[Bug 966] iptables can't change or drop or any effect on scapy packet!
bugzilla-daemon at netfilter.org
bugzilla-daemon at netfilter.org
Sat Aug 5 02:33:44 CEST 2023
https://bugzilla.netfilter.org/show_bug.cgi?id=966
Phil Sutter <phil at nwl.cc> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
CC| |phil at nwl.cc
Resolution|--- |INVALID
--- Comment #1 from Phil Sutter <phil at nwl.cc> ---
As per the one reply on stackexchange, raw sockets will bypass iptables.
Using nftables with its egress hook solves the problem, though:
table netdev t {
chain c {
type filter hook egress device "eth0" priority filter;
udp dport 53 counter drop
}
}
This snippet works in dropping any UDP packets sent via eth0 with destination
port 53, even with using a raw socket.
--
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20230805/c8736ccb/attachment.html>
More information about the netfilter-buglog
mailing list