libvirt/tests/networkxml2firewalldata/base.nftables
Laine Stump 7581e3b6d5 Revert "network: add rule to nftables backend that zeroes checksum of DHCP responses"
This reverts commit 42ab0148dd.

This patch was supposed to fix the checksum of dhcp response packets
by setting it to 0 (because having a non-0 but incorrect checksum was
causing the packets to be droppe on FreeBSD guests).

Early testing was positive, but after the patch was pushed upstream
and more people could test it, it turned out that while it fixed the
dhcp checksum problem for virtio-net interfaces on FreeBSD and
OpenBSD, it also *broke* dhcp checksums for the e1000 emulated NIC on
*all* guests (but not e1000e).

So we're reverting this fix and looking for something more universal
to be included in the next release.

Signed-off-by: Laine Stump <laine@redhat.com>
Reviewed-by: Andrea Bolognani <abologna@redhat.com>
2024-10-30 11:39:58 +01:00

139 lines
1.4 KiB
Plaintext

nft \
list \
table \
ip \
libvirt_network
nft \
add \
table \
ip \
libvirt_network
nft \
add \
chain \
ip \
libvirt_network \
forward \
'{ type filter hook forward priority 0; policy accept; }'
nft \
add \
chain \
ip \
libvirt_network \
guest_output
nft \
insert \
rule \
ip \
libvirt_network \
forward \
counter \
jump \
guest_output
nft \
add \
chain \
ip \
libvirt_network \
guest_input
nft \
insert \
rule \
ip \
libvirt_network \
forward \
counter \
jump \
guest_input
nft \
add \
chain \
ip \
libvirt_network \
guest_cross
nft \
insert \
rule \
ip \
libvirt_network \
forward \
counter \
jump \
guest_cross
nft \
add \
chain \
ip \
libvirt_network \
guest_nat \
'{ type nat hook postrouting priority 100; policy accept; }'
nft \
list \
table \
ip6 \
libvirt_network
nft \
add \
table \
ip6 \
libvirt_network
nft \
add \
chain \
ip6 \
libvirt_network \
forward \
'{ type filter hook forward priority 0; policy accept; }'
nft \
add \
chain \
ip6 \
libvirt_network \
guest_output
nft \
insert \
rule \
ip6 \
libvirt_network \
forward \
counter \
jump \
guest_output
nft \
add \
chain \
ip6 \
libvirt_network \
guest_input
nft \
insert \
rule \
ip6 \
libvirt_network \
forward \
counter \
jump \
guest_input
nft \
add \
chain \
ip6 \
libvirt_network \
guest_cross
nft \
insert \
rule \
ip6 \
libvirt_network \
forward \
counter \
jump \
guest_cross
nft \
add \
chain \
ip6 \
libvirt_network \
guest_nat \
'{ type nat hook postrouting priority 100; policy accept; }'