Re: nftables: How to filter only ipv6 SSH traffic in an inet table?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Merlin, Duncan,

On Wed, Feb 07, 2018 at 11:32:51AM +1100, Duncan Roe wrote:
> On Tue, Feb 06, 2018 at 05:28:09PM +0100, Merlin Büge wrote:
> > Hey all,
> >
> > I'm playing around with nftables and wonder how I could filter e.g.
> > only ipv6 SSH traffic in an inet table?
> >
> > I've set up a basic inet filter table with the three chains input,
> > forward and output.
> >
> > When I then do:
> >
> > "nft add rule inet filter input ip6 nexthdr tcp tcp dport ssh drop"
> >
> > ... "nft list ruleset" is showing my only "tcp dport ssh drop", so it
> > seems the ipv6 bit got missed. I also tried:
> >
> > "nft add rule inet filter input meta nfproto ipv6 tcp dport ssh drop"
> >
> > ... but it yields to the same output.
> >
> > What am I doing wrong here?
> >
> > Note that I'm not wanting to actually drop IPv6 SSH traffic, I'm just
> > trying to get used to nftables :)
> >
> > I'm using nftables v0.8.2 on an up-to-date archlinux.
> >
> > Any pointer appreciated!
> >
> > Thanks!
> > --
> > Merlin Büge <toni@xxxxxxxxxxxx>
> 
> Hi Merlin,
> 
> Could you possibly post all of the output from nft list ruleset?
> 
> That would give us some context around the one-liner,

We need to keep ip6 nexthdr around, since this is implicitly
restricting to match only IPv6 in the inet chain, where we can see
IPv4 and IPv6 traffic.

Looking into this.
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux