summaryrefslogtreecommitdiff
path: root/2003/netfilter-curdevel-ukuug2003
diff options
context:
space:
mode:
authorHarald Welte <laforge@gnumonks.org>2015-10-25 21:00:20 +0100
committerHarald Welte <laforge@gnumonks.org>2015-10-25 21:00:20 +0100
commitfca59bea770346cf1c1f9b0e00cb48a61b44a8f3 (patch)
treea2011270df48d3501892ac1a56015c8be57e8a7d /2003/netfilter-curdevel-ukuug2003
import of old now defunct presentation slides svn repo
Diffstat (limited to '2003/netfilter-curdevel-ukuug2003')
-rw-r--r--2003/netfilter-curdevel-ukuug2003/netfilter-curdevel-ukuug2003.mgp304
-rw-r--r--2003/netfilter-curdevel-ukuug2003/netfilter-curdevel-ukuug2003.tex318
2 files changed, 622 insertions, 0 deletions
diff --git a/2003/netfilter-curdevel-ukuug2003/netfilter-curdevel-ukuug2003.mgp b/2003/netfilter-curdevel-ukuug2003/netfilter-curdevel-ukuug2003.mgp
new file mode 100644
index 0000000..08f1f82
--- /dev/null
+++ b/2003/netfilter-curdevel-ukuug2003/netfilter-curdevel-ukuug2003.mgp
@@ -0,0 +1,304 @@
+%include "default.mgp"
+%default 1 bgrad
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+%page
+%nodefault
+%back "blue"
+
+%center
+%size 7
+
+
+The future of Linux packet filtering
+
+
+
+%center
+%size 4
+by
+
+Harald Welte <laforge@netfilter.org>
+
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+%page
+Future of Linux packet filtering
+Contents
+
+
+ Problems with current 2.4/2.5 netfilter/iptables
+ Solution to code replication
+ Solution for dynamic rulesets
+ Solution for API to GUI's and other management programs
+
+ Other current work
+ Optimizing Rule load time of large rulesets
+ Making netfilter/iptables compatible with zerocopy tcp
+
+ HA for stateful firewalling
+ What's special about firewalling HA
+ Poor man's failover
+ Real state replication
+
+
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+%page
+Future of Linux packet filtering
+Problems with 2.4.x netfilter/iptables
+
+ code replication between iptables/ip6tables/arptables
+ iptables was never meant for other protocols, but people did copy+paste 'ports'
+ replication of
+ core kernel code
+ layer 3 independent matches (mac, interface, ...)
+ userspace library (libiptc)
+ userspace tool (iptables)
+ userspace plugins (libipt_xxx.so)
+
+ doesn't suit the needs for dynamically changing rulesets
+ dynamic rulesets becomming more common due (service selection, IDS)
+ a whole table is created in userspace and sent as blob to kernel
+ for every ruleset the table needs to be copied to userspace and back
+ inside kernel consistency checks on whole table, loop detection
+
+ too extensible for writing any forward-compatible GUI
+ new extensions showing up all the time
+ a frontend would need to know about the options and use of a new extension
+ thus frontends are always incomplete and out-of-date
+ no high-level API other than piping to iptables-restore
+
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+%page
+Future of Linux packet filtering
+Reducing code replication
+
+ code replication is a real problem: unclean, bugfixes missed
+ we need layer 3 independent layer for
+ submitting rules to the kernel
+ traversing packet-rulesets supporting match/target modules
+ registering matches/targets
+ layer 3 specific (like matching ipv4 address)
+ layer 3 independent (like matching MAC address)
+
+ solution
+ pkt_tables inside kernel
+ pkt_tables_ipv4 registers layer 3 handler with pkt_tables
+ pkt_tables_ipv6 registers layer 3 handler with pkt_tables
+ everybody registering a pkt_table (like iptable_filter) needs to specify the l3 protocol
+ libraries in userspace (see later)
+
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+%page
+Future of Linux packet filtering
+Supporting dynamic rulesets
+
+ atomic table-replacement turned out to be bad idea
+ need new interface for sending individual rules to kernel
+ policy routing has the same problem and good solution: rtnetlink
+ solution: nfnetlink
+ multicast-netlink based packet-orinented socket between kernel and userspace
+ has extra benefit that other userspace processes get notified of rule changes [just like routing daemons]
+ nfnetlink will be low-layer below all kernel/userspace communication
+ pkttnetlink [aka iptnetlink]
+ ctnetlink
+ ulog
+ ip_queue
+
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+%page
+Future of Linux packet filtering
+Communication with other programs
+
+whole set of libraries
+ libnfnetlink for low-layer communication
+ libpkttnetlink for rule modifications
+ will handle all plugins [which are currently part of iptables]
+ query functions about avaliable matches/targets
+ query functions about parameters
+ query functions for help messages about specific match/parameter of a match
+ generic structure from which rules can be built
+ conversion functions to parse generic structure into in-kernel structure
+ conversion functions to perse kernel structure into generic structure
+ functions to convert generic structure in plain text
+ libipq will stay API-compatible to current version
+ libipulog will stay API-compatible to current version
+ libiptc will go away [compatibility layer extremely difficult]
+
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+%page
+Future of Linux packet filtering
+Optimizing rule load time
+
+ Current situation
+ loading 10,000 rules in 1,000 chains takes about 4 minutes on a PIII 733Mhz
+ this is caused by two bottlenecks
+ loop detection algorithm on kernel side inefficient
+ a couple of O^2 complexity functions in libiptc
+
+ Solution
+ efficient loop detection and mark_source_chains() algorithm (graph coloring)
+ current CVS libiptc with only one O^2 function: 2minutes37
+ whole reimplementation of libiptc needed for removing the last O^2 function
+
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+%page
+HA for netfillter/iptables
+Optimizing the connection tracking code
+
+ Conntrack hash function optimization
+ old hash function not good for even hash bucket count
+ hash function evaluation tool [cttest] avaliable
+ other hash functions in development (already in 2.4.21)
+ introduce per-system randomness to prevent hash attack
+ code optimization (locking/timers/...)
+
+
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+%page
+Future of Linux packet filtering
+netfilter and zerocopy TCP
+
+ Current situation (2.4.x)
+ skb_linearize() at each netfilter hook effectively prevents zerocopy TCP to work if netfilter/iptables is enabled
+ this is a big performance loss on stand-alone servers which filter packets locally
+
+ Solution
+ remove skb_linearize() from conntrack, nat and ip_tables core
+ all iptables extensions and conntrack/nat helpers have to use skb_copy_bits() if they want to access data beyond layer 4 header
+
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+%page
+HA for netfillter/iptables
+Introduction
+
+What is special about firewall failover?
+
+ Nothing, in case of the stateless packet filter
+ Common IP takeover solutions can be used
+ VRRP
+ Hartbeat
+
+ Distribution of packet filtering ruleset no problem
+ can be done manually
+ or implemented with simple userspace process
+
+ Problems arise with stateful packet filters
+ Connection state only on active node
+ NAT mappings only on active node
+
+
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+%page
+HA for netfillter/iptables
+Poor man's failover
+
+Poor man's failover
+ principle
+ let every node do it's own tracking rather than replicating state
+ two possible implementations
+ connect every node to shared media (i.e. real ethernet)
+ forwarding only turned on on active node
+ slave nodes use promiscuous mode to sniff packets
+ copy all traffic to slave nodes
+ active master needs to copy all traffic to other nodes
+ disadvantage: high load, sync traffic == payload traffic
+ IMHO stupid way of solving the problem
+ advantages
+ very easy implementation
+ only addition of sniffing mode to conntrack needed
+ existing means of address takeover can be used
+ same load on active master and slave nodes
+ no additional load on active master
+ disadvantages
+ can only be used with real shared media (no switches, ...)
+ can not be used with NAT
+ remaining problem
+ no initial state sync after reboot of slave node!
+
+
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+%page
+HA for netfillter/iptables
+Real state replication
+
+Parts needed
+ state replication protocol
+ multicast based
+ sequence numbers for detection of packet loss
+ NACK-based retransmission
+ no security, since private ethernet segment to be used
+ event interface on active node
+ calling out to callback function at all state changes
+ exported interface to manipulate conntrack hash table
+ kernel thread for sending conntrack state protocol messages
+ registers with event interface
+ creates and accumulates state replication packets
+ sends them via in-kernel sockets api
+ kernel thread for receiving conntrack state replication messages
+ receives state replication packets via in-kernel sockets
+ uses conntrack hashtable manipulation interface
+
+
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+%page
+HA for netfillter/iptables
+Real state replication
+
+ Flow of events in chronological order:
+ on active node, inside the network RX softirq
+ connection tracking code is analyzing a forwarded packet
+ connection tracking gathers some new state information
+ connection tracking updates local connection tracking database
+ connection tracking sends event message to event API
+ on active node, inside the conntrack-sync kernel thread
+ conntrack sync daemon receives event through event API
+ conntrack sync daemon aggregates multiple event messages into a state replication protocol message, removing possible redundancy
+ conntrack sync daemon generates state replication protocol message
+ conntrack sync daemon sends state replication protocol message
+ on slave node(s), inside network RX softirq
+ connection tracking code ignores packets coming from the interface attached to the private conntrac sync network
+ state replication protocol messages is appended to socket receive queue of conntrack-sync kernel thread
+ on slave node(s), inside conntrack-sync kernel thread
+ conntrack sync daemon receives state replication message
+ conntrack sync daemon creates/updates conntrack entry
+
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+%page
+HA for netfillter/iptables
+Neccessary changes to kernel
+
+Neccessary changes to current conntrack core
+
+ event generation (callback functions) for all state changes
+
+ conntrack hashtable manipulation API
+ is needed (and already implemented) for 'ctnetlink' API
+
+ conntrack exemptions
+ needed to _not_ track conntrack state replication packets
+ is needed for other cases as well
+ currently being developed by Jozsef Kadlecsik
+
+
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+%page
+Future of Linux packet filtering
+Thanks
+ The slides of this presentation are available at http://www.gnumonks.org/
+
+ Visit the netfilter homepage http://www.netfilter.org/
+
+ Thanks to
+ the BBS people, Z-Netz, FIDO, ...
+ for heavily increasing my computer usage in 1992
+ KNF
+ for bringing me in touch with the internet as early as 1994
+ for providing a playground for technical people
+ for telling me about the existance of Linux!
+ Alan Cox, Alexey Kuznetsov, David Miller, Andi Kleen
+ for implementing (one of?) the world's best TCP/IP stacks
+ Paul 'Rusty' Russell
+ for starting the netfilter/iptables project
+ for trusting me to maintain it today
+ Astaro AG
+ for sponsoring most of my current netfilter work
+
diff --git a/2003/netfilter-curdevel-ukuug2003/netfilter-curdevel-ukuug2003.tex b/2003/netfilter-curdevel-ukuug2003/netfilter-curdevel-ukuug2003.tex
new file mode 100644
index 0000000..2659ae1
--- /dev/null
+++ b/2003/netfilter-curdevel-ukuug2003/netfilter-curdevel-ukuug2003.tex
@@ -0,0 +1,318 @@
+\documentstyle{seminar}
+\begin{document}
+\vspace{3mm}
+\begin{slide}
+\vspace{3mm}
+\begin{center}
+\vspace{3mm}
+\vspace{3mm}
+The future of Linux packet filtering\\
+\vspace{3mm}
+\vspace{3mm}
+\vspace{3mm}
+\end{center}
+\begin{center}
+by\\
+\vspace{3mm}
+Harald Welte <laforge@netfilter.org>\\
+\vspace{3mm}
+\vspace{3mm}
+\end{center}
+\end{slide}
+\begin{slide}
+Future of Linux packet filtering\\
+Contents\\
+\vspace{3mm}
+\vspace{3mm}
+ Problems with current 2.4/2.5 netfilter/iptables\\
+ Solution to code replication\\
+ Solution for dynamic rulesets\\
+ Solution for API to GUI's and other management programs\\
+\vspace{3mm}
+ Other current work\\
+ Optimizing Rule load time of large rulesets\\
+ Making netfilter/iptables compatible with zerocopy tcp\\
+\vspace{3mm}
+ HA for stateful firewalling\\
+ What's special about firewalling HA\\
+ Poor man's failover\\
+ Real state replication\\
+\vspace{3mm}
+\vspace{3mm}
+\vspace{3mm}
+\end{slide}
+\begin{slide}
+Future of Linux packet filtering\\
+Problems with 2.4.x netfilter/iptables\\
+\vspace{3mm}
+ code replication between iptables/ip6tables/arptables\\
+ iptables was never meant for other protocols, but people did copy+paste 'ports'\\
+ replication of\\
+ core kernel code\\
+ layer 3 independent matches (mac, interface, ...)\\
+ userspace library (libiptc)\\
+ userspace tool (iptables)\\
+ userspace plugins (libipt_xxx.so)\\
+\vspace{3mm}
+ doesn't suit the needs for dynamically changing rulesets\\
+ dynamic rulesets becomming more common due (service selection, IDS)\\
+ a whole table is created in userspace and sent as blob to kernel\\
+ for every ruleset the table needs to be copied to userspace and back\\
+ inside kernel consistency checks on whole table, loop detection\\
+\vspace{3mm}
+ too extensible for writing any forward-compatible GUI\\
+ new extensions showing up all the time\\
+ a frontend would need to know about the options and use of a new extension\\
+ thus frontends are always incomplete and out-of-date\\
+ no high-level API other than piping to iptables-restore\\
+\vspace{3mm}
+\vspace{3mm}
+\end{slide}
+\begin{slide}
+Future of Linux packet filtering\\
+Reducing code replication\\
+\vspace{3mm}
+ code replication is a real problem: unclean, bugfixes missed\\
+ we need layer 3 independent layer for\\
+ submitting rules to the kernel\\
+ traversing packet-rulesets supporting match/target modules\\
+ registering matches/targets\\
+ layer 3 specific (like matching ipv4 address)\\
+ layer 3 independent (like matching MAC address)\\
+\vspace{3mm}
+ solution\\
+ pkt_tables inside kernel\\
+ pkt_tables_ipv4 registers layer 3 handler with pkt_tables\\
+ pkt_tables_ipv6 registers layer 3 handler with pkt_tables\\
+ everybody registering a pkt_table (like iptable_filter) needs to specify the l3 protocol\\
+ libraries in userspace (see later)\\
+\vspace{3mm}
+\vspace{3mm}
+\end{slide}
+\begin{slide}
+Future of Linux packet filtering\\
+Supporting dynamic rulesets\\
+\vspace{3mm}
+ atomic table-replacement turned out to be bad idea\\
+ need new interface for sending individual rules to kernel\\
+ policy routing has the same problem and good solution: rtnetlink\\
+ solution: nfnetlink\\
+ multicast-netlink based packet-orinented socket between kernel and userspace\\
+ has extra benefit that other userspace processes get notified of rule changes [just like routing daemons]\\
+ nfnetlink will be low-layer below all kernel/userspace communication\\
+ pkttnetlink [aka iptnetlink]\\
+ ctnetlink\\
+ ulog\\
+ ip_queue\\
+\vspace{3mm}
+\vspace{3mm}
+\end{slide}
+\begin{slide}
+Future of Linux packet filtering\\
+Communication with other programs\\
+\vspace{3mm}
+whole set of libraries\\
+ libnfnetlink for low-layer communication\\
+ libpkttnetlink for rule modifications\\
+ will handle all plugins [which are currently part of iptables]\\
+ query functions about avaliable matches/targets\\
+ query functions about parameters\\
+ query functions for help messages about specific match/parameter of a match\\
+ generic structure from which rules can be built\\
+ conversion functions to parse generic structure into in-kernel structure\\
+ conversion functions to perse kernel structure into generic structure\\
+ functions to convert generic structure in plain text\\
+ libipq will stay API-compatible to current version\\
+ libipulog will stay API-compatible to current version\\
+ libiptc will go away [compatibility layer extremely difficult]\\
+\vspace{3mm}
+\vspace{3mm}
+\end{slide}
+\begin{slide}
+Future of Linux packet filtering\\
+Optimizing rule load time\\
+\vspace{3mm}
+ Current situation\\
+ loading 10,000 rules in 1,000 chains takes about 4 minutes on a PIII 733Mhz\\
+ this is caused by two bottlenecks\\
+ loop detection algorithm on kernel side inefficient\\
+ a couple of O^2 complexity functions in libiptc\\
+\vspace{3mm}
+ Solution\\
+ efficient loop detection and mark_source_chains() algorithm (graph coloring)\\
+ current CVS libiptc with only one O^2 function: 2minutes37\\
+ whole reimplementation of libiptc needed for removing the last O^2 function \\
+\vspace{3mm}
+\vspace{3mm}
+\end{slide}
+\begin{slide}
+HA for netfillter/iptables\\
+Optimizing the connection tracking code\\
+\vspace{3mm}
+ Conntrack hash function optimization\\
+ old hash function not good for even hash bucket count\\
+ hash function evaluation tool [cttest] avaliable\\
+ other hash functions in development (already in 2.4.21)\\
+ introduce per-system randomness to prevent hash attack\\
+ code optimization (locking/timers/...)\\
+\vspace{3mm}
+\vspace{3mm}
+\vspace{3mm}
+\end{slide}
+\begin{slide}
+Future of Linux packet filtering\\
+netfilter and zerocopy TCP\\
+\vspace{3mm}
+ Current situation (2.4.x)\\
+ skb_linearize() at each netfilter hook effectively prevents zerocopy TCP to work if netfilter/iptables is enabled\\
+ this is a big performance loss on stand-alone servers which filter packets locally\\
+\vspace{3mm}
+ Solution\\
+ remove skb_linearize() from conntrack, nat and ip_tables core\\
+ all iptables extensions and conntrack/nat helpers have to use skb_copy_bits() if they want to access data beyond layer 4 header\\
+\vspace{3mm}
+\vspace{3mm}
+\end{slide}
+\begin{slide}
+HA for netfillter/iptables\\
+Introduction\\
+\vspace{3mm}
+What is special about firewall failover?\\
+\vspace{3mm}
+ Nothing, in case of the stateless packet filter\\
+ Common IP takeover solutions can be used\\
+ VRRP\\
+ Hartbeat\\
+\vspace{3mm}
+ Distribution of packet filtering ruleset no problem\\
+ can be done manually\\
+ or implemented with simple userspace process\\
+\vspace{3mm}
+ Problems arise with stateful packet filters\\
+ Connection state only on active node\\
+ NAT mappings only on active node\\
+\vspace{3mm}
+\vspace{3mm}
+\vspace{3mm}
+\end{slide}
+\begin{slide}
+HA for netfillter/iptables\\
+Poor man's failover\\
+\vspace{3mm}
+Poor man's failover\\
+ principle\\
+ let every node do it's own tracking rather than replicating state\\
+ two possible implementations\\
+ connect every node to shared media (i.e. real ethernet)\\
+ forwarding only turned on on active node\\
+ slave nodes use promiscuous mode to sniff packets\\
+ copy all traffic to slave nodes\\
+ active master needs to copy all traffic to other nodes\\
+ disadvantage: high load, sync traffic == payload traffic\\
+ IMHO stupid way of solving the problem \\
+ advantages\\
+ very easy implementation\\
+ only addition of sniffing mode to conntrack needed\\
+ existing means of address takeover can be used\\
+ same load on active master and slave nodes\\
+ no additional load on active master\\
+ disadvantages\\
+ can only be used with real shared media (no switches, ...)\\
+ can not be used with NAT\\
+ remaining problem\\
+ no initial state sync after reboot of slave node!\\
+\vspace{3mm}
+\vspace{3mm}
+\vspace{3mm}
+\end{slide}
+\begin{slide}
+HA for netfillter/iptables\\
+Real state replication\\
+\vspace{3mm}
+Parts needed\\
+ state replication protocol\\
+ multicast based\\
+ sequence numbers for detection of packet loss\\
+ NACK-based retransmission\\
+ no security, since private ethernet segment to be used\\
+ event interface on active node\\
+ calling out to callback function at all state changes\\
+ exported interface to manipulate conntrack hash table\\
+ kernel thread for sending conntrack state protocol messages\\
+ registers with event interface\\
+ creates and accumulates state replication packets\\
+ sends them via in-kernel sockets api\\
+ kernel thread for receiving conntrack state replication messages\\
+ receives state replication packets via in-kernel sockets\\
+ uses conntrack hashtable manipulation interface\\
+\vspace{3mm}
+\vspace{3mm}
+\vspace{3mm}
+\end{slide}
+\begin{slide}
+HA for netfillter/iptables\\
+Real state replication\\
+\vspace{3mm}
+ Flow of events in chronological order:\\
+ on active node, inside the network RX softirq\\
+ connection tracking code is analyzing a forwarded packet\\
+ connection tracking gathers some new state information\\
+ connection tracking updates local connection tracking database\\
+ connection tracking sends event message to event API\\
+ on active node, inside the conntrack-sync kernel thread\\
+ conntrack sync daemon receives event through event API\\
+ conntrack sync daemon aggregates multiple event messages into a state replication protocol message, removing possible redundancy\\
+ conntrack sync daemon generates state replication protocol message\\
+ conntrack sync daemon sends state replication protocol message\\
+ on slave node(s), inside network RX softirq\\
+ connection tracking code ignores packets coming from the interface attached to the private conntrac sync network\\
+ state replication protocol messages is appended to socket receive queue of conntrack-sync kernel thread\\
+ on slave node(s), inside conntrack-sync kernel thread\\
+ conntrack sync daemon receives state replication message\\
+ conntrack sync daemon creates/updates conntrack entry\\
+\vspace{3mm}
+\vspace{3mm}
+\end{slide}
+\begin{slide}
+HA for netfillter/iptables\\
+Neccessary changes to kernel\\
+\vspace{3mm}
+Neccessary changes to current conntrack core\\
+\vspace{3mm}
+ event generation (callback functions) for all state changes\\
+\vspace{3mm}
+ conntrack hashtable manipulation API\\
+ is needed (and already implemented) for 'ctnetlink' API\\
+\vspace{3mm}
+ conntrack exemptions\\
+ needed to _not_ track conntrack state replication packets\\
+ is needed for other cases as well\\
+ currently being developed by Jozsef Kadlecsik\\
+\vspace{3mm}
+\vspace{3mm}
+\vspace{3mm}
+\end{slide}
+\begin{slide}
+Future of Linux packet filtering\\
+Thanks\\
+ The slides of this presentation are available at http://www.gnumonks.org/\\
+\vspace{3mm}
+ Visit the netfilter homepage http://www.netfilter.org/\\
+\vspace{3mm}
+ Thanks to\\
+ the BBS people, Z-Netz, FIDO, ...\\
+ for heavily increasing my computer usage in 1992\\
+ KNF\\
+ for bringing me in touch with the internet as early as 1994\\
+ for providing a playground for technical people\\
+ for telling me about the existance of Linux!\\
+ Alan Cox, Alexey Kuznetsov, David Miller, Andi Kleen\\
+ for implementing (one of?) the world's best TCP/IP stacks\\
+ Paul 'Rusty' Russell\\
+ for starting the netfilter/iptables project\\
+ for trusting me to maintain it today\\
+ Astaro AG\\
+ for sponsoring most of my current netfilter work\\
+\vspace{3mm}
+\end{slide}
+\end{document}
personal git repositories of Harald Welte. Your mileage may vary