Balazs Scheidler wrote:

> * use a new state (called TPROXY), which would be applied to all TPROXYed
>   packets (might interact badly with nat/conntrack).

It will in no doubt interact badly with connection tracking (and therefore 
NAT).

> * have the tproxy framework mark all packets with an fwmark, and let the
>   packets in based on the value of fwmark

Will interact badly with fwmark based routing.

> * have a separate match (called tproxy), which matches tproxied sessions
>   based on some value stored in the associated conntrack entry

Defenitely my preference, but I might be biased as I make heavy use of 
connection tracking and fwmark based routing in combination.

Regards
Henrik


Reply via email to