Displaying 20 results from an estimated 35 matches for "iifnam".
Did you mean:
iifname
2018 May 01
2
[Bug 1253] New: interface wildcard in variables causes Error: Byteorder mismatch: expected big endian, got host endian
...: x86_64
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
Reporter: ian.kumlien at gmail.com
if you do:
define $interfaces = {
tun*,
lo
}
and then using that variable:
iifname $interfaces accept
results in:
Error: Byteorder mismatch: expected big endian, got host endian
but if i do:
iifname tun* accept
it works.
This, is odd, and should be fixed ;)
nft 0.8.3
--
You are receiving this mail because:
You are watching all bug changes.
-------------- next part -------...
2019 Aug 27
3
[Bug 1360] New: BUG: invalid expression type concat on invalid input "iifname . oifname p . q"
https://bugzilla.netfilter.org/show_bug.cgi?id=1360
Bug ID: 1360
Summary: BUG: invalid expression type concat on invalid input
"iifname . oifname p . q"
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: normal
Priority: P5
Component: nft
Assignee: pablo at netfilter.org...
2017 Nov 09
8
[Bug 1201] New: Some filters randomly do not work since version 0.8
...issue is only present with filters for
tcp ports but this is just a guess.
Here is what my ip input filter chain looks like:
table ip filter {
chain INPUT {
type filter hook input priority 0; policy accept;
ct state established,related accept
iifname "eth0" tcp dport { 22, 80, 443 } counter accept
iifname "lo" accept
tcp dport 80 counter
iifname "eth0" tcp dport 80 counter
iifname "eth0" tcp dport { 80, 111 } counter
iifname...
2013 Nov 11
4
[Bug 872] New: extra symbols in console output
...6_64
OS/Version: All
Status: NEW
Severity: normal
Priority: P5
Component: nft
AssignedTo: pablo at netfilter.org
ReportedBy: loki at lokis-chaos.de
Estimated Hours: 0.0
nft shows extra symbols. I could reproduce this at least for iifname.
The extra symbols are not shown if the output is not the tty:
fwtest01 ~ # nft -i
nft> table filter
nft> add chain filter input
nft> add rule filter input meta iifname "lo" accept
nft> list table filter
table ip filter {
chain input {
meta iifname...
2024 Jul 13
2
[Bug 1758] New: Design flaw in chain traversal
...type inet_proto
elements = { icmp, icmpv6 }
}
set allowed_tcp_dports {
type inet_service
elements = { ssh }
}
chain allow {
ct state established,related accept
meta l4proto @allowed_protocols accept
iifname @allowed_interfaces accept
tcp dport @allowed_tcp_dports accept
}
chain input {
type filter hook input priority filter + 10;
policy accept
jump allow
reject with icmpx type port-unreachable
}
}
which, at a f...
2019 Jul 25
3
[Bug 1358] New: Error when atomically replacing rules with symbolic variables
...aster compilation log
OS: Arch Linux
Kernel: Linux 5.2.2-arch1-1-ARCH
nftables: v0.9.1
With the following `/etc/nftables.conf` file:
#!/sbin/nft -f
define ifs = {lo}
table inet filter {
chain input {
type filter hook input priority 0; policy drop;
}
}
inet filter input iifname $ifs accept
The atomic rule replacement gives the following error:
$ nft flush ruleset ';' include '"/etc/nftables.conf"'
In file included from (null):1:17-51:
/etc/nftables.conf:13:19-37: Error: Could not process rule: No such file or
directory
inet filter inpu...
2018 Oct 24
1
[Bug 1284] New: nft doesn't accept interface names starting with a number
...t: nftables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
Reporter: ville.skytta at iki.fi
...at least in iifname, oifname. Not a problem otherwise for the system to have
interface names starting with a number that I can see. For example:
# ip link show dev 5af3c3f0
14: 5af3c3f0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc [...]
# nft add rule inet filter forward iifname 5af3c3f0 jump meh
Error:...
2018 Nov 20
1
[Bug 1302] New: iptables v1.8.0 (nf_tables) has a problem inverting in-interface and maybe out
...ilter.org
Reporter: trever at middleearth.sapphiresunday.org
>From a script that works with plain iptables:
iptables -A INPUT -i \!ppp0 -p udp --destination-port 53 -j ACCEPT
# iptables-nft -A INPUT -i \!ppp0 -p tcp --destination-port 53 -j ACCEPT
does not work!
In part it yields:
iifname "!ppp0" ip protocol tcp counter packets 0 bytes 0 accept
in nft list ruleset
I believe that is supposed to be
iifname != "ppp0" ip protocol tcp counter packets 0 bytes 0 accept.
I am afraid my attempts at finding why this is have not yielded any good
results.
This is the...
2024 Oct 29
21
[Bug 1777] New: Error: COMMAND_FAILED: 'python-nftables' failed
...t;accept": null}]}}}, {"insert":
{"rule": {"family": "inet", "table": "firewalld", "chain":
"filter_INPUT_ZONES", "expr": [{"match": {"left": {"meta": {"key": "iifname"}},
"op": "==", "right": "eth1"}}, {"goto": {"target": "filter_IN_internal"}}]}}},
{"insert": {"rule": {"family": "inet", "table": "firewalld", "chain":...
2014 May 28
1
[Bug 954] New: iffname doesn't work with sets.
...OS/Version: All
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
AssignedTo: pablo at netfilter.org
ReportedBy: anarey at gmail.com
Estimated Hours: 0.0
We add the following rule:
sudo nft add rule ip test input meta iifname {eth0, wlan0}
or
sudo nft add rule ip test input meta iifname {"eth0", "wlan0"}
and nft lists it:
$ sudo nft list table ip test
table ip test {
chain input {
iifname { "", "" }
}
}
--
Configure bugmail: https://bugzilla.netfilter.org/user...
2018 Apr 24
2
[Bug 1248] New: The rr-load-balance part doesn't actually work on 0.7
...Severity: minor
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
Reporter: ian.kumlien at gmail.com
This might be known, 0.7 is old - but if it isn't then... ;)
I added two rules like this in table nat, chain prerouting (with a hook):
iifname $ext_if ip saddr $external_dns_servers tcp dport $external_dns_ports
dnat to numgen inc mod 3 map { 0: 10.0.0.2, 1: 10.0.0.3, 2: 10.0.0.4 }
iifname $ext_if ip saddr $external_dns_servers udp dport $external_dns_ports
dnat to numgen inc mod 3 map { 0: 10.0.0.2, 1: 10.0.0.3, 2: 10.0.0.4 }
And they...
2017 Oct 21
3
[Bug 1195] New: 'list ruleset' of 'nft -f' outputs garbage while 'nft list ruleset' seems to work.
...t: nft
Assignee: pablo at netfilter.org
Reporter: slyfox at inbox.ru
# This report is a valid nft file.
# $ uname -r
# 4.14.0-rc5-00009-g3728e6a255b5
# run as: 'nft -f nft.bug'
# This will output:
# table inet filter {
# chain local-input {
# iifname "lo" meta nfproto ipv4 payload @nh,96,64
0x7f0000017f000001 [invalid type] ip protocol udp counter packets 0 bytes 0
accept
# }
# }
# While when we run 'list ruleset' right afterwards decoding is fine:
# table inet filter {
# chain local-input {
#...
2017 Oct 02
3
[Bug 1187] New: SIGABRT: "BUG: unknown expression type prefix"
...tus: NEW
Severity: minor
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
Reporter: alzeih at gmail.com
I'm experiencing a SIGABRT when using nft with a particular rule, when I was
expecting a parse error instead.
The rule is:
"iifname ens3 snat to 10.0.0.0/28"
Command output:
# nft -f /etc/nftables.conf
BUG: unknown expression type prefix
nft: netlink_linearize.c:688: netlink_gen_expr: Assertion `0' failed.
Aborted (core dumped)
With the following ruleset file:
#!/usr/bin/nft -f
# ipv4/ipv6 Simple & Safe Fire...
2020 Mar 12
3
[Bug 1413] New: Inconsistent EBUSY errors when adding a duplicate element to a map
...OS: Debian GNU/Linux 10 (Buster)
Kernel: 4.19.0-8-amd64
This works every time:
# nft -f - << EOF
flush ruleset
add table ip filter
add chain ip filter forward { type filter hook forward priority 0; policy
accept; }
add map ip filter foo { type ifname : verdict; }
add rule ip filter forward iifname vmap @foo
add element ip filter foo { "dummy0" : accept }
add element ip filter foo { "dummy0" : accept }
EOF
While these do not:
# nft -f - << EOF
flush ruleset
add table ip filter
add chain ip filter forward { type filter hook forward priority 0; policy
accept; }
add m...
2020 Oct 06
2
[Bug 1475] New: Array of addresses wrongly processed
....org
Reporter: kees.dejong+dev at neobits.nl
Tested and confirmed the following bug on Debian 10 (nftables-0.9.0-2 on kernel
5.4.51-v7l+) and Fedora 32 (nftables-0.9.3-3.fc32.x86_64 on kernel
5.8.12-200.fc32.x86_64).
I use the following command: `nft add rule inet firewalld filter_INPUT iifname
"eth0" ip saddr { 172.27.10.0/24, 172.27.11.0/24 } ip daddr 172.27.10.0/24 ct
state new accept`
Which is processed in the running configuration as: `iifname "eth0" ip saddr {
172.27.10.0/23 } ip daddr 172.27.10.0/24 ct state new accept`
Notice that the subnet has become /23 i...
2017 Apr 15
9
[Bug 1145] New: nft 0.7: expression.c:966: range_expr_value_low: Assertion '0' failed.
https://bugzilla.netfilter.org/show_bug.cgi?id=1145
Bug ID: 1145
Summary: nft 0.7: expression.c:966: range_expr_value_low:
Assertion '0' failed.
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Gentoo
Status: NEW
Severity: normal
Priority: P5
2023 Apr 07
3
[Bug 1671] New: Implicit chains and nesting result in parser_bison.y aborting
...vior:
* Nested, implicit chains could be used
* Any errors would be identified in the "source" (rather than process abort)
---
$ cat nested-chain-failure.nft
table inet global {
chain prerouting_pre_nat {
type filter hook prerouting priority mangle - 1; policy accept
iifname eth0 jump {
ip version 4 jump {
ip version 4 accept
}
}
}
}
$ cat without-nest.nft
table inet global {
chain prerouting_pre_nat {
type filter hook prerouting priority mangle - 1; policy accept
iifname eth0 jump {
ip version 4 accep...
2020 Apr 09
5
[Bug 1418] New: segfaults when running nft --file foo.nft --echo
...uot;/etc/nftables/init.nft") at libnftables.c:508
#20 0x000055555556acb9 in main (argc=<optimized out>, argv=0x7fffffffe1c8) at
main.c:455
When it is adding the rules and echoing, the output is kind of mangled. A rule
that looks like
table inet filter {
chain input_XXXXXXX {
iifname { "bond0" } ip saddr { 10.0.0.0/8 } ip daddr { 192.168.1.1 }
tcp dport { ssh } counter accept
}
}
Gets echoed as
add rule inet filter input_XXXXXXX iifname { "bond0", "bond0" } ip saddr {
10.0.0.0/8, 10.0.0.0/8-0xffffffff [invalid type] } ip daddr { 192.168.1.1,...
2023 Apr 24
13
[Bug 1674] New: ebtables causing packet loss
https://bugzilla.netfilter.org/show_bug.cgi?id=1674
Bug ID: 1674
Summary: ebtables causing packet loss
Product: ebtables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: critical
Priority: P5
Component: ebtables-nft
Assignee: pablo at netfilter.org
2024 Jul 20
2
[Bug 1762] New: coredump in --optimize
...eporter: pgnd at dev-mail.net
#!/usr/sbin/nft -f
define wan = "eth0"
define lan = "eth1"
define vpn = "tun0"
define server = "10.10.10.1"
table nat {
chain prerouting {
type nat hook prerouting priority -100; policy accept;
iifname $wan tcp dport 10000 dnat to $server:10000;
}
chain postrouting {
type nat hook postrouting priority 100; policy accept;
oifname $vpn masquerade
oifname $wan masquerade
}
}
checks ok, no error
nft -c -f tmp.nft
(...