Skip to content
  • Florian Westphal's avatar
    netfilter: conntrack: re-visit sysctls in unprivileged namespaces · d0febd81
    Florian Westphal authored
    since commit b884fa46
    
     ("netfilter: conntrack: unify sysctl handling")
    conntrack no longer exposes most of its sysctls (e.g. tcp timeouts
    settings) to network namespaces that are not owned by the initial user
    namespace.
    
    This patch exposes all sysctls even if the namespace is unpriviliged.
    
    compared to a 4.19 kernel, the newly visible and writeable sysctls are:
      net.netfilter.nf_conntrack_acct
      net.netfilter.nf_conntrack_timestamp
      .. to allow to enable accouting and timestamp extensions.
    
      net.netfilter.nf_conntrack_events
      .. to turn off conntrack event notifications.
    
      net.netfilter.nf_conntrack_checksum
      .. to disable checksum validation.
    
      net.netfilter.nf_conntrack_log_invalid
      .. to enable logging of packets deemed invalid by conntrack.
    
    newly visible sysctls that are only exported as read-only:
    
      net.netfilter.nf_conntrack_count
      .. current number of conntrack entries living in this netns.
    
      net.netfilter.nf_conntrack_max
      .. global upperlimit (maximum size of the table).
    
      net.netfilter.nf_conntrack_buckets
      .. size of the conntrack table (hash buckets).
    
      net.netfilter.nf_conntrack_expect_max
      .. maximum number of permitted expectations in this netns.
    
      net.netfilter.nf_conntrack_helper
      .. conntrack helper auto assignment.
    
    Signed-off-by: default avatarFlorian Westphal <fw@strlen.de>
    Signed-off-by: default avatarPablo Neira Ayuso <pablo@netfilter.org>
    d0febd81