I'm trying to understand why the nft(8) responds the way it does, and
perhaps try to understand the underlying operation of a netfilter firewall.
What is the difference between these selectors?
1. iif eth0
2. meta fib saddr iif eth0
3. meta fib daddr iif eth0
4. oif eth0
5. meta fib saddr oif eth0
6. meta fib daddr oif eth0
(1) tests what interface came from, irrespective of the source and
destination address
(2) uses the routing table to find out where the packet would return
(3) uses the routing table to find out where the packet will be routed
(4) tests the interface associated with the routing decision that has
been performed in the packet flow. In theory. (3), (4) and (6) would
return the same result.
(5) uses the routing table to find out where the packet would return
(6) uses the routing table to find out where the packet would be routed.
In theory, (4) and (6) would return the same result.
===
https://wiki.nftables.org/wiki-nftables/index.php/Netfilter_hooks
So here is the big question: how can I determine the FIB's
classification of the source address in rules in the output and
postrouting tables? In other words, how can I test that the source
address denotes a uni-cast address that would return to this router?
The documentation is silent about restrictions on using the routing
selectors.
I can understand why "oif eth0" is not permitted in ingress, prerouting
and input tables, because the output routing decision hasn't been made yet.
The packet routing decision *has* been made in the forward, output, and
postrouting table, so "oif eth0" should be allowed.