From: HÃ¥kan Lindqvist Date: Wed, 29 Mar 2023 20:25:29 +0000 (+0200) Subject: Add reminders for 53/tcp in the NOTRACK rules in docs X-Git-Tag: rec-4.9.0-alpha1~17^2 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=refs%2Fpull%2F12705%2Fhead;p=thirdparty%2Fpdns.git Add reminders for 53/tcp in the NOTRACK rules in docs --- diff --git a/pdns/recursordist/docs/performance.rst b/pdns/recursordist/docs/performance.rst index 6e5d246161..ffa66b9f7b 100644 --- a/pdns/recursordist/docs/performance.rst +++ b/pdns/recursordist/docs/performance.rst @@ -74,6 +74,7 @@ For high load operation (thousands of queries/second), It is advised to either t Sample Linux command lines would be:: ## IPv4 + ## NOTRACK rules for 53/udp, keep in mind that you also need your regular rules for 53/tcp iptables -t raw -I OUTPUT -p udp --dport 53 -j CT --notrack iptables -t raw -I OUTPUT -p udp --sport 53 -j CT --notrack iptables -t raw -I PREROUTING -p udp --dport 53 -j CT --notrack @@ -84,6 +85,7 @@ Sample Linux command lines would be:: iptables -I OUTPUT -p udp --sport 53 -j ACCEPT ## IPv6 + ## NOTRACK rules for 53/udp, keep in mind that you also need your regular rules for 53/tcp ip6tables -t raw -I OUTPUT -p udp --dport 53 -j CT --notrack ip6tables -t raw -I OUTPUT -p udp --sport 53 -j CT --notrack ip6tables -t raw -I PREROUTING -p udp --sport 53 -j CT --notrack @@ -97,6 +99,7 @@ When using FirewallD (Centos 7+ / Red Hat 7+ / Fedora 21+), connection tracking The settings can be made permanent by using the ``--permanent`` flag:: ## IPv4 + ## NOTRACK rules for 53/udp, keep in mind that you also need your regular rules for 53/tcp firewall-cmd --direct --add-rule ipv4 raw OUTPUT 0 -p udp --dport 53 -j CT --notrack firewall-cmd --direct --add-rule ipv4 raw OUTPUT 0 -p udp --sport 53 -j CT --notrack firewall-cmd --direct --add-rule ipv4 raw PREROUTING 0 -p udp --dport 53 -j CT --notrack @@ -107,6 +110,7 @@ The settings can be made permanent by using the ``--permanent`` flag:: firewall-cmd --direct --add-rule ipv4 filter OUTPUT 0 -p udp --sport 53 -j ACCEPT ## IPv6 + ## NOTRACK rules for 53/udp, keep in mind that you also need your regular rules for 53/tcp firewall-cmd --direct --add-rule ipv6 raw OUTPUT 0 -p udp --dport 53 -j CT --notrack firewall-cmd --direct --add-rule ipv6 raw OUTPUT 0 -p udp --sport 53 -j CT --notrack firewall-cmd --direct --add-rule ipv6 raw PREROUTING 0 -p udp --dport 53 -j CT --notrack