[NETFILTER]: nf_conntrack_sip: perform NAT after parsing
Perform NAT last after parsing the packet. This makes no difference currently, but is needed when dealing with registrations to make sure we seen the unNATed addresses. Signed-off-by: Patrick McHardy <kaber@trash.net> Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
committed by
David S. Miller
parent
30f33e6dee
commit
33cb1e9a93
@@ -104,9 +104,6 @@ static unsigned int ip_nat_sip(struct sk_buff *skb,
|
||||
union nf_inet_addr addr;
|
||||
__be16 port;
|
||||
|
||||
if (*datalen < strlen("SIP/2.0"))
|
||||
return NF_ACCEPT;
|
||||
|
||||
/* Basic rules: requests and responses. */
|
||||
if (strnicmp(*dptr, "SIP/2.0", strlen("SIP/2.0")) != 0) {
|
||||
if (ct_sip_parse_request(ct, *dptr, *datalen,
|
||||
|
Reference in New Issue
Block a user