[Bug 1318] Fragmented packet filtering is broken iptables compatibility tools

bugzilla-daemon at netfilter.org bugzilla-daemon at netfilter.org
Sun Jul 14 11:31:38 CEST 2019


Florian Westphal <fw at strlen.de> changed:

           What    |Removed                     |Added
                 CC|                            |fw at strlen.de
             Status|NEW                         |RESOLVED
         Resolution|---                         |FIXED

--- Comment #1 from Florian Westphal <fw at strlen.de> ---
(In reply to Arno from comment #0)
> When using the iptables compatibility tools, creating rules for packet
> defragmentation result in incorrect rules. When eg. using "iptables-compat
> -A INPUT -f -j DROP" it results in "ip frag-off & 65311 == 0 ...." when it
> should be "ip frag-off != 0 .....". The same thing occurs when using
> iptables-compat restore|save. I can confirm this happens with both "iptables
> (compat) v1.6.1 / nftables 0.8.2" on Mint x64 and RHEL 8-BETA with "iptables
> (compat) 1.8.0 and nftables 0.9.0"

Works for me on iptables-nft 1.8.2.

You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20190714/4d7dd7a6/attachment.html>

More information about the netfilter-buglog mailing list