Displaying 20 results from an estimated 29 matches for "inet_service".
2017 Aug 22
2
[Bug 1174] New: 'define' functionality not sufficient for maintaining sets and the like
...he elements declaration, but important:
* To clearly indicate that the intended initial condition is empty
* For automated script-generation tools which would otherwise need to test for
and branch if there were no elements
Typical context:
table ip global {
set forwarded_ports {
type inet_service
elements = { 80, 443 }
}
set some_ports_set {
type inet_service
elements = { $some_ports }
}
set no_forwarded_ports {
type inet_service
# elements = { } # fails
}
}
--
You are receiving this mail because:
You are watching all bug changes.
----...
2017 Sep 22
13
[Bug 1185] New: counter flag proposal for sets and maps
https://bugzilla.netfilter.org/show_bug.cgi?id=1185
Bug ID: 1185
Summary: counter flag proposal for sets and maps
Product: nftables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
2017 Mar 20
1
[Bug 1134] New: snat and dnat should accept mapping concatenated values for address and port
...sion: unspecified
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
Reporter: rwhite at pobox.com
If the result value of a map is ipv[46]_addr . inet_service then a dnat or snat
directive should understand that these are the address and port values for
statement.
so...
table example {
dnat_info {
type inet_service : ipv4_addr . inet_service
elements = { 80 : 192.168.13.5 . 8080 }
}
chain foo {
dnat tcp port @dnat_info...
2018 Oct 16
7
[Bug 1282] New: SIGSEGV on loading tables
...el response
The following configuration crashes nftables. I run "nft -e -f main.conf" and
nft crashes, apparently on response from kernel (strace attached). When I run
without -e option it just silently fails.
#!/usr/sbin/nft -f
add table inet main
add set inet main tcp_public { type inet_service; }
add set inet main udp_public { type inet_service; }
add set inet main udp_trusted { type inet_service; }
add set inet main tcp_trusted { type inet_service; }
add set inet main blacklist { type ipv4_addr; flags interval; }
add set inet main ossec4 { type ipv4_addr; }
add set inet main osse...
2020 Jan 07
4
[Bug 1396] New: When rule with 3 concat elements are added, nft list shows only 2
...OS: All
Status: NEW
Severity: critical
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
Reporter: sbezverk at cisco.com
table ip ipv4table {
map cluster-ip-services-set {
type inet_proto . ipv4_addr . inet_service : verdict
}
chain k8s-nat-mark-masq {
ip protocol . ip daddr vmap @cluster-ip-services-set
}
chain k8s-nat-do-mark-masq {
meta mark set 0x00004000 return
}
}
the command to add rule to k8s-nat-mark-masq chain is:
sudo nft add rule ipv4table k8s-nat-mark-masq...
2018 Apr 29
2
[Bug 1252] New: comment doesn't work with ranges in sets
...5
Component: nft
Assignee: pablo at netfilter.org
Reporter: sub at ryper.org
When creating a set and including a range of ports in it, the comment function
seems to disappear from the "nft list ruleset -nn" output.
Example configuration:
set test {
type inet_service
flags interval
elements = { 1111 comment "test1",
2222-3333 comment "test2",
4444 comment "test3",
5555-6666 comment "test4" }
}
And here is the output from "nft list ruleset -nn"
set test...
2020 Apr 28
2
[Bug 1425] New: th not accepted in snat with multiple ip protocols
...everity: normal
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
Reporter: fasnacht at protonmail.ch
Hello,
For tracking, here's a bug I'm experiencing, with the following, in an inet
table:
map nat-int-ext-port-v4 {
type ipv4_addr . inet_service . inet_proto : inet_service
}
[...]
ip protocol {udp, tcp} snat ip to $host_ipv4_address : ip saddr . th sport . ip
protocol map @nat-int-ext-port-v4
I get:
Error: transport protocol mapping is only valid after transport protocol match
It works fine with restricting ip protocol to one single...
2020 Sep 04
3
[Bug 1462] New: `nft -j list set` does not show counters
...rmal
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
Reporter: dev at doubly.so
I have a set with counters. I can see their values in a rather unreadable
format:
# nft list set inet dev ports_udp
table inet dev {
set ports_udp {
type inet_service
size 65536
flags dynamic,timeout
timeout 30d
elements = { 53 expires 29d23h58m25s672ms counter packets 35 bytes
2515, 389 expires 29d23h59m15s144ms counter packets 1 bytes 80, 515 expires
29d23h56m14s136ms counter packets 1 bytes 57, 1194 expires 29d23h58m18s460ms
co...
2018 Jun 27
3
[Bug 1265] New: Creating named sets concatenating ifname and anything else does not work
...riority: P5
Component: nft
Assignee: pablo at netfilter.org
Reporter: niconorsk at gmail.com
Testing with the 0.9.0 release which added the ability to create named sets
with type ifname
Get the following error:
> nft create set inet filter keepalived_ranges4 { type inet_service . ifname \; }
> Error: Empty string is not allowed
> create set inet filter keepalived_ranges4 { type inet_service . ifname ; }
Getting this working would be a great help towards having a replacement for the
net,iface ipset type
--
You are receiving this mail because:
You are watching all...
2017 Aug 23
3
[Bug 1175] New: Document limitations on identifier names
https://bugzilla.netfilter.org/show_bug.cgi?id=1175
Bug ID: 1175
Summary: Document limitations on identifier names
Product: nftables
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: major
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
2014 Feb 05
3
[Bug 896] New: You can not add the follow kinds of sets: mark, integer, string, lladdr
...AssignedTo: pablo at netfilter.org
ReportedBy: anarey.spam at gmail.com
Estimated Hours: 0.0
Tt's impossible add these specific kinds of sets: mark, integer, string,
lladdr. Only you can add ipv4_address, ipv6_address (bug
https://bugzilla.netfilter.org/show_bug.cgi?id=895) and inet_service set.
(tests) $ sudo nft add set ip t-ip2 set-mark { type mark\;}
<cmdline>:1:34-37: Error: syntax error, unexpected mark, expecting string
add set ip t-ip2 set-mark { type mark;}
^^^^
(tests) $ sudo nft add set ip t-ip2 set-integer { type integer\;}
<cm...
2020 Apr 01
0
[ANNOUNCE] nftables 0.9.4 release
...sents:
nftables 0.9.4
This release contains fixes and new features available up to the Linux
kernel 5.6 release.
* Support for ranges in concatenations (requires Linux kernel >= 5.6),
e.g.
table ip foo {
set whitelist {
type ipv4_addr . ipv4_addr . inet_service
flags interval
elements = { 192.168.10.35-192.168.10.40 . 192.68.11.123-192.168.11.125 . 80 }
}
chain bar {
type filter hook prerouting priority filter; policy drop;
ip saddr . ip daddr . tcp dport @w...
2017 Aug 23
7
[Bug 1176] New: Invalid identifiers produce unhelpful error messages
https://bugzilla.netfilter.org/show_bug.cgi?id=1176
Bug ID: 1176
Summary: Invalid identifiers produce unhelpful error messages
Product: nftables
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: critical
Priority: P5
Component: nft
Assignee: pablo at
2020 Jan 06
9
[Bug 1395] New: Add element fails with Error: Could not process rule: Invalid argument
...Severity: critical
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
Reporter: sbezverk at cisco.com
Here is defined vmap:
table ip ipv4table {
map no-endpoints-services {
type inet_proto . ipv4_addr . inet_service : verdict
}
When I try to add an element to the vmap I get an error:
```
sudo nft --debug all add element ipv4table no-endpoints-services { tcp .
192.168.80.104 . 8989 : goto do_reject }
Error: Could not process rule: Invalid argument
add element ipv4table no-endpoints-serv...
2020 Jun 18
10
[Bug 1434] New: Usability improvements, enabling creation of complex firewalls
https://bugzilla.netfilter.org/show_bug.cgi?id=1434
Bug ID: 1434
Summary: Usability improvements, enabling creation of complex
firewalls
Product: nftables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
2017 Mar 17
0
[Bug 1132] New: Maps and Dictionaries need catch-all ('default:' 'else') case for when no entry matches.
...hen
no entry matches.
This doesn't really make sense for plain sets where membership is what's being
tested, but for the branch-like implicit in mapping it's 'very hard' to create
some kinds of 'else' branch.
So like...
table ip example {
map server {
type inet_service : ipv4_addr
flags interval, default
default = 172.18.0.2
elements = { 9994 : 172.18.0.5}
}
}
Default is, obviously just an the result data type with none of the key parts
so it's not really part of the elements = {} part.
using elements = { default: 17.18.0.2 } is...
2017 Mar 23
0
[Bug 1137] New: Element "flow tables" should not be syntactically unique...
...nd "list flow
table tablename flowname" are so similar in function but have a different word
count and are not orthogonal to add and delete and clear etc.
So if they were just like sets this would be so much less confusing.
table ip example {
gauge dhcp_throttle {
type ipv4_addr . inet_service
flags whatever, whateverelse
}
On 03/22/17 16:25, Pablo Neira Ayuso wrote:
> This would provide a way to restore flow table between reboots, so we
> could even per populate them with elements.
chain dhcp_traffic {
gauge { ip saddr limit over 200/day } drop
gauge @dhcp_thrott...
2017 Nov 06
2
[Bug 1200] New: anonymous sets containing port numbers
...ilter.org
Reporter: bugzilla at hard-wired.net
notables 0.8 will fail. 0.7 was working.
A nft rule contains an anonymous set with port numbers will just be ignored :
this will fail :
tcp dport { ftp, ssh, smtp, domain, http } accept
This will works :
set output_tcp_sports {
type inet_service
elements = { ssh, smtp, domain, http }
}
tcp dport @output_tcp_dports accept
--
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/att...
2020 Aug 27
0
[Bug 1455] New: Queue verdict cannot be used in vmap
...at gmail.com
I'm not sure if this is a bug, not implemented, or as designed.
I am trying to use a vmap to direct traffic to NFQueue when specific criteria
are matched.
The map has been defined and a rule using it:
table ip filter {
map AppControl_TCP {
type ipv4_addr . ipv4_addr . inet_service : verdict
}
chain Forward {
type filter hook forward priority filter; policy drop;
ip saddr . ip daddr . tcp dport vmap @AppControl_TCP
}
...
}
But I cannot assign the verdict "queue num 3" to the map. The following error
is returned when importing the ruleset with nft...
2016 Dec 20
0
[ANNOUNCE] nftables 0.7 release
...usage as several users requested on
the mailing list.
* Allow to use variable reference for set element definitions, eg.
# cat ruleset.nft
define s-ext-2-int = { 10.10.10.10 . 25, 10.10.10.10 . 143 }
table inet forward {
set s-ext-2-int {
type ipv4_addr . inet_service
elements = $s-ext-2-int
}
}
# nft -f ruleset.nft
Useful to improve ruleset maintainability, as you can split out
variable and set definitions from the filtering policy itself.
* Allow to use variable definitions from element commands, eg.
define whitel...