Rafael David Tinoco <rafaeldtinoco@xxxxxxxxxx> wrote: > > > This can also be observed with: > > > > > > libnetfilter-log/utils/nf-log.c code (if BUILD_NFCT) > > > > Works for me: > > 00389d4fd5f00000000a9e2060000000000101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f3031323334353637</payload></log> > > (ret=450) > > ip_conntrack_info: REPLY / ESTABLISHED > > icmpv6 58 30 src=::1 dst=::1 type=128 code=0 id=6 src=::1 dst=::1 > > type=129 code=0 id=6 > > > > Do you have an ip6tables rule that matches on conntrack state? > > Otherwise conntrack will be disabled. > > > > Ha, that's weird. > > log received (prefix="TRACE: raw:OUTPUT:policy:3 " hw=0x86dd hook=3 mark=0) > <log><when><hour>14</hour><min>27</min><sec>16</sec><wday>3</wday><day>12</day><month>1</month><year>2021</year></when><prefix>TRACE: raw:OUTPUT:policy:3 </prefix><hook>3</hook><hw><proto>86dd</proto></hw><outdev>12</outdev><payload>600041d600200640fe8000000000000014535dfffe1aca68fe8000000000000002163efffe7faedd9b1000161118d258a85cd4bb801001fb267100000101080a011250252a763edf</payload></log> (ret=393) > > here... kernel 5.8.0-26-generic and latest libnetfilter-log, using: > > ip6tables-legacy -t raw -I OUTPUT 1 -m conntrack --ctstate NEW,ESTABLISHED,RELATED -j ACCEPT > ip6tables-legacy -t raw -I PREROUTING 1 -m conntrack --ctstate NEW,ESTABLISHED,RELATED -j ACCEPT > ip6tables-legacy -t raw -A OUTPUT -j TRACE > ip6tables-legacy -t raw -A PREROUTING -j TRACE ? You need a -j NFLOG rule. -j TRACE might not even use netlink events but raw printk() when used with classic iptables (rather than iptables-nft, where this maps to 'meta nftrace set 1'.