bugzilla-daemon at netfilter.org
2018-Nov-20 00:11 UTC
[Bug 1302] New: iptables v1.8.0 (nf_tables) has a problem inverting in-interface and maybe out
https://bugzilla.netfilter.org/show_bug.cgi?id=1302
Bug ID: 1302
Summary: iptables v1.8.0 (nf_tables) has a problem inverting
in-interface and maybe out
Product: iptables
Version: CVS (please indicate timestamp)
Hardware: x86_64
OS: All
Status: NEW
Severity: major
Priority: P5
Component: iptables
Assignee: netfilter-buglog at lists.netfilter.org
Reporter: trever at middleearth.sapphiresunday.org
>From a script that works with plain iptables:
iptables -A INPUT -i \!ppp0 -p udp --destination-port 53 -j ACCEPT
# iptables-nft -A INPUT -i \!ppp0 -p tcp --destination-port 53 -j ACCEPT
does not work!
In part it yields:
iifname "!ppp0" ip protocol tcp counter packets 0 bytes 0 accept
in nft list ruleset
I believe that is supposed to be
iifname != "ppp0" ip protocol tcp counter packets 0 bytes 0 accept.
I am afraid my attempts at finding why this is have not yielded any good
results.
This is the only thing keeping me from moving to iptables-nft from iptables and
nft from ipset. I suppose one final thing. ipset had swap to swap one live set
for another. I have some very large sometimes drastically change sets and this
helps speed things up tremendously.
--
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
<http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20181120/b8dd9a84/attachment.html>
bugzilla-daemon at netfilter.org
2019-Jul-14 09:09 UTC
[Bug 1302] iptables v1.8.0 (nf_tables) has a problem inverting in-interface and maybe out
https://bugzilla.netfilter.org/show_bug.cgi?id=1302
Florian Westphal <fw at strlen.de> changed:
What |Removed |Added
----------------------------------------------------------------------------
Resolution|--- |INVALID
CC| |fw at strlen.de
Status|NEW |RESOLVED
--- Comment #1 from Florian Westphal <fw at strlen.de> ---
(In reply to trever from comment #0)> From a script that works with plain iptables:
> iptables -A INPUT -i \!ppp0 -p udp --destination-port 53 -j ACCEPT
>
> # iptables-nft -A INPUT -i \!ppp0 -p tcp --destination-port 53 -j ACCEPT
>
> does not work!
>
> In part it yields:
>
> iifname "!ppp0" ip protocol tcp counter packets 0 bytes 0 accept
>
> in nft list ruleset
>
> I believe that is supposed to be
>
> iifname != "ppp0" ip protocol tcp counter packets 0 bytes 0
accept.
No, its doing exactly what iptables is doing in this case.
You need to use
\! -i ppp0
(extra-positioned negation) instead.
--
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
<http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20190714/f2e1fa6e/attachment.html>
Maybe Matching Threads
- [Bug 1253] New: interface wildcard in variables causes Error: Byteorder mismatch: expected big endian, got host endian
- [Bug 1308] New: iptables -i + is broken in v1.8.0
- [Bug 1277] New: v1.8.0 FTBFS on Void Linux due to conflicting definitions
- [Bug 872] New: extra symbols in console output
- [Bug 1358] New: Error when atomically replacing rules with symbolic variables