bugzilla-daemon at netfilter.org
2020-Mar-01 20:17 UTC
[Bug 1412] New: ip6tables-nft not accepting "icmp" as shorthand for "icmpv6"
https://bugzilla.netfilter.org/show_bug.cgi?id=1412
Bug ID: 1412
Summary: ip6tables-nft not accepting "icmp" as shorthand
for
"icmpv6"
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: minor
Priority: P5
Component: iptables over nftable
Assignee: pablo at netfilter.org
Reporter: goliath at infraroot.at
I recently upgraded a Debian 9.11 system to Debian 10.3.
The old system had ip6tables v1.6.0 and I used iptables-persist
to load the following simple configuration for IPv6:
:INPUT DROP [0:0]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [0:0]
-A INPUT -i lo -j ACCEPT
-A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 22 -j ACCEPT
-A INPUT -p icmp -j ACCEPT
-A INPUT -j REJECT --reject-with icmp6-port-unreachable
-A FORWARD -j REJECT --reject-with icmp6-port-unreachable
-A OUTPUT -j ACCEPT
COMMIT
which worked perfectly fine so far. After the upgrade, I had to
change "icmp" to "icmpv6" or else the system would block
icmpv6
traffic.
The upgraded system now has iptables-nft, version v1.8.2 (nf_tables).
--
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
<http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20200301/9b64a542/attachment.html>
Apparently Analagous Threads
- [Bug 1343] New: With iPv6 masquerade, ICMPv6 time-exceeded pkts are forwarded with bad checksum
- [Bug 926] New: icmp: ICMPv6 types are not supported
- [Bug 508] New: ip6tables conntrack marks all incoming packets as INVALID
- Re: Is it possible to block ipv6 auto configuration entering the tinc tunnel?
- FreeBSD Security Advisory FreeBSD-SA-08:09.icmp6
