bugzilla-daemon at netfilter.org
2018-Nov-11 18:48 UTC
[Bug 1292] New: issue with -f fragment option
https://bugzilla.netfilter.org/show_bug.cgi?id=1292 Bug ID: 1292 Summary: issue with -f fragment option Product: nftables Version: unspecified Hardware: x86_64 OS: Debian GNU/Linux Status: NEW Severity: normal Priority: P5 Component: iptables over nftable Assignee: pablo at netfilter.org Reporter: arturo at debian.org>From Debian BTS: https://bugs.debian.org/913088There seems to be some issues with the '-f' option in iptables-nft. Apparently is not only in the printing code path but probably also in expr generation code. See original bug report in debian for more tests and details. ==== 8< ===Note the output of iptables-translate: iptables-translate -A INPUT -f -j DROP nft add rule ip filter INPUT ip frag-off & 0x1fff != 0 counter drop However, if I execute this command: iptables -A INPUT -f -j DROP The following is added (output of 'nft list table filter'): table ip filter { chain INPUT { ... ip frag-off & 65311 != 0 counter packets 0 bytes 0 drop } ... } Note: 65311 (dec) = 0xff1f and not 0x1ffff. Could it be that the byte order for the mask is somehow swapped? ==== 8< === -- You are receiving this mail because: You are watching all bug changes. -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20181111/51b3e4cd/attachment.html>
bugzilla-daemon at netfilter.org
2018-Nov-11 21:11 UTC
[Bug 1292] issue with -f fragment option
https://bugzilla.netfilter.org/show_bug.cgi?id=1292 Florian Westphal <fw at strlen.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Resolution|--- |FIXED Status|NEW |RESOLVED CC| |fw at strlen.de --- Comment #1 from Florian Westphal <fw at strlen.de> --- (In reply to Arturo Borrero Gonzalez from comment #0)> Note: 65311 (dec) = 0xff1f and not 0x1ffff. Could it be that the byte > order for the mask is somehow swapped?Yes, i've pushed a fix. http://git.netfilter.org/iptables/commit/?id=05947c82232e3a3d20f93a1ba18e35e7f4e23671 -- You are receiving this mail because: You are watching all bug changes. -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20181111/b5df34d0/attachment.html>
Reasonably Related Threads
- [Bug 1347] New: ebtables-nft: regression in -o option
- [Bug 1298] New: Issue with REJECT in custom chains
- [Bug 1318] New: Fragmented packet filtering is broken iptables compatibility tools
- [Bug 1286] New: -Z regression
- [Bug 1290] New: ptables: nftables layer breaks ipsec/policy keyword