bugzilla-daemon at netfilter.org
2020-Mar-01 20:17 UTC
[Bug 1412] New: ip6tables-nft not accepting "icmp" as shorthand for "icmpv6"
https://bugzilla.netfilter.org/show_bug.cgi?id=1412 Bug ID: 1412 Summary: ip6tables-nft not accepting "icmp" as shorthand for "icmpv6" Product: nftables Version: unspecified Hardware: x86_64 OS: Debian GNU/Linux Status: NEW Severity: minor Priority: P5 Component: iptables over nftable Assignee: pablo at netfilter.org Reporter: goliath at infraroot.at I recently upgraded a Debian 9.11 system to Debian 10.3. The old system had ip6tables v1.6.0 and I used iptables-persist to load the following simple configuration for IPv6: :INPUT DROP [0:0] :FORWARD DROP [0:0] :OUTPUT ACCEPT [0:0] -A INPUT -i lo -j ACCEPT -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT -A INPUT -p tcp -m tcp --dport 80 -j ACCEPT -A INPUT -p tcp -m tcp --dport 443 -j ACCEPT -A INPUT -p tcp -m tcp --dport 22 -j ACCEPT -A INPUT -p icmp -j ACCEPT -A INPUT -j REJECT --reject-with icmp6-port-unreachable -A FORWARD -j REJECT --reject-with icmp6-port-unreachable -A OUTPUT -j ACCEPT COMMIT which worked perfectly fine so far. After the upgrade, I had to change "icmp" to "icmpv6" or else the system would block icmpv6 traffic. The upgraded system now has iptables-nft, version v1.8.2 (nf_tables). -- You are receiving this mail because: You are watching all bug changes. -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20200301/9b64a542/attachment.html>
Maybe Matching Threads
- [Bug 1343] New: With iPv6 masquerade, ICMPv6 time-exceeded pkts are forwarded with bad checksum
- [Bug 926] New: icmp: ICMPv6 types are not supported
- [Bug 508] New: ip6tables conntrack marks all incoming packets as INVALID
- Re: Is it possible to block ipv6 auto configuration entering the tinc tunnel?
- FreeBSD Security Advisory FreeBSD-SA-08:09.icmp6