lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 2 Jan 2019 23:19:16 +0100 From: Florian Westphal <fw@...len.de> To: David Ahern <dsahern@...il.com> Cc: wenxu@...oud.cn, netdev@...r.kernel.org, NetFilter <netfilter-devel@...r.kernel.org> Subject: Re: [PATCH net-next] vrf: Add VRF_F_BYPASS_RCV_NF flag to vrf device David Ahern <dsahern@...il.com> wrote: > On 12/27/18 12:38 AM, wenxu@...oud.cn wrote: > > nft add table firewall > > nft add chain firewall zones { type filter hook prerouting priority - 300 \; } > > nft add rule firewall zones counter ct zone set iif map { "eth1" : 1, "eth2" : 2 } > > nft add chain firewall rule-1000-ingress > > nft add rule firewall rule-1000-ingress ct zone 1 tcp dport 22 ct state new counter accept > > nft add rule firewall rule-1000-ingress counter drop > > nft add chain firewall rule-1000-egress > > nft add rule firewall rule-1000-egress tcp dport 22 ct state new counter drop > > nft add rule firewall rule-1000-egress counter accept > > > > nft add chain firewall rules-all { type filter hook prerouting priority - 150 \; } > > nft add rule firewall rules-all ip daddr vmap { "2.2.2.11" : jump rule-1000-ingress } > > nft add rule firewall rules-all ct zone vmap { 1 : jump rule-1000-egress } > > Bug report to the netfilter crowd: After this set of commands, 'nft list > tables' goes into a loop over recvmsg. This is debian stretch with > nftables from backports - version 0.9.0-1~bpo9+1 Thanks for reporting, I will have a look.
Powered by blists - more mailing lists