[Bug 1422] iptables-nft raw notrack rules are wrong

bugzilla-daemon at netfilter.org bugzilla-daemon at netfilter.org
Wed Apr 15 18:52:09 CEST 2020


https://bugzilla.netfilter.org/show_bug.cgi?id=1422

--- Comment #6 from Pablo Neira Ayuso <pablo at netfilter.org> ---
Here it works fine:

# nft -s list ruleset
table ip raw {
        chain PREROUTING {
                type filter hook prerouting priority raw; policy accept;
        }

        chain OUTPUT {
                type filter hook output priority raw; policy accept;
        }
}
root at salvia:/home/pablo# iptables-nft -t raw -I OUTPUT -p udp -d 169.254.25.10
--dport 53 -j NOTRACK
root at salvia:/home/pablo# nft -s list ruleset
table ip raw {
        chain PREROUTING {
                type filter hook prerouting priority raw; policy accept;
        }

        chain OUTPUT {
                type filter hook output priority raw; policy accept;
                meta l4proto udp ip daddr 169.254.25.10 udp dport 53 counter
notrack
        }
}

Make sure iptables-nft there is not using the old libraries, in my test machine
I have them here:

/usr/lib/xtables/

if you have installed the iptables / nftables package from debian, it might be
that your /usr/lib/xtables/ refers to the extension libraries in
/usr/lib/x86_64-linux-gnu/xtables/.

-- 
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20200415/f6d05fa8/attachment-0001.html>


More information about the netfilter-buglog mailing list