<html>
<head>
<base href="https://bugzilla.netfilter.org/" />
</head>
<body><span class="vcard"><a class="email" href="mailto:phil@nwl.cc" title="Phil Sutter <phil@nwl.cc>"> <span class="fn">Phil Sutter</span></a>
</span> changed
<a class="bz_bug_link
bz_status_RESOLVED bz_closed"
title="RESOLVED INVALID - iptables can't change or drop or any effect on scapy packet!"
href="https://bugzilla.netfilter.org/show_bug.cgi?id=966">bug 966</a>
<br>
<table border="1" cellspacing="0" cellpadding="8">
<tr>
<th>What</th>
<th>Removed</th>
<th>Added</th>
</tr>
<tr>
<td style="text-align:right;">Status</td>
<td>NEW
</td>
<td>RESOLVED
</td>
</tr>
<tr>
<td style="text-align:right;">CC</td>
<td>
</td>
<td>phil@nwl.cc
</td>
</tr>
<tr>
<td style="text-align:right;">Resolution</td>
<td>---
</td>
<td>INVALID
</td>
</tr></table>
<p>
<div>
<b><a class="bz_bug_link
bz_status_RESOLVED bz_closed"
title="RESOLVED INVALID - iptables can't change or drop or any effect on scapy packet!"
href="https://bugzilla.netfilter.org/show_bug.cgi?id=966#c1">Comment # 1</a>
on <a class="bz_bug_link
bz_status_RESOLVED bz_closed"
title="RESOLVED INVALID - iptables can't change or drop or any effect on scapy packet!"
href="https://bugzilla.netfilter.org/show_bug.cgi?id=966">bug 966</a>
from <span class="vcard"><a class="email" href="mailto:phil@nwl.cc" title="Phil Sutter <phil@nwl.cc>"> <span class="fn">Phil Sutter</span></a>
</span></b>
<pre>As per the one reply on stackexchange, raw sockets will bypass iptables.
Using nftables with its egress hook solves the problem, though:
table netdev t {
chain c {
type filter hook egress device "eth0" priority filter;
udp dport 53 counter drop
}
}
This snippet works in dropping any UDP packets sent via eth0 with destination
port 53, even with using a raw socket.</pre>
</div>
</p>
<hr>
<span>You are receiving this mail because:</span>
<ul>
<li>You are watching all bug changes.</li>
</ul>
</body>
</html>