RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 1838355 - nftables rules with dynamic flag only work from RHEL8.2
Summary: nftables rules with dynamic flag only work from RHEL8.2
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: Red Hat Enterprise Linux 8
Classification: Red Hat
Component: nftables
Version: 8.1
Hardware: All
OS: Linux
unspecified
medium
Target Milestone: rc
: 8.0
Assignee: Phil Sutter
QA Contact: qe-baseos-daemons
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2020-05-21 01:26 UTC by Jonathan Maxwell
Modified: 2020-06-29 11:55 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2020-06-29 11:55:28 UTC
Type: Bug
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description Jonathan Maxwell 2020-05-21 01:26:51 UTC
Description of problem:

The documentation as per:

https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/securing_networks/getting-started-with-nftables_securing-networks

Says:

"Add a set named blacklist to the filter table:

# nft add set ip filter blacklist { type ipv4_addr \; flags dynamic, timeout \; timeout 5m \; }"

But that fails prior to RHEL8.2:

# nft add set ip filter blacklist { type ipv4_addr \; flags dynamic, timeout \; timeout 5m \; }
Error: syntax error, unexpected string, expecting constant or interval or timeout
add set ip filter blacklist { type ipv4_addr ; flags dynamic, timeout ; timeout 5m ; }

Version-Release number of selected component (if applicable):

RHEL8.0/8.1

# uname -r
4.18.0-147.5.1.el8_1.x86_64

# rpm -qa|grep nfta
nftables-0.9.0-14.el8.x86_64

How reproducible:

Always.

Steps to Reproduce:

On RHEL8.1:

# nft add set ip filter blacklist { type ipv4_addr \; flags dynamic, timeout \; timeout 5m \; }
Error: syntax error, unexpected string, expecting constant or interval or timeout
add set ip filter blacklist { type ipv4_addr ; flags dynamic, timeout ; timeout 5m ; }

Actual results:

Customers expect the above nft command to succeed on all RHEL8 releases based on the current documentation. But the "dynamic flag" is not supported by the nftables prior to version nftables-0.9.3-12.el8 which ships with RHEL8.2.

Expected results:

Add a note to section 6.15. in:

https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/securing_networks/getting-started-with-nftables_securing-networks

Saying that the "dynamic" flag is only supported from RHEL8.2 onwards. Or if nftables is updated to nftables-0.9.3-12.el8 and greater on prior RHEL8 releases.

Comment 4 Phil Sutter 2020-06-09 14:54:39 UTC
Marc,

Can you possibly take over here?

Thanks, Phil

Comment 6 Phil Sutter 2020-06-22 14:56:07 UTC
Jon, could you possibly have a look at the updated docs and ACK/NACK?

Comment 7 Jonathan Maxwell 2020-06-28 03:07:19 UTC
(In reply to Phil Sutter from comment #6)
> Jon, could you possibly have a look at the updated docs and ACK/NACK?

Phil, Mark, ACK that looks okay to me.

Comment 8 Phil Sutter 2020-06-29 11:55:28 UTC
(In reply to Jonathan Maxwell from comment #7)
> (In reply to Phil Sutter from comment #6)
> > Jon, could you possibly have a look at the updated docs and ACK/NACK?
> 
> Phil, Mark, ACK that looks okay to me.

Thanks for confirming, Jon.


Note You need to log in before you can comment on or make changes to this bug.