search for: iifname

Displaying 20 results from an estimated 31 matches for "iifname".

Did you mean: ifname
2018 May 01
2
[Bug 1253] New: interface wildcard in variables causes Error: Byteorder mismatch: expected big endian, got host endian
...: x86_64 OS: All Status: NEW Severity: normal Priority: P5 Component: nft Assignee: pablo at netfilter.org Reporter: ian.kumlien at gmail.com if you do: define $interfaces = { tun*, lo } and then using that variable: iifname $interfaces accept results in: Error: Byteorder mismatch: expected big endian, got host endian but if i do: iifname tun* accept it works. This, is odd, and should be fixed ;) nft 0.8.3 -- You are receiving this mail because: You are watching all bug changes. -------------- next part --------...
2019 Aug 27
3
[Bug 1360] New: BUG: invalid expression type concat on invalid input "iifname . oifname p . q"
https://bugzilla.netfilter.org/show_bug.cgi?id=1360 Bug ID: 1360 Summary: BUG: invalid expression type concat on invalid input "iifname . oifname p . q" Product: nftables Version: unspecified Hardware: x86_64 OS: Debian GNU/Linux Status: NEW Severity: normal Priority: P5 Component: nft Assignee: pablo at netfilter.org R...
2017 Nov 09
8
[Bug 1201] New: Some filters randomly do not work since version 0.8
...issue is only present with filters for tcp ports but this is just a guess. Here is what my ip input filter chain looks like: table ip filter { chain INPUT { type filter hook input priority 0; policy accept; ct state established,related accept iifname "eth0" tcp dport { 22, 80, 443 } counter accept iifname "lo" accept tcp dport 80 counter iifname "eth0" tcp dport 80 counter iifname "eth0" tcp dport { 80, 111 } counter iifname &...
2013 Nov 11
4
[Bug 872] New: extra symbols in console output
...6_64 OS/Version: All Status: NEW Severity: normal Priority: P5 Component: nft AssignedTo: pablo at netfilter.org ReportedBy: loki at lokis-chaos.de Estimated Hours: 0.0 nft shows extra symbols. I could reproduce this at least for iifname. The extra symbols are not shown if the output is not the tty: fwtest01 ~ # nft -i nft> table filter nft> add chain filter input nft> add rule filter input meta iifname "lo" accept nft> list table filter table ip filter { chain input { meta iifname &...
2019 Jul 25
3
[Bug 1358] New: Error when atomically replacing rules with symbolic variables
...aster compilation log OS: Arch Linux Kernel: Linux 5.2.2-arch1-1-ARCH nftables: v0.9.1 With the following `/etc/nftables.conf` file: #!/sbin/nft -f define ifs = {lo} table inet filter { chain input { type filter hook input priority 0; policy drop; } } inet filter input iifname $ifs accept The atomic rule replacement gives the following error: $ nft flush ruleset ';' include '"/etc/nftables.conf"' In file included from (null):1:17-51: /etc/nftables.conf:13:19-37: Error: Could not process rule: No such file or directory inet filter input...
2018 Oct 24
1
[Bug 1284] New: nft doesn't accept interface names starting with a number
...t: nftables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: enhancement Priority: P5 Component: nft Assignee: pablo at netfilter.org Reporter: ville.skytta at iki.fi ...at least in iifname, oifname. Not a problem otherwise for the system to have interface names starting with a number that I can see. For example: # ip link show dev 5af3c3f0 14: 5af3c3f0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc [...] # nft add rule inet filter forward iifname 5af3c3f0 jump meh Error: s...
2018 Nov 20
1
[Bug 1302] New: iptables v1.8.0 (nf_tables) has a problem inverting in-interface and maybe out
...ilter.org Reporter: trever at middleearth.sapphiresunday.org >From a script that works with plain iptables: iptables -A INPUT -i \!ppp0 -p udp --destination-port 53 -j ACCEPT # iptables-nft -A INPUT -i \!ppp0 -p tcp --destination-port 53 -j ACCEPT does not work! In part it yields: iifname "!ppp0" ip protocol tcp counter packets 0 bytes 0 accept in nft list ruleset I believe that is supposed to be iifname != "ppp0" ip protocol tcp counter packets 0 bytes 0 accept. I am afraid my attempts at finding why this is have not yielded any good results. This is the o...
2014 May 28
1
[Bug 954] New: iffname doesn't work with sets.
...OS/Version: All Status: NEW Severity: enhancement Priority: P5 Component: nft AssignedTo: pablo at netfilter.org ReportedBy: anarey at gmail.com Estimated Hours: 0.0 We add the following rule: sudo nft add rule ip test input meta iifname {eth0, wlan0} or sudo nft add rule ip test input meta iifname {"eth0", "wlan0"} and nft lists it: $ sudo nft list table ip test table ip test { chain input { iifname { "", "" } } } -- Configure bugmail: https://bugzilla.netfilter.org/userp...
2018 Apr 24
2
[Bug 1248] New: The rr-load-balance part doesn't actually work on 0.7
...Severity: minor Priority: P5 Component: nft Assignee: pablo at netfilter.org Reporter: ian.kumlien at gmail.com This might be known, 0.7 is old - but if it isn't then... ;) I added two rules like this in table nat, chain prerouting (with a hook): iifname $ext_if ip saddr $external_dns_servers tcp dport $external_dns_ports dnat to numgen inc mod 3 map { 0: 10.0.0.2, 1: 10.0.0.3, 2: 10.0.0.4 } iifname $ext_if ip saddr $external_dns_servers udp dport $external_dns_ports dnat to numgen inc mod 3 map { 0: 10.0.0.2, 1: 10.0.0.3, 2: 10.0.0.4 } And they...
2017 Oct 21
3
[Bug 1195] New: 'list ruleset' of 'nft -f' outputs garbage while 'nft list ruleset' seems to work.
...t: nft Assignee: pablo at netfilter.org Reporter: slyfox at inbox.ru # This report is a valid nft file. # $ uname -r # 4.14.0-rc5-00009-g3728e6a255b5 # run as: 'nft -f nft.bug' # This will output: # table inet filter { # chain local-input { # iifname "lo" meta nfproto ipv4 payload @nh,96,64 0x7f0000017f000001 [invalid type] ip protocol udp counter packets 0 bytes 0 accept # } # } # While when we run 'list ruleset' right afterwards decoding is fine: # table inet filter { # chain local-input { #...
2017 Oct 02
3
[Bug 1187] New: SIGABRT: "BUG: unknown expression type prefix"
...tus: NEW Severity: minor Priority: P5 Component: nft Assignee: pablo at netfilter.org Reporter: alzeih at gmail.com I'm experiencing a SIGABRT when using nft with a particular rule, when I was expecting a parse error instead. The rule is: "iifname ens3 snat to 10.0.0.0/28" Command output: # nft -f /etc/nftables.conf BUG: unknown expression type prefix nft: netlink_linearize.c:688: netlink_gen_expr: Assertion `0' failed. Aborted (core dumped) With the following ruleset file: #!/usr/bin/nft -f # ipv4/ipv6 Simple & Safe Firew...
2020 Mar 12
3
[Bug 1413] New: Inconsistent EBUSY errors when adding a duplicate element to a map
...OS: Debian GNU/Linux 10 (Buster) Kernel: 4.19.0-8-amd64 This works every time: # nft -f - << EOF flush ruleset add table ip filter add chain ip filter forward { type filter hook forward priority 0; policy accept; } add map ip filter foo { type ifname : verdict; } add rule ip filter forward iifname vmap @foo add element ip filter foo { "dummy0" : accept } add element ip filter foo { "dummy0" : accept } EOF While these do not: # nft -f - << EOF flush ruleset add table ip filter add chain ip filter forward { type filter hook forward priority 0; policy accept; } add ma...
2020 Oct 06
2
[Bug 1475] New: Array of addresses wrongly processed
....org Reporter: kees.dejong+dev at neobits.nl Tested and confirmed the following bug on Debian 10 (nftables-0.9.0-2 on kernel 5.4.51-v7l+) and Fedora 32 (nftables-0.9.3-3.fc32.x86_64 on kernel 5.8.12-200.fc32.x86_64). I use the following command: `nft add rule inet firewalld filter_INPUT iifname "eth0" ip saddr { 172.27.10.0/24, 172.27.11.0/24 } ip daddr 172.27.10.0/24 ct state new accept` Which is processed in the running configuration as: `iifname "eth0" ip saddr { 172.27.10.0/23 } ip daddr 172.27.10.0/24 ct state new accept` Notice that the subnet has become /23 in...
2017 Apr 15
9
[Bug 1145] New: nft 0.7: expression.c:966: range_expr_value_low: Assertion '0' failed.
https://bugzilla.netfilter.org/show_bug.cgi?id=1145 Bug ID: 1145 Summary: nft 0.7: expression.c:966: range_expr_value_low: Assertion '0' failed. Product: nftables Version: unspecified Hardware: x86_64 OS: Gentoo Status: NEW Severity: normal Priority: P5
2023 Apr 07
3
[Bug 1671] New: Implicit chains and nesting result in parser_bison.y aborting
...vior: * Nested, implicit chains could be used * Any errors would be identified in the "source" (rather than process abort) --- $ cat nested-chain-failure.nft table inet global { chain prerouting_pre_nat { type filter hook prerouting priority mangle - 1; policy accept iifname eth0 jump { ip version 4 jump { ip version 4 accept } } } } $ cat without-nest.nft table inet global { chain prerouting_pre_nat { type filter hook prerouting priority mangle - 1; policy accept iifname eth0 jump { ip version 4 accept...
2020 Apr 09
5
[Bug 1418] New: segfaults when running nft --file foo.nft --echo
...uot;/etc/nftables/init.nft") at libnftables.c:508 #20 0x000055555556acb9 in main (argc=<optimized out>, argv=0x7fffffffe1c8) at main.c:455 When it is adding the rules and echoing, the output is kind of mangled. A rule that looks like table inet filter { chain input_XXXXXXX { iifname { "bond0" } ip saddr { 10.0.0.0/8 } ip daddr { 192.168.1.1 } tcp dport { ssh } counter accept } } Gets echoed as add rule inet filter input_XXXXXXX iifname { "bond0", "bond0" } ip saddr { 10.0.0.0/8, 10.0.0.0/8-0xffffffff [invalid type] } ip daddr { 192.168.1.1, 1...
2023 Apr 24
13
[Bug 1674] New: ebtables causing packet loss
https://bugzilla.netfilter.org/show_bug.cgi?id=1674 Bug ID: 1674 Summary: ebtables causing packet loss Product: ebtables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: critical Priority: P5 Component: ebtables-nft Assignee: pablo at netfilter.org
2018 Mar 31
2
[Bug 1238] New: meta limits protocols when it shouldn't
...Severity: minor Priority: P5 Component: nft Assignee: pablo at netfilter.org Reporter: ian.kumlien at gmail.com Reading about the raw payload, which has the examples: inet filter input meta l4proto {tcp, udp} @th,16,16 { dns, http } and input meta iifname enp2s0 arp ptype 0x0800 arp htype 1 arp hlen 6 arp plen 4 @nh,192,32 0xc0a88f10 @nh,144,48 set 0x112233445566 accept Makes you think that something like: meta l4proto udp @th,64,4 0x0 @th,16,16 set 5301 accept should work for detecting a dns query It's a variant of: -p udp -m udp --dport 53...
2020 Jan 19
1
[Bug 1399] New: tables/chains priority doesn't work
...chain prerouting {type filter hook prerouting priority -150;} chain input {type filter hook input priority 0; policy drop;} chain output {type filter hook output priority 0; policy drop;} } chain input { type filter hook input priority filter; policy drop; iifname "lo" accept ct state established,related accept ct state new ip daddr $ip_external tcp sport 1024-65535 tcp dport { 22, 80, 443, 8080 } accept } there is more rules but this is for simplicity. I am trying to achieve a redirect of blocked IPs/CIDR to port 8080. If I under...
2020 Feb 05
3
[Bug 1406] New: nft dies with an assertion of consumed > 0
...1.5. I am able to trigger the assertion mentioned in the summary. Here's how. Firstly, load the following ruleset: flush ruleset table ip metrics { set servers { type ipv4_addr } chain egress { type filter hook prerouting priority filter - 1; policy accept; iifname != "igb0" ct original daddr @servers } } Next, try to list a table by any given name - even the "metrics" table itself: # nft list table metrics nft: netlink_delinearize.c:124: netlink_parse_concat_expr: Assertion `consumed > 0' failed. Aborted I have noticed that...