[packages/conntrack-tools] - updated config file to match current options - release 2

qboosh qboosh at pld-linux.org
Wed Jul 2 18:20:59 CEST 2014


commit 3983b66e28149edca9ead8c659882ef5cc187b83
Author: Jakub Bogusz <qboosh at pld-linux.org>
Date:   Wed Jul 2 18:25:26 2014 +0200

    - updated config file to match current options
    - release 2

 conntrack-tools.conf | 108 +++++++++++++++++++++++++++++++++++++--------------
 conntrack-tools.spec |   2 +-
 2 files changed, 80 insertions(+), 30 deletions(-)
---
diff --git a/conntrack-tools.spec b/conntrack-tools.spec
index 6951cd3..9dc2001 100644
--- a/conntrack-tools.spec
+++ b/conntrack-tools.spec
@@ -2,7 +2,7 @@ Summary:	The userspace connection tracking table administration program
 Summary(pl.UTF-8):	Program przestrzeni użytkownika do zarządzania tablicą śledzenia połączeń
 Name:		conntrack-tools
 Version:	1.4.2
-Release:	1
+Release:	2
 License:	GPL v2
 Group:		Applications/Networking
 Source0:	http://www.netfilter.org/projects/conntrack-tools/files/%{name}-%{version}.tar.bz2
diff --git a/conntrack-tools.conf b/conntrack-tools.conf
index e514ac0..c4ba16e 100644
--- a/conntrack-tools.conf
+++ b/conntrack-tools.conf
@@ -3,24 +3,50 @@
 #
 General {
 	#
+	# Set the nice value of the daemon. This value goes from -20
+	# (most favorable scheduling) to 19 (least favorable). Using a
+	# negative value reduces the chances to lose state-change events.
+	# Default is 0. See man nice(1) for more information.
+	#
+	#Nice -1
+
+	#
+	# Select a different scheduler for the daemon, you can select between
+	# RR and FIFO and the process priority (minimum is 0, maximum is 99).
+	# See man sched_setscheduler(2) for more information. Using a RT
+	# scheduler reduces the chances to overrun the Netlink buffer.
+	#
+	# Scheduler {
+	# 	Type FIFO
+	# 	Priority 99
+	# }
+
+	#
 	# Number of buckets in the caches: hash table
 	#
 	HashSize 8192
 
 	#
-	# Maximum number of conntracks: 
+	# Maximum number of conntracks:
 	# it must be >= $ cat /proc/sys/net/ipv4/netfilter/ip_conntrack_max
 	#
 	HashLimit 65535
 
 	#
-	# Logfile
+	# Logfile: on (/var/log/conntrackd.log), off, or a filename
+	# Default: off
 	#
 	LogFile /var/log/conntrackd.log
 
 	#
+	# Syslog: on, off or a facility name (daemon (default) or local0..7)
+	# Default: off
+	#
+	#Syslog on
+
+	#
 	# Lockfile
-	# 
+	#
 	LockFile /var/lock/conntrack.lock
 
 	#
@@ -34,36 +60,60 @@ General {
 	#
 	# Netlink socket buffer size
 	#
-	SocketBufferSize 262142
+	NetlinkBufferSize 262142
 
 	#
 	# Increase the socket buffer up to maximun if required
 	#
-	SocketBufferSizeMaxGrown 655355
-}
+	NetlinkBufferSizeMaxGrowth 655355
 
-#
-# Ignore traffic for a certain set of IP's: Usually
-# all the IP assigned to the firewall since local
-# traffic must be ignored, just forwarded connections
-# are worth to replicate
-#
-IgnoreTrafficFor {
-	IPv4_address 127.0.0.1 # loopback
-}
+	#
+	# By default, the daemon receives state updates following an
+	# event-driven model. You can modify this behaviour by switching to
+	# polling mode with the PollSecs clause. This clause tells conntrackd
+	# to dump the states in the kernel every N seconds. With regards to
+	# synchronization mode, the polling mode can only guarantee that
+	# long-lifetime states are recovered. The main advantage of this method
+	# is the reduction in the state replication at the cost of reducing the
+	# chances of recovering connections.
+	#
+	# PollSecs 15
 
-#
-# Do not replicate certain protocol traffic 
-#
-IgnoreProtocol {
-	UDP
-#	ICMP
-#	IGMP
-#	VRRP
-	# numeric numbers also valid
-}
+	#
+	# Event filtering: This clause allows you to filter certain traffic,
+	# There are currently three filter-sets: Protocol, Address and
+	# State. The filter is attached to an action that can be: Accept or
+	# Ignore. Thus, you can define the event filtering policy of the
+	# filter-sets in positive or negative logic depending on your needs.
+	#
+	Filter {
+		#
+		# Accept only certain protocols: You may want to log the
+		# state of flows depending on their layer 4 protocol.
+		#
+		Protocol Accept {
+			TCP
+			# UDP
+			# ICMP
+			# IGMP
+			# VRRP
+		}
 
-#
-# Strip NAT traffic
-#
-StripNAT
+		#
+		# Ignore traffic for a certain set of IP's.
+		#
+		Address Ignore {
+			IPv4_address 127.0.0.1 # loopback
+			# IPv6_address ::1
+		}
+
+		#
+		# Uncomment this line below if you want to filter by flow state.
+		# The existing TCP states are: SYN_SENT, SYN_RECV, ESTABLISHED,
+		# FIN_WAIT, CLOSE_WAIT, LAST_ACK, TIME_WAIT, CLOSED, LISTEN.
+		#
+		# State Accept {
+		#	ESTABLISHED CLOSED TIME_WAIT CLOSE_WAIT for TCP
+		# }
+	}
+}
================================================================

---- gitweb:

http://git.pld-linux.org/gitweb.cgi/packages/conntrack-tools.git/commitdiff/3983b66e28149edca9ead8c659882ef5cc187b83



More information about the pld-cvs-commit mailing list