[Bug 1422] iptables-nft raw notrack rules are wrong
bugzilla-daemon at netfilter.org
bugzilla-daemon at netfilter.org
Wed Apr 15 18:52:09 CEST 2020
https://bugzilla.netfilter.org/show_bug.cgi?id=1422
--- Comment #6 from Pablo Neira Ayuso <pablo at netfilter.org> ---
Here it works fine:
# nft -s list ruleset
table ip raw {
chain PREROUTING {
type filter hook prerouting priority raw; policy accept;
}
chain OUTPUT {
type filter hook output priority raw; policy accept;
}
}
root at salvia:/home/pablo# iptables-nft -t raw -I OUTPUT -p udp -d 169.254.25.10
--dport 53 -j NOTRACK
root at salvia:/home/pablo# nft -s list ruleset
table ip raw {
chain PREROUTING {
type filter hook prerouting priority raw; policy accept;
}
chain OUTPUT {
type filter hook output priority raw; policy accept;
meta l4proto udp ip daddr 169.254.25.10 udp dport 53 counter
notrack
}
}
Make sure iptables-nft there is not using the old libraries, in my test machine
I have them here:
/usr/lib/xtables/
if you have installed the iptables / nftables package from debian, it might be
that your /usr/lib/xtables/ refers to the extension libraries in
/usr/lib/x86_64-linux-gnu/xtables/.
--
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20200415/f6d05fa8/attachment-0001.html>
More information about the netfilter-buglog
mailing list