GFK Linux clients had zero iptables rules, leaving the VIO client port (default 40000) unprotected. The kernel's conntrack could drop incoming VIO packets as INVALID, and the TCP stack would send RST responses to the crafted VIO packets. Added NOTRACK + INPUT DROP + RST DROP rules for GFK_VIO_CLIENT_PORT in: - _apply_firewall() / _remove_firewall() in embedded script - Outer install flow (replaces "no firewall rules needed") - start-both.sh service startup script
290 KiB
290 KiB