Update the comment for the iptables rule matching the
conntrack INVALID state. The previous entry was misleading
because it sounded like it dropped all new connections.
Change-Id: I793c1a7d9fbc261ac361305524de8ad67477815b
DHCP_CLIENT = 'Allow DHCP client traffic.'
DHCP_SPOOF = 'Prevent DHCP Spoofing by VM.'
UNMATCHED = 'Send unmatched traffic to the fallback chain.'
-STATELESS_DROP = 'Drop packets that are not associated with a state.'
+INVALID_DROP = ("Drop packets that appear related to an existing connection "
+ "(e.g. TCP ACK/FIN) but do not have an entry in conntrack.")
ALLOW_ASSOC = ('Direct packets associated with a known session to the RETURN '
'chain.')
IPV6_RA_ALLOW = 'Allow IPv6 ICMP traffic to allow RA packets.'
def _drop_invalid_packets(self, iptables_rules):
# Always drop invalid packets
iptables_rules += [comment_rule('-m state --state ' 'INVALID -j DROP',
- comment=ic.STATELESS_DROP)]
+ comment=ic.INVALID_DROP)]
return iptables_rules
def _allow_established(self, iptables_rules):