bugzilla-daemon at netfilter.org
2020-Jan-19 10:37 UTC
[Bug 1399] New: tables/chains priority doesn't work
https://bugzilla.netfilter.org/show_bug.cgi?id=1399
Bug ID: 1399
Summary: tables/chains priority doesn't work
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: kernel
Assignee: pablo at netfilter.org
Reporter: david at hajes.org
running latest Debian 10 in VPS/KVM - nftables v0.9.2 (Scram)
nftables are initialized by scripts. I have following tables/chains
table ip nat {
set bad_ip {
type ipv4_addr
}
chain prerouting {
type nat hook prerouting priority dstnat; policy accept;
meta nftrace set 1 ip saddr @bad_ip tcp dport { 80, 443 } redirect to
:8080
}
}
table filter {
chain prerouting {type filter hook prerouting priority -150;}
chain input {type filter hook input priority 0; policy drop;}
chain output {type filter hook output priority 0; policy drop;}
}
chain input {
type filter hook input priority filter; policy drop;
iifname "lo" accept
ct state established,related accept
ct state new ip daddr $ip_external tcp sport 1024-65535 tcp dport { 22,
80, 443, 8080 } accept
}
there is more rules but this is for simplicity. I am trying to achieve a
redirect of blocked IPs/CIDR to port 8080.
If I understand correctly "nat prerouting" is before routing decision
and thus
before "filter input".
I used "nft -nn monitor trace" and "nat prerouting" is
ignored and "filter
input" is executed.
I wonder what is going on, documentation is sparse...nft doesn't complain
about
added rules but they are not executed.
any suggestion, please?
Regards
David
--
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
<http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20200119/313afbe1/attachment.html>
bugzilla-daemon at netfilter.org
2020-Jan-21 18:19 UTC
[Bug 1399] tables/chains priority doesn't work
https://bugzilla.netfilter.org/show_bug.cgi?id=1399
david at hajes.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Resolution|--- |FIXED
Status|NEW |RESOLVED
--- Comment #1 from david at hajes.org ---
incorrect tcpdump reading. I appologize for any inconvenience
--
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
<http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20200121/7f802eef/attachment.html>
Maybe Matching Threads
- HOWTO: Temporary dynamic blocking with Shorewall and Portsentry
- [Bug 1305] New: Rules in second chain same hook ignored if first chain has policy drop
- [Bug 1673] New: bug egress hook virtio interface with VLAN
- [PATCH v7 0/7] Add virtio-iommu driver
- [Bug 1672] New: bug egress hook virtio interface with VLAN