netfilter.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [nftables 0.9.2 | kernel 4.19.93] dropping ct state untracked stops ipv6 connectivity
@ 2020-03-18 12:05 ѽ҉ᶬḳ℠
  2020-03-18 12:07 ` Florian Westphal
  0 siblings, 1 reply; 4+ messages in thread
From: ѽ҉ᶬḳ℠ @ 2020-03-18 12:05 UTC (permalink / raw)
  To: netfilter@vger.kernel.org

This works (i.e. ipv4 and ipv6 connectivity)

table inet filter {
         chain input {
                 type filter hook input priority filter; policy drop;
                 ct state established,related accept
                 ct state invalid drop
         }

}

This cuts ipv6 connectivity entirely (ipv4 connectivity works)

table inet filter {
         chain input {
                 type filter hook input priority filter; policy drop;
                 ct state established,related accept
                 ct state invalid,untracked drop
         }

}


It reproduces on each toggle: ct state invalid,untracked drop <-> ct 
state invalid drop (ct db/cache needs to clear in between toggling).
Enabled logging but nothing been printed that would provide a hint.

Is this something to be expected, and if so why, or is it a bug in 
kernel / nft?



^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [nftables 0.9.2 | kernel 4.19.93] dropping ct state untracked stops ipv6 connectivity
  2020-03-18 12:05 [nftables 0.9.2 | kernel 4.19.93] dropping ct state untracked stops ipv6 connectivity ѽ҉ᶬḳ℠
@ 2020-03-18 12:07 ` Florian Westphal
  2020-03-18 12:16   ` ѽ҉ᶬḳ℠
  0 siblings, 1 reply; 4+ messages in thread
From: Florian Westphal @ 2020-03-18 12:07 UTC (permalink / raw)
  To: ѽ҉ᶬḳ℠; +Cc: netfilter@vger.kernel.org

ѽ҉ᶬḳ℠ <vtol@gmx.net> wrote:
> This works (i.e. ipv4 and ipv6 connectivity)
> 
> table inet filter {
>         chain input {
>                 type filter hook input priority filter; policy drop;
>                 ct state established,related accept
>                 ct state invalid drop
>         }
> 
> }
> 
> This cuts ipv6 connectivity entirely (ipv4 connectivity works)
> 
> table inet filter {
>         chain input {
>                 type filter hook input priority filter; policy drop;
>                 ct state established,related accept
>                 ct state invalid,untracked drop

Yes.

> It reproduces on each toggle: ct state invalid,untracked drop <-> ct state
> invalid drop (ct db/cache needs to clear in between toggling).
> Enabled logging but nothing been printed that would provide a hint.
> 
> Is this something to be expected, and if so why, or is it a bug in kernel /
> nft?

Expected, conntrack marks icmpv6 neigh resolution as untracked.

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [nftables 0.9.2 | kernel 4.19.93] dropping ct state untracked stops ipv6 connectivity
  2020-03-18 12:07 ` Florian Westphal
@ 2020-03-18 12:16   ` ѽ҉ᶬḳ℠
  2020-03-18 12:28     ` Florian Westphal
  0 siblings, 1 reply; 4+ messages in thread
From: ѽ҉ᶬḳ℠ @ 2020-03-18 12:16 UTC (permalink / raw)
  To: Florian Westphal; +Cc: netfilter@vger.kernel.org

On 18/03/2020 12:07, Florian Westphal wrote:
> ѽ҉ᶬḳ℠ <vtol@gmx.net> wrote:
>> This works (i.e. ipv4 and ipv6 connectivity)
>>
>> table inet filter {
>>          chain input {
>>                  type filter hook input priority filter; policy drop;
>>                  ct state established,related accept
>>                  ct state invalid drop
>>          }
>>
>> }
>>
>> This cuts ipv6 connectivity entirely (ipv4 connectivity works)
>>
>> table inet filter {
>>          chain input {
>>                  type filter hook input priority filter; policy drop;
>>                  ct state established,related accept
>>                  ct state invalid,untracked drop
> Yes.
>
>> It reproduces on each toggle: ct state invalid,untracked drop <-> ct state
>> invalid drop (ct db/cache needs to clear in between toggling).
>> Enabled logging but nothing been printed that would provide a hint.
>>
>> Is this something to be expected, and if so why, or is it a bug in kernel /
>> nft?
> Expected, conntrack marks icmpv6 neigh resolution as untracked.


Thanks for the instant feedback. Might be worth to mention in wiki/man.

That is one protocol (icmpv6 neigh resolution) being untracked but that
implies that NFT is then subsequently blocking the source ipv6 entirely?
It is not even possible to reach a ssh server that runs on the NFT instance.

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [nftables 0.9.2 | kernel 4.19.93] dropping ct state untracked stops ipv6 connectivity
  2020-03-18 12:16   ` ѽ҉ᶬḳ℠
@ 2020-03-18 12:28     ` Florian Westphal
  0 siblings, 0 replies; 4+ messages in thread
From: Florian Westphal @ 2020-03-18 12:28 UTC (permalink / raw)
  To: ѽ҉ᶬḳ℠
  Cc: Florian Westphal, netfilter@vger.kernel.org

ѽ҉ᶬḳ℠ <vtol@gmx.net> wrote:
> That is one protocol (icmpv6 neigh resolution) being untracked but that
> implies that NFT is then subsequently blocking the source ipv6 entirely?

Its the same effect as dropping ipv4 arp packets with arptables,
stack won't be able to figure out which ethernet address to use to send
the packet to.

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2020-03-18 12:28 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2020-03-18 12:05 [nftables 0.9.2 | kernel 4.19.93] dropping ct state untracked stops ipv6 connectivity ѽ҉ᶬḳ℠
2020-03-18 12:07 ` Florian Westphal
2020-03-18 12:16   ` ѽ҉ᶬḳ℠
2020-03-18 12:28     ` Florian Westphal

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).