-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Single v6 IP within other /64 range: Error: conflicting intervals specified #9
Comments
This is a problem where nftables in the kernel is reporting an error with the information you have supplied it. nftfw can only report the error, and doesn't know how to fix it, which you've done by removing the single IPv6 address. The nft ruleset that you saw is the default setting when no nftables instructions have been found on reboot. It would be wise to ensure that /etc/nftables.conf is loaded by the nft command when the system reboots. On Debian, this is done by the nftables package. nftfw will not change /etc/nftables.conf when the test phase of the load process fails. |
Good evening,
I was just cleaning through various webserver accounts and came across
some of the nftables advice i had gotten from you years back! nftfw
If you are still around, i have a environmental nftables question if
interested.
I have a nice little ruleset that uses external IPSETs that define some
trust levels in my rules. inspired in part by my use of nftfw i bet..
Then you introduce a pile of kubernettes hosts into the network & some
adjustments are needed!
have you worked much with nftables along side running kubernettes?
it likes to manage it's own ruleset, forward traffic and similar. they
can coexist i've found.
ensuring it can manage it's traffic while still securing the host is one
of my goals.
I love working with nftables. it's been fun.
…On 2023-05-17 14:06, Peter Collinson wrote:
This is a problem where nftables in the kernel is reporting an error
with the information you have supplied it. nftfw can only report the
error, and doesn't know how to fix it, which you've done by removing
the single IPv6 address.
The nft ruleset that you saw is the default setting when no nftables
instructions have been found on reboot. It would be wise to ensure
that /etc/nftables.conf is loaded by nft when the system reboots. On
Debian, this is done by the nftables package.
--
Reply to this email directly, view it on GitHub [1], or unsubscribe
[2].
You are receiving this because you are subscribed to this
thread.Message ID: ***@***.***>
Links:
------
[1]
#9 (comment)
[2]
https://github.com/notifications/unsubscribe-auth/AKLQXVDQHCW6VRE3F5AYG3TXGTLM7ANCNFSM6AAAAAAYCP6NOI
|
Sorry I have not. |
I use nftfw on a VPS and today, when the system was rebooted, nftfw seemed to encounter a config error and seemed to default to a state where all inbound connections were permitted - I received a Shodan open port alert.
In whitelist.d I have a couple of /64 ranges. The problem seems to have been triggered because I had a single v6 IP in addition to a /64 range. The single v6 IP happened to be within one of the /64 ranges.
With the v6 IP file in whitelist.d, the error in nftfw load is as follows:
After a reboot, this was the output of nft list ruleset:
When the single v6 IP is rm'd and then doing an nftfw load, the ruleset is then loaded correctly.
Hopefully I've explained this OK. Sorry if not.
The text was updated successfully, but these errors were encountered: