* Problem with migration from iptables+ipset to nftables
@ 2024-06-11 7:30 Aleksey Nikapli
2024-06-11 7:39 ` Kerin Millar
0 siblings, 1 reply; 2+ messages in thread
From: Aleksey Nikapli @ 2024-06-11 7:30 UTC (permalink / raw)
To: netfilter
Hi!
I have a question regarding migration from ipset to nftables. I have
plenty of sets of this kind, containing tcp/udp/icmp:
ipset create MYSET hash:ip,port family inet hashsize 1024 maxelem 65536
ipset add MYSET 172.18.1.11,udp:137
ipset add MYSET 172.18.1.11,udp:138
ipset add MYSET 172.18.1.11,tcp:139
ipset add MYSET 172.18.1.11,tcp:445
ipset add MYSET 172.18.1.11,icmp:echo-request
and a firewall rule for it:
iptables -A FORWARD -s 10.1.20.150/32 -m set --match-set MYSET dst,dst -j ACCEPT
When I translate my set to nftables i get a set like this:
add set inet global MYSET { type ipv4_addr . inet_proto .
inet_service; size 65536; }
add element inet global MYSET { 172.18.1.11 . udp . 137 }
add element inet global MYSET { 172.18.1.11 . udp . 138 }
add element inet global MYSET { 172.18.1.11 . tcp . 139 }
add element inet global MYSET { 172.18.1.11 . tcp . 445 }
add element inet global MYSET { 172.18.1.11 . icmp . 2048 }
However, I can't use it in nft rule because it requires to select
protocol (tcp/udp) when selecting dport:
ip saddr . meta l4proto . tcp dport @MYSET accept
Is there a way to translate and use this kind of sets to nftables or
do i need to create three separate rules (for tcp, udp and icmp
respectively)?
Also another question is, is there some kind of list:set set type in
nftables? So i could make a set of sets and use it in the ruleset as I
could with iptables+ipset?
Thanks in advance.
Best regards,
Alex
^ permalink raw reply [flat|nested] 2+ messages in thread
* Re: Problem with migration from iptables+ipset to nftables
2024-06-11 7:30 Problem with migration from iptables+ipset to nftables Aleksey Nikapli
@ 2024-06-11 7:39 ` Kerin Millar
0 siblings, 0 replies; 2+ messages in thread
From: Kerin Millar @ 2024-06-11 7:39 UTC (permalink / raw)
To: Aleksey Nikapli, netfilter
On Tue, 11 Jun 2024, at 8:30 AM, Aleksey Nikapli wrote:
> Hi!
>
> I have a question regarding migration from ipset to nftables. I have
> plenty of sets of this kind, containing tcp/udp/icmp:
>
>
> ipset create MYSET hash:ip,port family inet hashsize 1024 maxelem 65536
> ipset add MYSET 172.18.1.11,udp:137
> ipset add MYSET 172.18.1.11,udp:138
> ipset add MYSET 172.18.1.11,tcp:139
> ipset add MYSET 172.18.1.11,tcp:445
> ipset add MYSET 172.18.1.11,icmp:echo-request
>
> and a firewall rule for it:
>
>
> iptables -A FORWARD -s 10.1.20.150/32 -m set --match-set MYSET dst,dst -j ACCEPT
>
> When I translate my set to nftables i get a set like this:
>
>
> add set inet global MYSET { type ipv4_addr . inet_proto .
> inet_service; size 65536; }
> add element inet global MYSET { 172.18.1.11 . udp . 137 }
> add element inet global MYSET { 172.18.1.11 . udp . 138 }
> add element inet global MYSET { 172.18.1.11 . tcp . 139 }
> add element inet global MYSET { 172.18.1.11 . tcp . 445 }
> add element inet global MYSET { 172.18.1.11 . icmp . 2048 }
>
>
> However, I can't use it in nft rule because it requires to select
> protocol (tcp/udp) when selecting dport:
>
> ip saddr . meta l4proto . tcp dport @MYSET accept
>
> Is there a way to translate and use this kind of sets to nftables or
> do i need to create three separate rules (for tcp, udp and icmp
> respectively)?
Write "th dport", which is equivalent to "@th,16,16". Doing so makes sense for TCP and UDP; you will need to define a different set to contain the elements pertaining to the ICMP protocol.
>
>
> Also another question is, is there some kind of list:set set type in
> nftables? So i could make a set of sets and use it in the ruleset as I
> could with iptables+ipset?
There is not.
--
Kerin Millar
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2024-06-11 7:40 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2024-06-11 7:30 Problem with migration from iptables+ipset to nftables Aleksey Nikapli
2024-06-11 7:39 ` Kerin Millar
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).