bugzilla-daemon at netfilter.org
2018-Nov-20 00:11 UTC
[Bug 1302] New: iptables v1.8.0 (nf_tables) has a problem inverting in-interface and maybe out
https://bugzilla.netfilter.org/show_bug.cgi?id=1302 Bug ID: 1302 Summary: iptables v1.8.0 (nf_tables) has a problem inverting in-interface and maybe out Product: iptables Version: CVS (please indicate timestamp) Hardware: x86_64 OS: All Status: NEW Severity: major Priority: P5 Component: iptables Assignee: netfilter-buglog at lists.netfilter.org Reporter: trever at middleearth.sapphiresunday.org>From a script that works with plain iptables:iptables -A INPUT -i \!ppp0 -p udp --destination-port 53 -j ACCEPT # iptables-nft -A INPUT -i \!ppp0 -p tcp --destination-port 53 -j ACCEPT does not work! In part it yields: iifname "!ppp0" ip protocol tcp counter packets 0 bytes 0 accept in nft list ruleset I believe that is supposed to be iifname != "ppp0" ip protocol tcp counter packets 0 bytes 0 accept. I am afraid my attempts at finding why this is have not yielded any good results. This is the only thing keeping me from moving to iptables-nft from iptables and nft from ipset. I suppose one final thing. ipset had swap to swap one live set for another. I have some very large sometimes drastically change sets and this helps speed things up tremendously. -- You are receiving this mail because: You are watching all bug changes. -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20181120/b8dd9a84/attachment.html>
bugzilla-daemon at netfilter.org
2019-Jul-14 09:09 UTC
[Bug 1302] iptables v1.8.0 (nf_tables) has a problem inverting in-interface and maybe out
https://bugzilla.netfilter.org/show_bug.cgi?id=1302 Florian Westphal <fw at strlen.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Resolution|--- |INVALID CC| |fw at strlen.de Status|NEW |RESOLVED --- Comment #1 from Florian Westphal <fw at strlen.de> --- (In reply to trever from comment #0)> From a script that works with plain iptables: > iptables -A INPUT -i \!ppp0 -p udp --destination-port 53 -j ACCEPT > > # iptables-nft -A INPUT -i \!ppp0 -p tcp --destination-port 53 -j ACCEPT > > does not work! > > In part it yields: > > iifname "!ppp0" ip protocol tcp counter packets 0 bytes 0 accept > > in nft list ruleset > > I believe that is supposed to be > > iifname != "ppp0" ip protocol tcp counter packets 0 bytes 0 accept.No, its doing exactly what iptables is doing in this case. You need to use \! -i ppp0 (extra-positioned negation) instead. -- You are receiving this mail because: You are watching all bug changes. -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20190714/f2e1fa6e/attachment.html>
Seemingly Similar Threads
- [Bug 1253] New: interface wildcard in variables causes Error: Byteorder mismatch: expected big endian, got host endian
- [Bug 1308] New: iptables -i + is broken in v1.8.0
- [Bug 1277] New: v1.8.0 FTBFS on Void Linux due to conflicting definitions
- [Bug 872] New: extra symbols in console output
- [Bug 1358] New: Error when atomically replacing rules with symbolic variables