David Ahern <dsah...@gmail.com> wrote: > On 12/27/18 12:38 AM, we...@ucloud.cn wrote: > > nft add table firewall > > nft add chain firewall zones { type filter hook prerouting priority - 300 > > \; } > > nft add rule firewall zones counter ct zone set iif map { "eth1" : 1, > > "eth2" : 2 } > > nft add chain firewall rule-1000-ingress > > nft add rule firewall rule-1000-ingress ct zone 1 tcp dport 22 ct state new > > counter accept > > nft add rule firewall rule-1000-ingress counter drop > > nft add chain firewall rule-1000-egress > > nft add rule firewall rule-1000-egress tcp dport 22 ct state new counter > > drop > > nft add rule firewall rule-1000-egress counter accept > > > > nft add chain firewall rules-all { type filter hook prerouting priority - > > 150 \; } > > nft add rule firewall rules-all ip daddr vmap { "2.2.2.11" : jump > > rule-1000-ingress } > > nft add rule firewall rules-all ct zone vmap { 1 : jump rule-1000-egress } > > Bug report to the netfilter crowd: After this set of commands, 'nft list > tables' goes into a loop over recvmsg. This is debian stretch with > nftables from backports - version 0.9.0-1~bpo9+1
Thanks for reporting, I will have a look.