Mismatch in Rules-Translation?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello

Since a few Days Debian Buster is in Freeze-State. After I found the
following statement on Debians Web-Site...

"Current status: NOTE: Debian Buster will use the nftables framework by default."

.. I got been triggerd to do something....

My current system is Debian 9 with Backports-nftables. My current
iptables-Ruleset have working a long time without any Problems.
But currently the old rules are inactive, because the nftables are
additonal installed, because I want to prepare my future migration
from iptables to nftables. Except for one "little thing", everything
works as before.

In the past a Dual-Stack-OpenVPN-Installation with iptables was
successfully implemented, see below. The Web-Site http://ipv6-test.com/
shows, after the VPN-Client is connected, my current Home-Server-
Public-IPs for IPv4 and IPv6.

With nftables and IPv4 it works very well as before, but ipv6-test.com
says "IPv6 not supported". As far as I can see, the Rules are similar.

Does anyone know, where the Problem is... in the new ruleset?

Best regards
Tom


Table filter IPv4:
---------------------------------------------------------------------------
Chain FORWARD (policy DROP 0 packets, 0 bytes)
num   pkts bytes target     prot opt in     out     source          destination
1     1424  590K ACCEPT     all  --  *      *       0.0.0.0/0       0.0.0.0/0   ctstate RELATED,ESTABLISHED
2       94  4800 ACCEPT     all  --  tun+   *       10.10.8.0/24    0.0.0.0/0
4        0     0 ACCEPT     udp  --  eth0   *       0.0.0.0/0       0.0.0.0/0   udp dpt:1194
6        0     0 DROP       all  --  *      *       0.0.0.0/0       0.0.0.0/0

Table nat IPv4:
---------------------------------------------------------------------------
Chain POSTROUTING (policy ACCEPT 1 packets, 242 bytes)
 pkts bytes target     prot opt in     out     source               destination
   52  3120 MASQUERADE  all  --  *      eth0    10.10.8.0/24        0.0.0.0/0

Table filter IPv6:
--------------------------------------------------------------------------------
Chain FORWARD (policy DROP 0 packets, 0 bytes)
num   pkts bytes target     prot opt in     out     source             destination
1       82 13082 ACCEPT     all      *      *       ::/0               ::/0     ctstate RELATED,ESTABLISHED
2        0     0 ACCEPT     icmpv6   *      *       ::/0               ::/0
3       37  3154 ACCEPT     all      tun+   *       fd00:10:10:8::/64  ::/0
5        0     0 ACCEPT     udp      eth0   *       ::/0               ::/0     udp dpt:1194
7        0     0 DROP       all      *      *       ::/0               ::/0

Table nat IPv6:
--------------------------------------------------------------------------------
Chain POSTROUTING (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source                  destination
   37  3154 MASQUERADE  all      *      eth0    fd00:10:10:8::/64      ::/0

================================================================================

table ip tfilter {
    chain forward {
        type filter hook forward priority 0; policy accept;
        iifname "lo" accept
        ct state established,related accept
        ip protocol icmp accept
        iifname "tun*" ip saddr 10.10.8.0/24 accept
        iifname "eth0" udp dport 1194 accept
        counter packets 0 bytes 0 drop
    }

    chain postrouting {
        type nat hook postrouting priority 100; policy accept;
        oifname "eth0" ip saddr 10.10.8.0/24 masquerade
    }
}
table ip6 tfilter {

    chain forward {
        type filter hook forward priority 0; policy accept;
        iifname "lo" accept
        ct state established,related accept
        meta l4proto ipv6-icmp accept
        iifname "tun*" ip6 saddr fd00:10:10:8::/64 accept
        iifname "eth0" udp dport 1194 accept
        counter packets 0 bytes 0 drop
    }

    chain postrouting {
        type nat hook postrouting priority 100; policy accept;
        oifname "eth0" ip6 saddr fd00:10:10:8::/64 masquerade
    }
}






[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux