All of lore.kernel.org
 help / color / mirror / Atom feed
* Error: conflicting intervals specified - Bullseye 0.9.8
@ 2021-09-08  9:33 Daniel
  2021-09-16  9:29 ` Pablo Neira Ayuso
  0 siblings, 1 reply; 10+ messages in thread
From: Daniel @ 2021-09-08  9:33 UTC (permalink / raw)
  To: Netfilter list

Hi,

I get the following error with the above nft version, lan being the 
interface name:

add element ip6 nat fwdtoip_tcp.lan { 1-65534 : 2001:db8:27b:10:ff9b::, 
1-65534 : 2001:db8:27b:ff9b::c0a8:ad1}

with

add map ipv6_addr nat fwdtoip_tcp.lan { type inet_service : ipv6_addr\; 
flags interval\; }

What's wrong here ? My goal being to redirect all (or range ports) 
external traffic to another server.

Thanks for any hint
-- 
Daniel

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: Error: conflicting intervals specified - Bullseye 0.9.8
  2021-09-08  9:33 Error: conflicting intervals specified - Bullseye 0.9.8 Daniel
@ 2021-09-16  9:29 ` Pablo Neira Ayuso
  2021-09-16 11:27   ` Daniel
  0 siblings, 1 reply; 10+ messages in thread
From: Pablo Neira Ayuso @ 2021-09-16  9:29 UTC (permalink / raw)
  To: Daniel; +Cc: Netfilter list

On Wed, Sep 08, 2021 at 11:33:02AM +0200, Daniel wrote:
> Hi,
> 
> I get the following error with the above nft version, lan being the
> interface name:
> 
> add element ip6 nat fwdtoip_tcp.lan { 1-65534 : 2001:db8:27b:10:ff9b::,
> 1-65534 : 2001:db8:27b:ff9b::c0a8:ad1}
> 
> with
> 
> add map ipv6_addr nat fwdtoip_tcp.lan { type inet_service : ipv6_addr\;
> flags interval\; }
> 
> What's wrong here ? My goal being to redirect all (or range ports) external
> traffic to another server.

Could you develop what your use-case is?

Keys uniquely identify an entry in a map, if you define two entries
with the same key, you hit this conflict interval error.

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: Error: conflicting intervals specified - Bullseye 0.9.8
  2021-09-16  9:29 ` Pablo Neira Ayuso
@ 2021-09-16 11:27   ` Daniel
  2021-09-16 12:58     ` Pablo Neira Ayuso
  0 siblings, 1 reply; 10+ messages in thread
From: Daniel @ 2021-09-16 11:27 UTC (permalink / raw)
  To: Netfilter list

Hello

Le 16/09/2021 à 11:29, Pablo Neira Ayuso a écrit :
> On Wed, Sep 08, 2021 at 11:33:02AM +0200, Daniel wrote:
>> Hi,
>>
>> I get the following error with the above nft version, lan being the
>> interface name:
>>
>> add element ip6 nat fwdtoip_tcp.lan { 1-65534 : 2001:db8:27b:10:ff9b::,
>> 1-65534 : 2001:db8:27b:ff9b::c0a8:ad1}
>>
>> with
>>
>> add map ipv6_addr nat fwdtoip_tcp.lan { type inet_service : ipv6_addr\;
>> flags interval\; }
>>
>> What's wrong here ? My goal being to redirect all (or range ports) external
>> traffic to another server.
> Could you develop what your use-case is?
The above example says -in my mind ;)- that everything coming from 
outside on ip

2001:db8:27b:10:ff9b:: should be redirect (symmetrical) to ip 2001:db8:27b:ff9b::c0a8:ad1

>
> Keys uniquely identify an entry in a map, if you define two entries
> with the same key, you hit this conflict interval error.
I see this like forward port:ip to port:anotherip

-- 
Daniel

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: Error: conflicting intervals specified - Bullseye 0.9.8
  2021-09-16 11:27   ` Daniel
@ 2021-09-16 12:58     ` Pablo Neira Ayuso
  2021-09-16 13:33       ` Daniel
  2021-09-17 10:18       ` Daniel
  0 siblings, 2 replies; 10+ messages in thread
From: Pablo Neira Ayuso @ 2021-09-16 12:58 UTC (permalink / raw)
  To: Daniel; +Cc: Netfilter list

On Thu, Sep 16, 2021 at 01:27:44PM +0200, Daniel wrote:
> Hello
> 
> Le 16/09/2021 à 11:29, Pablo Neira Ayuso a écrit :
> > On Wed, Sep 08, 2021 at 11:33:02AM +0200, Daniel wrote:
> > > Hi,
> > > 
> > > I get the following error with the above nft version, lan being the
> > > interface name:
> > > 
> > > add element ip6 nat fwdtoip_tcp.lan { 1-65534 : 2001:db8:27b:10:ff9b::,
> > > 1-65534 : 2001:db8:27b:ff9b::c0a8:ad1}
> > > 
> > > with
> > > 
> > > add map ipv6_addr nat fwdtoip_tcp.lan { type inet_service : ipv6_addr\;
> > > flags interval\; }
> > > 
> > > What's wrong here ? My goal being to redirect all (or range ports) external
> > > traffic to another server.
> > Could you develop what your use-case is?
>
> The above example says -in my mind ;)- that everything coming from outside
> on ip
> 
> 2001:db8:27b:10:ff9b:: should be redirect (symmetrical) to ip 2001:db8:27b:ff9b::c0a8:ad1
>
> > Keys uniquely identify an entry in a map, if you define two entries
> > with the same key, you hit this conflict interval error.
>
> I see this like forward port:ip to port:anotherip

so you want to redirect all ports except a few of them?

  add map x mymap { type ipv4_addr : ipv4_addr ; }
  add rule x y ip protocol { tcp, udp } th dport 1-65534 dnat to ip saddr map @mymap

This allows you to dnat depending on the IP source address, skipping 0
and 65535 for TCP and UDP.

I'm not sure yet if this is what you need though

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: Error: conflicting intervals specified - Bullseye 0.9.8
  2021-09-16 12:58     ` Pablo Neira Ayuso
@ 2021-09-16 13:33       ` Daniel
  2021-09-17 10:18       ` Daniel
  1 sibling, 0 replies; 10+ messages in thread
From: Daniel @ 2021-09-16 13:33 UTC (permalink / raw)
  To: Pablo Neira Ayuso; +Cc: Netfilter list

Le 16/09/2021 à 14:58, Pablo Neira Ayuso a écrit :

[...]
> Keys uniquely identify an entry in a map, if you define two entries
>>> with the same key, you hit this conflict interval error.
>> I see this like forward port:ip to port:anotherip
> so you want to redirect all ports except a few of them?
>
>    add map x mymap { type ipv4_addr : ipv4_addr ; }
>    add rule x y ip protocol { tcp, udp } th dport 1-65534 dnat to ip saddr map @mymap
>
> This allows you to dnat depending on the IP source address, skipping 0
> and 65535 for TCP and UDP.
>
> I'm not sure yet if this is what you need though
That's my goal,  thanks !

-- 
Daniel

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: Error: conflicting intervals specified - Bullseye 0.9.8
  2021-09-16 12:58     ` Pablo Neira Ayuso
  2021-09-16 13:33       ` Daniel
@ 2021-09-17 10:18       ` Daniel
  2021-09-21  0:13         ` Pablo Neira Ayuso
  1 sibling, 1 reply; 10+ messages in thread
From: Daniel @ 2021-09-17 10:18 UTC (permalink / raw)
  To: Netfilter list

Le 16/09/2021 à 14:58, Pablo Neira Ayuso a écrit :
> [...]
> so you want to redirect all ports except a few of them?
>
>    add map x mymap { type ipv4_addr : ipv4_addr ; }
>    add rule x y ip protocol { tcp, udp } th dport 1-65534 dnat to ip saddr map @mymap
>
> This allows you to dnat depending on the IP source address, skipping 0
> and 65535 for TCP and UDP.

I don't get I so lets be more explicite with an example.

I want to redirect udp port 10000-20000 to another IP (typically 
asterisk RTP ports from host to a VM) What I have today which work with 
single ports (bash script, yes I know ;))

     $fwtables add map $1 nat fwdtoip_tcp.$IFACE { type inet_service : 
$mytype\; flags interval\; }
     $fwtables add map $1 nat fwdtoip_udp.$IFACE { type inet_service : 
$mytype\; flags interval\; }
     $fwtables add map $1 nat fwdtoport_tcp.$IFACE { type inet_service : 
inet_service\; flags interval\;}
     $fwtables add map $1 nat fwdtoport_udp.$IFACE { type inet_service : 
inet_service\; flags interval\;}
     $fwtables add map $1 nat redirect_tcp.$IFACE { type inet_service : 
inet_service\; flags interval\;}
     $fwtables add map $1 nat redirect_udp.$IFACE { type inet_service : 
inet_service\; flags interval\;}

where $1 is ip or ip6, $mytype is ipv4_addr or ipv6_addr

Then from a list of ports I extract each value -including ranges like 
above exemple- and do

If src address != to dst address
$fwtables add element $1 nat fwdtoip_$myproto.$IFACE { $tmpsport : 
$mydaddr }
$fwtables add element $1 nat fwdtoport_$myproto.$IFACE { $tmpsport : 
$tmpdport } ; this is not accepted when a range is given like 10000-20000

If src address = dst address
$fwtables add element $1 nat redirect_$myproto.$IFACE { $tmpsport : 
$tmpdport }

where $1 is ip or ip6, $myproto is udp or tcp, $tmpsport port or range 
of port to redirect, $myaddr is destination ip. $tmpdport can be equal 
or a different value from $tmpsport

Finally rules

$fwtables add rule ip nat prerouting ip daddr == $myaddripv4 dnat tcp 
dport map @fwdtoip_tcp.$IFACE : tcp dport map @fwdtoport_tcp.$IFACE
$fwtables add rule ip nat prerouting ip daddr == $myaddripv4 dnat udp 
dport map @fwdtoip_udp.$IFACE : udp dport map @fwdtoport_udp.$IFACE
$fwtables add rule ip nat prerouting ip daddr == $myaddripv4 meta 
l4proto tcp dnat to : tcp dport map @redirect_tcp.$IFACE
$fwtables add rule ip nat prerouting ip daddr == $myaddripv4 meta 
l4proto udp dnat to : udp dport map @redirect_udp.$IFACE

This works perfectly with single ports but as soon as I want to redirect 
a range of ports it fail.

Where is my mistake ? Is it to complicate to achieve something which 
should be easy ?

Thanks for your support and ideas

-- 
Daniel

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: Error: conflicting intervals specified - Bullseye 0.9.8
  2021-09-17 10:18       ` Daniel
@ 2021-09-21  0:13         ` Pablo Neira Ayuso
  2021-09-28 11:05           ` Daniel
  0 siblings, 1 reply; 10+ messages in thread
From: Pablo Neira Ayuso @ 2021-09-21  0:13 UTC (permalink / raw)
  To: Daniel; +Cc: Netfilter list

On Fri, Sep 17, 2021 at 12:18:12PM +0200, Daniel wrote:
> Le 16/09/2021 à 14:58, Pablo Neira Ayuso a écrit :
> > [...]
> > so you want to redirect all ports except a few of them?
> > 
> >    add map x mymap { type ipv4_addr : ipv4_addr ; }
> >    add rule x y ip protocol { tcp, udp } th dport 1-65534 dnat to ip saddr map @mymap
> > 
> > This allows you to dnat depending on the IP source address, skipping 0
> > and 65535 for TCP and UDP.
> 
> I don't get I so lets be more explicite with an example.
> 
> I want to redirect udp port 10000-20000 to another IP (typically asterisk
> RTP ports from host to a VM) What I have today which work with single ports
> (bash script, yes I know ;))
> 
>     nft add map $1 nat fwdtoip_tcp.$IFACE { type inet_service :
> $mytype\; flags interval\; }
>     nft add map $1 nat fwdtoip_udp.$IFACE { type inet_service :
> $mytype\; flags interval\; }
>     nft add map $1 nat fwdtoport_tcp.$IFACE { type inet_service :
> inet_service\; flags interval\;}
>     nft add map $1 nat fwdtoport_udp.$IFACE { type inet_service :
> inet_service\; flags interval\;}
>     nft add map $1 nat redirect_tcp.$IFACE { type inet_service :
> inet_service\; flags interval\;}
>     nft add map $1 nat redirect_udp.$IFACE { type inet_service :
> inet_service\; flags interval\;}
> 
> where $1 is ip or ip6, $mytype is ipv4_addr or ipv6_addr
> 
> Then from a list of ports I extract each value -including ranges like above
> exemple- and do
> 
> If src address != to dst address
> nft add element $1 nat fwdtoip_$myproto.$IFACE { $tmpsport : $mydaddr
> }
> nft add element $1 nat fwdtoport_$myproto.$IFACE { $tmpsport :
> $tmpdport } ; this is not accepted when a range is given like 10000-20000
> 
> If src address = dst address
> nft add element $1 nat redirect_$myproto.$IFACE { $tmpsport :
> $tmpdport }
> 
> where $1 is ip or ip6, $myproto is udp or tcp, $tmpsport port or range of
> port to redirect, $myaddr is destination ip. $tmpdport can be equal or a
> different value from $tmpsport
> 
> Finally rules
> 
> nft add rule ip nat prerouting ip daddr == $myaddripv4 dnat tcp dport
> map @fwdtoip_tcp.$IFACE : tcp dport map @fwdtoport_tcp.$IFACE
> nft add rule ip nat prerouting ip daddr == $myaddripv4 dnat udp dport
> map @fwdtoip_udp.$IFACE : udp dport map @fwdtoport_udp.$IFACE
> nft add rule ip nat prerouting ip daddr == $myaddripv4 meta l4proto
> tcp dnat to : tcp dport map @redirect_tcp.$IFACE
> nft add rule ip nat prerouting ip daddr == $myaddripv4 meta l4proto
> udp dnat to : udp dport map @redirect_udp.$IFACE
> 
> This works perfectly with single ports but as soon as I want to redirect a
> range of ports it fail.
> 
> Where is my mistake ? Is it to complicate to achieve something which should
> be easy ?

You require nftables 1.0.0 for the snippet below:

table ip nat {
        map fwdtoip_th {
                type ipv4_addr . inet_service : interval ipv4_addr . inet_service
                flags interval
                elements = { 1.2.3.4 . 10000-20000 : 192.168.3.4 . 30000-40000 }
        }

        chain prerouting {
                type nat hook prerouting priority dstnat; policy accept;
                meta l4proto { tcp, udp } dnat to ip daddr . th dport map @fwdtoip_th
        }
}

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: Error: conflicting intervals specified - Bullseye 0.9.8
  2021-09-21  0:13         ` Pablo Neira Ayuso
@ 2021-09-28 11:05           ` Daniel
  2021-09-28 12:41             ` Daniel
  0 siblings, 1 reply; 10+ messages in thread
From: Daniel @ 2021-09-28 11:05 UTC (permalink / raw)
  To: Netfilter list

Hi Pablo,

sorry for delay, I had to install 1.0.0 from snap on my Ubuntu 20.04.

Le 21/09/2021 à 02:13, Pablo Neira Ayuso a écrit :
> On Fri, Sep 17, 2021 at 12:18:12PM +0200, Daniel wrote:
>> Le 16/09/2021 à 14:58, Pablo Neira Ayuso a écrit :
>>> [...]
>>> so you want to redirect all ports except a few of them?
>>>
>>>     add map x mymap { type ipv4_addr : ipv4_addr ; }
>>>     add rule x y ip protocol { tcp, udp } th dport 1-65534 dnat to ip saddr map @mymap
>>>
>>> This allows you to dnat depending on the IP source address, skipping 0
>>> and 65535 for TCP and UDP.
>> I don't get I so lets be more explicite with an example.
>>
>> I want to redirect udp port 10000-20000 to another IP (typically asterisk
>> RTP ports from host to a VM) What I have today which work with single ports
>> (bash script, yes I know ;))
>>
>>      nft add map $1 nat fwdtoip_tcp.$IFACE { type inet_service :
>> $mytype\; flags interval\; }
>>      nft add map $1 nat fwdtoip_udp.$IFACE { type inet_service :
>> $mytype\; flags interval\; }
>>      nft add map $1 nat fwdtoport_tcp.$IFACE { type inet_service :
>> inet_service\; flags interval\;}
>>      nft add map $1 nat fwdtoport_udp.$IFACE { type inet_service :
>> inet_service\; flags interval\;}
>>      nft add map $1 nat redirect_tcp.$IFACE { type inet_service :
>> inet_service\; flags interval\;}
>>      nft add map $1 nat redirect_udp.$IFACE { type inet_service :
>> inet_service\; flags interval\;}
>>
>> where $1 is ip or ip6, $mytype is ipv4_addr or ipv6_addr
>>
>> Then from a list of ports I extract each value -including ranges like above
>> exemple- and do
>>
>> If src address != to dst address
>> nft add element $1 nat fwdtoip_$myproto.$IFACE { $tmpsport : $mydaddr
>> }
>> nft add element $1 nat fwdtoport_$myproto.$IFACE { $tmpsport :
>> $tmpdport } ; this is not accepted when a range is given like 10000-20000
>>
>> If src address = dst address
>> nft add element $1 nat redirect_$myproto.$IFACE { $tmpsport :
>> $tmpdport }
>>
>> where $1 is ip or ip6, $myproto is udp or tcp, $tmpsport port or range of
>> port to redirect, $myaddr is destination ip. $tmpdport can be equal or a
>> different value from $tmpsport
>>
>> Finally rules
>>
>> nft add rule ip nat prerouting ip daddr == $myaddripv4 dnat tcp dport
>> map @fwdtoip_tcp.$IFACE : tcp dport map @fwdtoport_tcp.$IFACE
>> nft add rule ip nat prerouting ip daddr == $myaddripv4 dnat udp dport
>> map @fwdtoip_udp.$IFACE : udp dport map @fwdtoport_udp.$IFACE
>> nft add rule ip nat prerouting ip daddr == $myaddripv4 meta l4proto
>> tcp dnat to : tcp dport map @redirect_tcp.$IFACE
>> nft add rule ip nat prerouting ip daddr == $myaddripv4 meta l4proto
>> udp dnat to : udp dport map @redirect_udp.$IFACE
>>
>> This works perfectly with single ports but as soon as I want to redirect a
>> range of ports it fail.
>>
>> Where is my mistake ? Is it to complicate to achieve something which should
>> be easy ?
> You require nftables 1.0.0 for the snippet below:
>
> table ip nat {
>          map fwdtoip_th {
>                  type ipv4_addr . inet_service : interval ipv4_addr . inet_service
>                  flags interval
>                  elements = { 1.2.3.4 . 10000-20000 : 192.168.3.4 . 30000-40000 }
>          }
>
>          chain prerouting {
>                  type nat hook prerouting priority dstnat; policy accept;
>                  meta l4proto { tcp, udp } dnat to ip daddr . th dport map @fwdtoip_th
>          }
> }

I can't get it, map is OK but creating rule fail

map in nat prerouting:

map fwdtoip_th {
         type ipv4_addr . inet_service : interval ipv4_addr . inet_service
         flags interval
         elements = { 192.168.10.24 . 58194-58198 : 192.168.10.254 . 
58194-58198 }
     }

Now I add the rule

sudo nft add rule ip nat prerouting meta l4proto { tcp, udp } dnat to ip 
daddr . th dport map @fwdtoip_th ; from your example

and error is

Error: datatype mismatch: expected IPv4 address, expression has type 
concatenation of (IPv4 address, internet network service)
add rule ip nat prerouting meta l4proto { tcp, udp } dnat to ip daddr . 
th dport map @fwdtoip_th

OK, after to ip should be the daddr so I insert it

sudo nft add rule ip nat prerouting meta l4proto { tcp, udp } dnat to ip 
daddr daddr . th dport map @fwdtoip_th

and error is

Error: syntax error, unexpected newline
add rule ip nat prerouting meta l4proto { tcp, udp } dnat to ip daddr 
daddr . th dport map @fwdtoip_th

What's wrong ?

Thanks for your help

-- 
Daniel

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: Error: conflicting intervals specified - Bullseye 0.9.8
  2021-09-28 11:05           ` Daniel
@ 2021-09-28 12:41             ` Daniel
  2021-09-28 20:58               ` Pablo Neira Ayuso
  0 siblings, 1 reply; 10+ messages in thread
From: Daniel @ 2021-09-28 12:41 UTC (permalink / raw)
  To: Netfilter list



Le 28/09/2021 à 13:05, Daniel a écrit :
> Hi Pablo,
> 
> sorry for delay, I had to install 1.0.0 from snap on my Ubuntu 20.04.
> 
> Le 21/09/2021 à 02:13, Pablo Neira Ayuso a écrit :
> [...]
>> You require nftables 1.0.0 for the snippet below:
>>
>> table ip nat {
>>          map fwdtoip_th {
>>                  type ipv4_addr . inet_service : interval ipv4_addr . 
>> inet_service
>>                  flags interval
>>                  elements = { 1.2.3.4 . 10000-20000 : 192.168.3.4 . 
>> 30000-40000 }
>>          }
>>
>>          chain prerouting {
>>                  type nat hook prerouting priority dstnat; policy accept;
>>                  meta l4proto { tcp, udp } dnat to ip daddr . th dport 
>> map @fwdtoip_th
>>          }
>> }
> 
> I can't get it, map is OK but creating rule fail
> 
> map in nat prerouting:
> 
> map fwdtoip_th {
>          type ipv4_addr . inet_service : interval ipv4_addr . inet_service
>          flags interval
>          elements = { 192.168.10.24 . 58194-58198 : 192.168.10.254 . 
> 58194-58198 }
>      }
> 
> Now I add the rule
> 
> sudo nft add rule ip nat prerouting meta l4proto { tcp, udp } dnat to ip 
> daddr . th dport map @fwdtoip_th ; from your example
> 
> and error is
> 
> Error: datatype mismatch: expected IPv4 address, expression has type 
> concatenation of (IPv4 address, internet network service)
> add rule ip nat prerouting meta l4proto { tcp, udp } dnat to ip daddr . 
> th dport map @fwdtoip_th
> 
> OK, after to ip should be the daddr so I insert it
> 
> sudo nft add rule ip nat prerouting meta l4proto { tcp, udp } dnat to ip 
> daddr daddr . th dport map @fwdtoip_th
> 
> and error is
> 
> Error: syntax error, unexpected newline
> add rule ip nat prerouting meta l4proto { tcp, udp } dnat to ip daddr 
> daddr . th dport map @fwdtoip_th

Something is wrong when calling a named map (in this case). If I do

sudo nft add rule ip nat prerouting meta l4proto { tcp, udp } dnat to ip 
daddr . th dport map { 192.168.10.24 . 10000-20000 : 192.168.10.254 . 
3000-40000 }

everything is fine. But if I call the map like

sudo nft add rule ip nat prerouting meta l4proto { tcp, udp } dnat to ip 
daddr . th dport map @fwdtoip_th

I get

Error: datatype mismatch: expected IPv4 address, expression has type 
concatenation of (IPv4 address, internet network service)
add rule ip nat prerouting meta l4proto { tcp, udp } dnat to ip daddr . 
th dport map @fwdtoip_th

Expression recognize that map is a concatenation but not that the "to ip 
daddr . th dport" should also be treated as concatenation
-- 
Daniel

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: Error: conflicting intervals specified - Bullseye 0.9.8
  2021-09-28 12:41             ` Daniel
@ 2021-09-28 20:58               ` Pablo Neira Ayuso
  0 siblings, 0 replies; 10+ messages in thread
From: Pablo Neira Ayuso @ 2021-09-28 20:58 UTC (permalink / raw)
  To: Daniel; +Cc: Netfilter list

On Tue, Sep 28, 2021 at 02:41:57PM +0200, Daniel wrote:
> Le 28/09/2021 à 13:05, Daniel a écrit :
[...]
> everything is fine. But if I call the map like
> 
> sudo nft add rule ip nat prerouting meta l4proto { tcp, udp } dnat to ip
> daddr . th dport map @fwdtoip_th
> 
> I get
> 
> Error: datatype mismatch: expected IPv4 address, expression has type
> concatenation of (IPv4 address, internet network service)
> add rule ip nat prerouting meta l4proto { tcp, udp } dnat to ip daddr . th
> dport map @fwdtoip_th
> 
> Expression recognize that map is a concatenation but not that the "to ip
> daddr . th dport" should also be treated as concatenation

Fix: https://patchwork.ozlabs.org/project/netfilter-devel/patch/20210928205543.368551-1-pablo@netfilter.org/

^ permalink raw reply	[flat|nested] 10+ messages in thread

end of thread, other threads:[~2021-09-28 20:58 UTC | newest]

Thread overview: 10+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-09-08  9:33 Error: conflicting intervals specified - Bullseye 0.9.8 Daniel
2021-09-16  9:29 ` Pablo Neira Ayuso
2021-09-16 11:27   ` Daniel
2021-09-16 12:58     ` Pablo Neira Ayuso
2021-09-16 13:33       ` Daniel
2021-09-17 10:18       ` Daniel
2021-09-21  0:13         ` Pablo Neira Ayuso
2021-09-28 11:05           ` Daniel
2021-09-28 12:41             ` Daniel
2021-09-28 20:58               ` Pablo Neira Ayuso

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.