Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Do you clear the old entries from the chain ? #35

Open
bobymicroby opened this issue Nov 1, 2016 · 7 comments
Open

Do you clear the old entries from the chain ? #35

bobymicroby opened this issue Nov 1, 2016 · 7 comments

Comments

@bobymicroby
Copy link

Hi @tam7t

I had a quick look ad the code, and it seems to me that you only append rules to the chain.
Droplets are ephemeral, so we will end up with a lot of allowed droplets, even after we have destroyed them and they already belong to Eve.

Regards, B.

@tam7t
Copy link
Owner

tam7t commented Nov 2, 2016

Each run of droplan will first clear the chain before adding peers:

https://github.com/tam7t/droplan/blob/master/tables.go#L43

@bobymicroby
Copy link
Author

Great . Go is still a bit cryptic for me :)

On Wed, Nov 2, 2016, 02:48 Tommy Murphy notifications@github.com wrote:

Each run of droplan will first clear the chain before adding peers:

https://github.com/tam7t/droplan/blob/master/tables.go#L43


You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub
#35 (comment), or mute
the thread
https://github.com/notifications/unsubscribe-auth/AA4nV6YrfoReWm0lgYfao78HNzoH8H7Lks5q593BgaJpZM4Kl4xv
.

@josegonzalez
Copy link

Does this mean that there is a period of time during which the network is left unsecured? Seems like a better tact would be to load the existing chain, modify it in-memory, and apply changes as necessary.

@tam7t
Copy link
Owner

tam7t commented Feb 20, 2017

No, the chain that is cleared only has the ACCEPT rules, the default rule is DROP on the interface.

@josegonzalez
Copy link

So then network traffic will blip?

@tam7t
Copy link
Owner

tam7t commented Feb 20, 2017

@josegonzalez that is addressed by #11 with the
-A INPUT -i eth1 -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
rule so that established connections are not dropped.

@josegonzalez
Copy link

Right but I guess new connections will break during the time it takes to update the chain, correct?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants