Documentation on
connection tracking says about property
enabled:
Allows to disable or enable connection tracking. Disabling connection tracking will cause several firewall features to stop working. See the list of affected features. Starting from v6.0rc2 default value is auto. Which means that connection tracing is disabled until at least one firewall rule is added.
But if there are some rules (because they make sense to be used in stateless firewall scenario), connection tracking is not entirely disabled. So it seems they came with the "workaround" rules, which are pretty similar to rules which one can construct manually and would only affect portion of traffic flowing through router. And in this case the property of these default rules comes into play:
/ip firewall filter
add chain=input action=accept connection-state=established,related,untracked comment="defconf: accept established,related,untracked"
add chain=forward action=accept connection-state=established,related,untracked comment="defconf: accept established,related, untracked"
Which, IMO, at the end of the day means that "connection tracking disabled half way" means only limited reduction of processing required ... firewall still has to at least look at packet to determine that it doesn't need connection tracking (so it skips actual classification part) and it still processes a few firewall filter rules ... until it hits one of rules quoted above (how many filter rules that is depends on actual order of firewall filter rules, default config has the rule for chain=forward only 4th). I wonder if in some scenarios keeping full connection tracking with fast-tracking enabled doesn't actually give better performance.