023-11-03T13:14:15Z</updated>
<entry>
<title>tests: adjust zone log limit testcases</title>
<updated>2023-11-03T13:14:15Z</updated>
<author>
<name>Jo-Philipp Wich</name>
</author>
<published>2023-11-03T13:14:15Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/commit/?id=de3483c561a728d5234a0a3f49b5dde4527a0f3f'/>
<id>urn:sha1:de3483c561a728d5234a0a3f49b5dde4527a0f3f</id>
<content type='text'>
Fix testcase failure introduced by a previous commit.

Fixes: a5553da ("ruleset: reduce ksoftirqd load by refering to looopback by numeric id")
Signed-off-by: Jo-Philipp Wich &lt;jo@mein.io&gt;
</content>
</entry>
<entry>
<title>ruleset: reduce ksoftirqd load by refering to looopback by numeric id</title>
<updated>2023-11-03T13:11:06Z</updated>
<author>
<name>Andris PE</name>
</author>
<published>2023-09-19T15:23:59Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/commit/?id=a5553dae70439c7e4fa910490fcf12a1ffff5bd2'/>
<id>urn:sha1:a5553dae70439c7e4fa910490fcf12a1ffff5bd2</id>
<content type='text'>
Reduce ksoftirq load by half using more efficient reference to loopback
which always has index equal to one.

Should help a lot with openwrt/openwrt#12914, openwrt/openwrt#12121 and
similar iperf3 cases clamping against 100% CPU usage.

Signed-off-by: Andris PE &lt;neandris@gmail.com&gt;
[fix S-o-b tag, fix commit author, rewrap commit message]
Signed-off-by: Jo-Philipp Wich &lt;jo@mein.io&gt;
</content>
</entry>
<entry>
<title>ruleset: dispatch ct states using verdict map</title>
<updated>2023-11-03T13:09:43Z</updated>
<author>
<name>Andris PE</name>
</author>
<published>2023-09-07T19:04:35Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/commit/?id=19a8caf614ec338513e58535ea02c6ee52988170'/>
<id>urn:sha1:19a8caf614ec338513e58535ea02c6ee52988170</id>
<content type='text'>
In case the dropping of invalid conntrack states is enabled, using a verdict
map allows us to use only one rule instead of two, lowering the initial rule
match overhead.

Signed-off-by: Andris PE &lt;neandris@gmail.com&gt;
[whitespace cleanup, rebase, extend commit subject and message]
Signed-off-by: Jo-Philipp Wich &lt;jo@mein.io&gt;
</content>
</entry>
<entry>
<title>Revert "ruleset: dispatch ct states using verdict map"</title>
<updated>2023-11-03T13:09:16Z</updated>
<author>
<name>Jo-Philipp Wich</name>
</author>
<published>2023-11-03T13:09:12Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/commit/?id=22c53921c11115e5437385719b6e73800a68cd33'/>
<id>urn:sha1:22c53921c11115e5437385719b6e73800a68cd33</id>
<content type='text'>
This reverts commit 785798c8fd72ff3c4c8940922173290bb25bc18e.

Revert commit due to bad commit metadata.

Signed-off-by: Jo-Philipp Wich &lt;jo@mein.io&gt;
</content>
</entry>
<entry>
<title>ruleset: dispatch ct states using verdict map</title>
<updated>2023-11-03T13:04:39Z</updated>
<author>
<name>User User-User</name>
</author>
<published>2023-09-07T19:04:35Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/commit/?id=785798c8fd72ff3c4c8940922173290bb25bc18e'/>
<id>urn:sha1:785798c8fd72ff3c4c8940922173290bb25bc18e</id>
<content type='text'>
In case the dropping of invalid conntrack states is enabled, using a verdict
map allows us to use only one rule instead of two, lowering the initial rule
match overhead.

Signed-off-by: Andris PE &lt;neandris@gmail.com&gt;
[whitespace cleanup, rebase, extend commit subject and message]
Signed-off-by: Jo-Philipp Wich &lt;jo@mein.io&gt;
</content>
</entry>
<entry>
<title>fw4: add log_limit to rules and redirects</title>
<updated>2023-11-03T12:37:19Z</updated>
<author>
<name>Luiz Angelo Daros de Luca</name>
</author>
<published>2023-08-01T19:51:58Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/commit/?id=187405075911d408fa48e97ce343e76a2a30ef12'/>
<id>urn:sha1:187405075911d408fa48e97ce343e76a2a30ef12</id>
<content type='text'>
Just like zone log_limit, now you can specify a different log limit to a
single rule or redirect.

Signed-off-by: Luiz Angelo Daros de Luca &lt;luizluca@gmail.com&gt;
[whitespace cleanup, properly format limit expressions]
Signed-off-by: Jo-Philipp Wich &lt;jo@mein.io&gt;
</content>
</entry>
<entry>
<title>ruleset: drop ctstate invalid traffic for masq-enabled zones</title>
<updated>2022-10-26T13:45:16Z</updated>
<author>
<name>Jo-Philipp Wich</name>
</author>
<published>2022-10-25T19:03:00Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/commit/?id=119ee1a06d4a5e5fd01ec1a242d21d6f355d7ff6'/>
<id>urn:sha1:119ee1a06d4a5e5fd01ec1a242d21d6f355d7ff6</id>
<content type='text'>
For NAT enabled zones, stage rules to drop forwarded traffic with conntrack
state "invalid" and honor `masq_allow_invalid` option to inhibit those
rules.

This ports the corresponding firewall3 logic to firewall4.

Ref: https://forum.openwrt.org/t/x/140790
Signed-off-by: Jo-Philipp Wich &lt;jo@mein.io&gt;
</content>
</entry>
<entry>
<title>fw4: don't inherit zone family from ct helpers</title>
<updated>2022-08-01T10:39:49Z</updated>
<author>
<name>Stijn Tintel</name>
</author>
<published>2022-08-01T09:40:14Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/commit/?id=111a7f780ab26b1377960c6eb47e1e5f169cc178'/>
<id>urn:sha1:111a7f780ab26b1377960c6eb47e1e5f169cc178</id>
<content type='text'>
It's perfectly valid to use a conntrack helper that only supports a
single address family in a zone where both IPv4 and IPv6 are used.
Restricting a zone to a certain family due to limitations of the
associated conntrack helpers may result in unexpected behaviour, which
in turn may have unintended security implications.

Don't inherit zone family from conntrack helper restrictions to avoid
this and add test coverage.

Signed-off-by: Stijn Tintel &lt;stijn@linux-ipv6.be&gt;
Acked-by: Jo-Philipp Wich &lt;jo@mein.io&gt;
</content>
</entry>
<entry>
<title>ruleset: reorder declarations &amp; output tweaks</title>
<updated>2022-06-14T14:27:26Z</updated>
<author>
<name>Jo-Philipp Wich</name>
</author>
<published>2022-06-14T14:23:50Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/commit/?id=11410b80eb9c442c4850cfc3034267f3f72a196c'/>
<id>urn:sha1:11410b80eb9c442c4850cfc3034267f3f72a196c</id>
<content type='text'>
 - Omit "Set definitions" header if no sets are declared
 - Always emit ${zone}_devices and ${zone}_subnets defines, even if empty
 - Move CT helper definitions to the top
 - Move ${zone}_helper chain definitions after ${zone}_forward chain defs
 - Consistently use two line spacing for output sections

Signed-off-by: Jo-Philipp Wich &lt;jo@mein.io&gt;
</content>
</entry>
<entry>
<title>ruleset: reuse zone-jump.uc template for notrack and helper chain jumps</title>
<updated>2022-06-14T14:27:26Z</updated>
<author>
<name>Jo-Philipp Wich</name>
</author>
<published>2022-06-14T12:59:58Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/commit/?id=e1cb763b65262eef5958d19fe922380aa1e96570'/>
<id>urn:sha1:e1cb763b65262eef5958d19fe922380aa1e96570</id>
<content type='text'>
Avoid some code-duplication by reusing the zone-jump.uc partial template
to emit the helper_* chain jump rules.

Also add some test coverage for notrack rules.

Signed-off-by: Jo-Philipp Wich &lt;jo@mein.io&gt;
</content>
</entry>
</feed>
