On Fri, Oct 02, 2020 at 02:15:58PM +0200, Pablo Neira Ayuso wrote: > On Fri, Oct 02, 2020 at 02:07:32PM +0200, Phil Sutter wrote: > > Hi, > > > > On Fri, Oct 02, 2020 at 01:44:36PM +0200, Arturo Borrero Gonzalez wrote: > > > Previous to this patch, the basechain policy could not be properly configured if it wasn't > > > explictly set when loading the ruleset, leading to iptables-nft-restore (and ip6tables-nft-restore) > > > trying to send an invalid ruleset to the kernel. > > > > I fear this is not sufficient: iptables-legacy-restore leaves the > > previous chain policy in place if '-' is given in dump file. Please try > > this snippet from a testcase I wrote: > > > > $XT_MULTI iptables -P FORWARD DROP > > > > diff -u -Z <($XT_MULTI iptables-save | grep '^:FORWARD') \ > > <(echo ":FORWARD DROP [0:0]") > > > > $XT_MULTI iptables-restore -c <<< "$TEST_RULESET" > > diff -u -Z <($XT_MULTI iptables-save | grep '^:FORWARD') \ > > <(echo ":FORWARD DROP [0:0]") > > Hm, this is how it works in this patch right? > > I mean, if '-' is given, chain policy attribute in the netlink message > is not set, and the kernel sets chain policy to > NFT_CHAIN_POLICY_UNSET. > > Or am I missing anything? This is *flushing* iptables-restore. We're dropping the chain first and then reinstall it. Another quirk is that iptables-legacy-restore ignores the counters if policy is '-' even if --counters flag was given. (: Cheers, Phil