bugzilla-daemon at netfilter.org
2014-May-07  07:32 UTC
[Bug 928] New: ECN: --ecn-tcp-ece and --ecn-ip-ect is not supported
https://bugzilla.netfilter.org/show_bug.cgi?id=928
           Summary: ECN: --ecn-tcp-ece and --ecn-ip-ect is not supported
           Product: nftables
           Version: unspecified
          Platform: x86_64
        OS/Version: Debian GNU/Linux
            Status: NEW
          Severity: normal
          Priority: P5
         Component: nft
        AssignedTo: pablo at netfilter.org
        ReportedBy: anarey at gmail.com
   Estimated Hours: 0.0
The following command-line parameters in ECN iptables-extensions are not
supported in nft yet:
--ecn-tcp-ece
--ecn-ip-ect
The last commit in Pablo git tree of kernel is "40e6442 netfilter:
x_tables:
allow to use cgroup match for LOCAL_IN nf hooks"
The last commit in libmnl repo is "090a842 examples: use
mnl_socket_setsockopt"
The last commit in libnftnl repo is "57107c2 common: fix unconditional
output
of event wrapping stuff"
The last commit in nftables repo is "aefa9bf expression: Fix inconsistent
output in set"
-- 
Configure bugmail: https://bugzilla.netfilter.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.
bugzilla-daemon at netfilter.org
2016-May-13  19:37 UTC
[Bug 928] ECN: --ecn-tcp-ece and --ecn-ip-ect is not supported
https://bugzilla.netfilter.org/show_bug.cgi?id=928
Pablo Neira Ayuso <pablo at netfilter.org> changed:
           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |RESOLVED
         Resolution|---                         |WONTFIX
--- Comment #1 from Pablo Neira Ayuso <pablo at netfilter.org> ---
We can match these via 'tcp flags'.
# nft --debug=netlink add rule x y tcp flags ecn,cwr
ip x y 
  [ payload load 1b @ network header + 9 => reg 1 ]
  [ cmp eq reg 1 0x00000006 ]
  [ payload load 1b @ transport header + 13 => reg 1 ]
  [ bitwise reg 1 = (reg=1 & 0x000000c0 ) ^ 0x00000000 ]
  [ cmp neq reg 1 0x00000000 ]
Closing.
-- 
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
<http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20160513/b7ec66ab/attachment-0001.html>