<html>
<head>
<base href="https://bugzilla.netfilter.org/" />
</head>
<body><table border="1" cellspacing="0" cellpadding="8">
<tr>
<th>Bug ID</th>
<td><a class="bz_bug_link
bz_status_NEW "
title="NEW - Fragmented packet filtering is broken iptables compatibility tools"
href="https://bugzilla.netfilter.org/show_bug.cgi?id=1318">1318</a>
</td>
</tr>
<tr>
<th>Summary</th>
<td>Fragmented packet filtering is broken iptables compatibility tools
</td>
</tr>
<tr>
<th>Product</th>
<td>nftables
</td>
</tr>
<tr>
<th>Version</th>
<td>unspecified
</td>
</tr>
<tr>
<th>Hardware</th>
<td>x86_64
</td>
</tr>
<tr>
<th>OS</th>
<td>other
</td>
</tr>
<tr>
<th>Status</th>
<td>NEW
</td>
</tr>
<tr>
<th>Severity</th>
<td>normal
</td>
</tr>
<tr>
<th>Priority</th>
<td>P5
</td>
</tr>
<tr>
<th>Component</th>
<td>iptables over nftable
</td>
</tr>
<tr>
<th>Assignee</th>
<td>pablo@netfilter.org
</td>
</tr>
<tr>
<th>Reporter</th>
<td>arnova@rocky.eld.leidenuniv.nl
</td>
</tr></table>
<p>
<div>
<pre>When using the iptables compatibility tools, creating rules for packet
defragmentation result in incorrect rules. When eg. using "iptables-compat -A
INPUT -f -j DROP" it results in "ip frag-off & 65311 == 0 ...." when it should
be "ip frag-off != 0 .....". The same thing occurs when using iptables-compat
restore|save. I can confirm this happens with both "iptables (compat) v1.6.1 /
nftables 0.8.2" on Mint x64 and RHEL 8-BETA with "iptables (compat) 1.8.0 and
nftables 0.9.0"</pre>
</div>
</p>
<hr>
<span>You are receiving this mail because:</span>
<ul>
<li>You are watching all bug changes.</li>
</ul>
</body>
</html>