-
Notifications
You must be signed in to change notification settings - Fork 18
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Wrong include order for ruleset-prepend #51
Comments
I am out of ideas how actual implementation could look, because unless you make include file flush table it would be repeatedly adding same chains+rules over and over again. |
@brada4 This is presently already the case. Rulesets outside the |
Mind to make a PR? Actual documentation misses out that table-pre equals /etc/nftables.d/ |
Issue described in openwrt#51 and fix proposed by @SomeRandomName Fixes: openwrt#51 Fixes: openwrt@11256ff
Mail me if you want proper credit. |
Under which circumstances is the current inclusion order a problem? Can we rule out that moving it will alter the behaviour of existing configs? |
Description clearly says it is before table .. fw4, while at present it is next to table-prepend separated by some initial setup routines. |
Well So asking again, under which circumstances is a preceding forward declaration and flushing of To me it seems as if the proposed change will change the behavior to be less deterministic.
To be clear, I agree that the wiki-documented position of "At the very beginning, before the fw4 table definition" is misleading or even wrong, but I am not convinced that changing the code to match the wiki is the way to go, rather than fixing the wiki to match the established implementation. |
flush table keeps blank table definition.... |
Yeah sure, but the question remains - why is this a problem? You cannot really alter the fw4 table without risking that rules generated later will be incompatible with it. And for working on unrelated tables or other entities, the forward declaration does not matter. If the objective is to somehow get rid of the generated fw4 table or replace it with a table of the same name but a different family or whatever, then this can only be done from |
I dunno, i know qosmate picks crumbles explicitly after fw4. Maybe somebody wants to wash traffic before. |
Shouldn't someone who wants to edit the fw4 table be using the In my use case for example, the change would allow bridge packets to be indiscriminately blocked before they are needlessly evaluated by later definitions. It could I guess potentially break some installations, but only ones which already improperly use |
What's the actual things you try to inject? I guess I see where the confusion stems from, "ruleset" here refers to the entire ruleset, not "the rules and chains within table fw4" and "table-pre"/"table-post" refers to "inside table fw4 at the top" and "inside table fw4 at the end" rather than "before table fw4" and "after table fw4". Maybe it's worth adding new aliases:
Alternatively maybe |
So this is the .nft file I'm trying to include:
From my expectation |
According to my understanding (which might be wrong) - the declaration order of tables does not matter, the hook priority does influence which chain is entered first. So if you want to precede fw4's forward chain you would need to adjust the When multiple hooks use the same priority then the order of declaration of the hooks themselves should be followed, the (forward) declaration order of the tables themselves should not influence evaluation order. But instead of guessing; is the proposed change by @brada4 (moving the |
It is @somerandoname 's proposed change, i just wrote it down and drilled though tests |
Hm, I see, so technically the order of the tables in the nftables ruleset doesn't matter, and |
Only thing it can break if something inet (ip4 or ip6) drops some packet before fw4 in place of after. eg ct state new masquerade and ct state new drop are swapped. |
Sorry, but what exactly determines the order of declaration? Is it literally the order of the rule declaration, or how they are ordered in the Edit: It does keep track of it, and can be viewed with |
It renumbers on interfaces created/deleted/down/up. |
So to ensure order of operation, one shouldn't rely on the ruleset ordering and just use the priority setting. That clears things up for me, thanks. |
The ordering should probably be adjusted to have one of each instead of 2 -append table places. |
Closing this in favor to consistency and potential compatibility with existing setups. As discussed above, the change would not actually change the match order, just introduce a bit of uncertainty (since table fw4 might or might not exist while in the current implementation it is guaranteed to exist and be empty) |
According to the documentation, custom includes with the
ruleset-prepend
option should be placed "before the fw4 table definition". However, this is currently not the case.This seems to be caused by the rules being included after the fw4 table was initialized, which effectively makes this option behave nearly the same as
ruleset-append
:Changing the order fixes this on my system:
https://github.com/openwrt/firewall4/blob/18fc0ead19faf06b8ce7ec5be84957278e942dfa/root/usr/share/firewall4/templates/ruleset.uc#L8C1-L13C38
The text was updated successfully, but these errors were encountered: