search for: saddr

Displaying 20 results from an estimated 183 matches for "saddr".

Did you mean: addr
2020 Feb 27
9
[Bug 1410] New: STATELESS, rules with notrack into a map
...Reporter: e.lohmann at mdex.de I would like to put rules like this into a map. But there is no command (set) to use the map in raw, like we do it in STATEFULL with dnat / snat. nft add rule raw PREROUTING ip daddr *publicIP* counter notrack ip daddr set *privateIP* nft add rule raw PREROUTING ip saddr *privateIP* counter notrack ip saddr set *publicIP* I do this in STATEFULL with: dnat to ip daddr map @pubip_pre snat to ip saddr map @pubip_post Open for any discussion and questions, thanks in forward, eike. -- You are receiving this mail because: You are watching all bug changes. ---------...
2020 Sep 23
2
[Bug 1467] New: [sets] support adaptive (escalating) rule(s)
...Status: NEW Severity: enhancement Priority: P5 Component: nft Assignee: pablo at netfilter.org Reporter: vtolkm at gmail.com once bug #1466 is sorted consider support for adaptive (escalating) rule(s) based on element counters, e.g. * if { saddr counter N } then { set element timeout } multiply by or add timeout factor (N1) * if { saddr counter N *|+ N1 } then lookup saddr's cidr in geoip db and update saddr to cidr range * if { saddr cidr range counter N } then lookup saddr cidr range in geoip db and update saddr to ASN * if { saddr...
2019 Dec 04
2
[Bug 1385] New: Incorrectly evaluated expression with negated ip saddr and negated ip daddr
https://bugzilla.netfilter.org/show_bug.cgi?id=1385 Bug ID: 1385 Summary: Incorrectly evaluated expression with negated ip saddr and negated ip daddr Product: nftables Version: unspecified Hardware: x86_64 OS: Debian GNU/Linux Status: NEW Severity: normal Priority: P5 Component: kernel Assignee: pablo at net...
2018 Jan 30
5
[Bug 1220] New: Reverse path filtering using "fib" needs better documentation
...ignee: pablo at netfilter.org Reporter: f30 at f30.me Reverse path filtering means dropping a packet if connections to its source IP wouldn't use the same interface the packet arrived on. The nftables wiki states [1] that this can be implemented like: nft add rule x prerouting fib saddr . iif oif eq 0 drop Slides by Florian Westphal [2] suggest to use: nft add rule ... fib saddr . oif oif = 0 drop But this fails with "Invalid argument" even when replacing "=" by "==" or "eq". `fib saddr . iif oif eq 0` achieves the desired goal (except...
2023 Jun 02
6
[Bug 1687] New: Define set of set with in ipset list:sets
...pablo at netfilter.org Reporter: willyam.android at gmail.com Is there a plan to implement a list of sets? An example of use would be the use of GeoIP lists where I have several lists (one per country) and use multiple lists in the definition of the source IP in the rule, example: ip6 saddr { @FR, @MC, @CH } drop -- You are receiving this mail because: You are watching all bug changes. -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20230602/c2b05b2c/attachment.html>
2002 Jun 24
0
Rsync 2.5.5: FreeBSD mknod can't create FIFO's
...51:17 2002 +++ work.patch/rsync-2.5.5/syscall.c Mon Jun 24 14:46:19 2002 @@ -67,6 +67,35 @@ { if (dry_run) return 0; CHECK_RO + +#if HAVE_MKFIFO + if (S_ISFIFO(mode)) { + return mkfifo(pathname, mode); + } +#endif + +#if HAVE_SYS_UN_H + if (S_ISSOCK(mode)) { + int sock; + struct sockaddr_un saddr; + int len = strlen(pathname) + 1; /* include null */ + + saddr.sun_family = AF_UNIX; + strncpy(saddr.sun_path, pathname, sizeof(saddr.sun_path)); + saddr.sun_len = len > sizeof(saddr.sun_path) ? sizeof(saddr.sun_path) : len; + + if ((sock = socket(PF_UNIX, SOCK_STREAM, 0)) < 0) { + re...
2024 Feb 13
16
[Bug 1736] New: nftables - dynamic update for verdict map from the packet path
...of new client retrieved from the packet path to a map with the `update @` action like below add table ip loadbalancer add map ip loadbalancer epToChain { type ipv4_addr : verdict ; flags dynamic,timeout ; timeout 4m ;} add chain ip loadbalancer service-ABC add rule ip loadbalancer service-ABC ip saddr vmap @epToChain add chain ip loadbalancer endpoint-1 add rule ip loadbalancer endpoint-1 update @epToChain { ip saddr : goto endpoint-1 } add chain ip loadbalancer endpoint-2 add rule ip loadbalancer endpoint-2 update @epToChain { ip saddr : goto endpoint-2 } But I got the error below with nft 1...
2003 Oct 27
0
rsyncing fifos and sockets on FreeBSD
...sync/syscall.c,v retrieving revision 1.27 diff -r1.27 syscall.c 70a71,98 > > #if HAVE_MKFIFO > if (S_ISFIFO(mode)) > return mkfifo(pathname, mode); > #endif > #if (HAVE_SYS_UN_H && HAVE_SYS_SOCKET_H) > if (S_ISSOCK(mode)) { > int sock; > struct sockaddr_un saddr; > > if (strlen(pathname) + 1 > sizeof(saddr.sun_path)) { > errno = ENAMETOOLONG; return -1; > } > > saddr.sun_family = AF_UNIX; > strncpy(saddr.sun_path, pathname, sizeof(saddr.sun_path)); > > if ((sock = socket(PF_UNIX, SOCK_STREAM, 0)) == -1) { >...
2008 Sep 12
4
Custom build kernel patch fails big time.
...-53,17 +55,20 @@ struct dst_entry *dst, *dst_prev; struct rtable *rt0 = (struct rtable*)(*dst_p); struct rtable *rt = rt0; - u32 remote = fl->fl4_dst; - u32 local = fl->fl4_src; struct flowi fl_tunnel = { .nl_u = { .ip4_u = { - .saddr = local, - .daddr = remote, + .saddr = fl->fl4_dst, + .daddr = fl->fl4_src, .tos = fl->fl4_tos } } }; + union { + struct in6_addr *in6; + struct in_addr *in; + } remote, local; +...
2024 Apr 03
10
[Bug 1742] New: using nfqueue breaks SCTP connection (tracking)
...s makes the connection work. I've added a trace (by the way kudos for the tracing functionality is really a great improvement) and I can see how the packet is dropped in a rule that drops connections with invalid state trace id 0329b184 ip filter trace_chain packet: iif "eth0" ether saddr 02:42:c0:a8:08:02 ether daddr 02:42:c0:a8:08:03 ip saddr 10.244.1.47 ip daddr 10.244.2.47 ip dscp cs0 ip ecn ect0 ip ttl 63 ip id 0 ip length 68 sctp sport 47261 sctp dport 8080 sctp vtag 0 @th,96,64 0x10000240486b6e3 trace id 0329b184 ip filter trace_chain rule ip protocol sctp meta nftrace set 1...
2018 Apr 27
5
[Bug 1249] New: set update with timeout 0s removes timeout
...s to set timeout 1s, but this is not perfect) ------------------------------------------- #Config file: table inet filter { set test { type ipv4_addr timeout 10m } chain input { type filter hook input priority 0; policy accept; tcp dport 1111 set add ip saddr @test tcp dport 2222 set update ip saddr timeout 0s @test tcp dport 3333 set update ip saddr timeout 40s @test } ... other chains ... } ------------------------------------------- ------------------------------------------- # nft list ruleset -nn table inet filter { set...
2018 Oct 16
7
[Bug 1282] New: SIGSEGV on loading tables
...rusted4 { 159.69.156.79 } add element inet main trusted4 { 98.143.148.171 } add element inet main trusted4 { 159.69.33.57 } add element inet main trusted4 { 159.69.146.174 } chain inet main input { type filter hook input priority 50; policy drop iifname lo accept ip6 saddr @ossec6 ct state new counter log prefix "OSSEC6 " drop ip saddr @ossec4 ct state new counter log prefix "OSSEC4 " drop ip saddr @blacklist tcp dport ssh ct state new counter log prefix "BLACKLIST " drop tcp dport @tcp_public ct state new counter accept...
2017 Apr 02
6
[Bug 1142] New: invalid binop operation 6nft
...ilter at d9c.eu Consider the following table: table inet filter { set allowable { type ipv6_addr flags timeout } chain input { type filter hook input priority 0; policy accept; tcp dport telnet set update ip6 saddr & ffff:ffff:ffff:ffff:: timeout 2m @allowable } } # nft "add rule inet filter input ip6 saddr & ffff:ffff:ffff:ffff:: @allowable counter" BUG: invalid binop operation 6nft: evaluate.c:1418: binop_transfer: Assertion `0' failed. # nft add element inet filter allowable...
2018 Jul 02
3
[Bug 1267] New: unable to use limit with counter in meters
...nent: nft Assignee: pablo at netfilter.org Reporter: karel at unitednetworks.cz It looks like nft doesnt allow counter after limit inside of meter. counter after limit: -------------------- localhost ~ # nft add rule filter INPUT icmp type echo-request meter icmp-spammer { ip saddr limit rate over 10/second burst 30 packets counter} counter drop Error: syntax error, unexpected counter, expecting '}' add rule filter INPUT icmp type echo-request meter icmp-spammer { ip saddr limit rate over 10/second burst 30 packets counter} counter drop counter before limit (just fo...
2018 Nov 24
5
[Bug 1303] New: nft improperly merges intervals
...OS: All Status: NEW Severity: critical Priority: P5 Component: nft Assignee: pablo at netfilter.org Reporter: trever at middleearth.sapphiresunday.org Please consider the following rules: oifname "ppp0" ip saddr { 10.0.0.0/23, 10.1.1.0/24 } counter packets 76 bytes 4704 masquerade oifname "ppp0" ip saddr 10.1.1.0/25 counter packets 0 bytes 0 masquerade oifname "ppp0" ip saddr 10.0.1.0/24 counter packets 0 bytes 0 masquerade oifname "ppp0" ip saddr 10.0....
2018 Jan 30
7
[Bug 1221] New: "fib" produces strange results with an IPv6 default route
...OS: Debian GNU/Linux Status: NEW Severity: major Priority: P5 Component: kernel Assignee: pablo at netfilter.org Reporter: f30 at f30.me I am trying to implement reverse path filtering using "fib" rules like `fib saddr . iif oif 0 drop`. I don't understand why exactly (see #1220), but this generally works for IPv4 and IPv6 without a default route. However, "fib" starts to behave strangely with a v6 default route. Assume a host with two interfaces, enp0s5 and enp0s6, and the following IP addresses:...
2018 Jun 12
1
[Bug 1261] New: nft trace crash with msg "BUG: invalid verdict value 2"
...Component: nft Assignee: pablo at netfilter.org Reporter: jddupas at xooloo.com Trying to trace message that are forwarded using the 'fwd' verdict action result in the following crash: trace id ddbbaae2 netdev vpn ingress_out packet: iif "enp2s0" ether saddr 78:54:00:29:bb:aa ether daddr 52:54:00:01:53:9f ip saddr 85.14.236.41 ip daddr 17.25.63.98 ip dscp cs0 ip ecn not-ect ip ttl 64 ip id 49036 ip length 84 icmp type echo-reply icmp code 0 icmp id 16947 icmp sequence 4 trace id ddbbaae2 netdev vpn ingress_out rule ip saddr 85.14.236.41 nftrace set 1...
2019 May 20
1
[Bug 1338] New: Can't add IPv6 concatenation rule
...Status: NEW Severity: major Priority: P5 Component: nfnetlink_queue Assignee: netfilter-buglog at lists.netfilter.org Reporter: abrian at netapp.com Attempting to add an ip6 address in a concatenation fails: nft add rule inet filter input ip6 saddr . udp dport fd20:332:332:0:250:56ff:fe87:f635 . 1662 counter accept <cmdline>:1:1-112: Error: Could not process rule: Value too large for defined data type add rule inet filter input ip6 saddr . udp dport fd20:332:332:0:250:56ff:fe87:f635 . 1662 counter accept ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^...
2006 Mar 21
9
IE flakiness?
I set up a simple BlindUp and BlindDown div that works seamlessy in Firefox but doesn''t work as smoothly in IE. When blinding down, the whole div flashes and then Blinds down. The same thing when blinding up. Is this something that is fixable? _______________________________________________ Rails-spinoffs mailing list Rails-spinoffs-1W37MKcQCpIf0INCOvqR/iCwEArCW2h5@public.gmane.org
2024 Aug 14
2
[Bug 1764] New: mapping IPv4 interval to IPv4 interval works for anonymous maps, but not for named maps
...8b03 nothing to commit, working tree clean nft --version nftables v1.1.0 (Commodore Bullmoose) ******************************** Anonymous map example: ******************************** nft add table t nft add chain t c { type nat hook postrouting priority srcnat\; } nft add rule t c snat ip to ip saddr map { 192.0.2.0/24 : 198.51.100.0/24 } persistent nft list ruleset table ip t { chain c { type nat hook postrouting priority srcnat; policy accept; snat ip to ip saddr map { 192.0.2.0/24 : 198.51.100.0/24 } persistent } } *****************************...