lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Thu, 24 Sep 2020 12:26:11 -0400
From:   "Brian J. Murrell" <brian@...erlinx.bc.ca>
To:     netdev@...r.kernel.org
Subject: Re: RTNETLINK answers: Permission denied

On Thu, 2020-09-24 at 10:15 -0600, David Ahern wrote:
> 
> check your routes for a prohibit entry:

I don't have any prohibit entries

# ip -6 route ls table 5 | grep prohib
# ip -6 rule ls
0:	from all lookup local 
1003:	from all iif 6in4-henet lookup 3 
1005:	from all iif pppoe-wan1 lookup 5 
2003:	from all fwmark 0x300/0x3f00 lookup 3 
2005:	from all fwmark 0x500/0x3f00 lookup 5 
2061:	from all fwmark 0x3d00/0x3f00 blackhole
2062:	from all fwmark 0x3e00/0x3f00 unreachable
32766:	from all lookup main 
32767:	from all lookup default 
4200000000:	from 2001:123:ab:123::1/64 iif br-lan unreachable
4200000000:	from 2607:abcd:9876:5432::1/60 iif br-lan unreachable
4200000001:	from all iif lo failed_policy
4200000006:	from all iif br-guest failed_policy
4200000008:	from all iif br-lan failed_policy
4200000008:	from all iif br-lan failed_policy
4200000008:	from all iif br-lan failed_policy
4200000010:	from all iif eth0.3 failed_policy
4200000091:	from all iif eth0.2 failed_policy
4200000097:	from all iif pppoe-wan1 failed_policy
4200000097:	from all iif pppoe-wan1 failed_policy
4200000098:	from all iif 6in4-henet failed_policy
# ip -6 route ls table local | grep prohib
# ip -6 route ls table 3 | grep prohib
# ip -6 route ls table 5 | grep prohib

Cheers,
b.


Download attachment "signature.asc" of type "application/pgp-signature" (489 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ