bugzilla-daemon at netfilter.org
2017-Jun-05 19:32 UTC
[Bug 1155] New: arp forward filter doesn't work
https://bugzilla.netfilter.org/show_bug.cgi?id=1155
Bug ID: 1155
Summary: arp forward filter doesn't work
Product: nftables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: kernel
Assignee: pablo at netfilter.org
Reporter: maxime.deroucy at gmail.com
Hello,
I tried to use nftables arp table on forward hook but it doesn't work.
The wiki says arp hooks are input and output but nft doesn't fail when
I add it.
https://wiki.nftables.org/wiki-nftables/index.php/Quick_reference-nftables_in_10_minutes#Chains
Add the table on host1 :
```
table arp arptest {
chain input {
type filter hook input priority 0; policy accept;
counter log prefix "INPUT FILTER ARP: "
}
chain forward {
type filter hook forward priority 0; policy accept;
counter log prefix "FORWARD FILTER ARP: "
}
chain output {
type filter hook output priority 0; policy accept;
counter log prefix "OUTPUT FILTER ARP: "
}
}
```
The topologie of my network (1 host, 2 vms):
host1
virbr0 192.168.122.1 (bridge containing vnet1 and vnet2)
vnet1 vnet2
↕ ↕
ens3 ens3
192.168.122.2 192.168.122.3
vm1 vm2
problem:
```
vm1$ arping -I ens3 192.168.122.3
```
On host1 I see input counter increasing, "INPUT FILTER ARP" logs in
journalctl ; but nothing else.
Output counter doesn't move (no "OUTPUT …" logs), which is normal.
But forward counter doesn't move either (no "FORWARD …" logs)
which
isn't normal !
Did I do something wrong ? Did I misunderstand something ?
If arp can't be use on forward hook, why nft doesn't raise an error
when I added the chain ?
```
max at mde-test % nft -v
nftables v0.7 (Scrooge McDuck)
max at mde-test % uname -a
Linux mde-test 4.10.13-1-ARCH #1 SMP PREEMPT Thu Apr 27 12:15:09 CEST 2017
x86_64 GNU/Linux
```
More informations can be found here:
https://pelican.craoc.fr/nftables.html#arp-vm1-vm2
--
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
<http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20170605/3fb65d41/attachment.html>
bugzilla-daemon at netfilter.org
2017-Jun-05 19:32 UTC
[Bug 1155] arp forward filter doesn't work
https://bugzilla.netfilter.org/show_bug.cgi?id=1155
Maxime de Roucy <maxime.deroucy at gmail.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |maxime.deroucy at gmail.com
--
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
<http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20170605/f10a2633/attachment.html>
bugzilla-daemon at netfilter.org
2017-Jun-05 19:47 UTC
[Bug 1155] arp forward filter doesn't work
https://bugzilla.netfilter.org/show_bug.cgi?id=1155
Florian Westphal <fw at strlen.de> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |fw at strlen.de
--- Comment #1 from Florian Westphal <fw at strlen.de> ---
Indeed, I think we should reject the forward chain.
I guess its there because the legacy 'call-arptables' sysctl from bridge
netfilter does allow to push packets through arptables, but I think with
nft you can just use bridge family to filter arp packets that pass through a
bridge.
--
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
<http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20170605/11155422/attachment.html>
bugzilla-daemon at netfilter.org
2017-Aug-08 13:31 UTC
[Bug 1155] arp forward filter doesn't work
https://bugzilla.netfilter.org/show_bug.cgi?id=1155
Florian Westphal <fw at strlen.de> changed:
What |Removed |Added
----------------------------------------------------------------------------
Assignee|pablo at netfilter.org |fw at strlen.de
Status|NEW |RESOLVED
Resolution|--- |FIXED
--- Comment #2 from Florian Westphal <fw at strlen.de> ---
The kernel will now reject the non-working forward chain (that should not have
been there in first place).
--
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
<http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20170808/cbaefe75/attachment.html>