... on the guest table. There is no reason to not repect that option on those two chains. These two were missed in the referenced commit.
Fixes: 64dc344b ("firewall: apply `nt_conntrack_allow_invalid` option to guest table") Signed-off-by: Hannes Laimer <h.lai...@proxmox.com> --- proxmox-firewall/resources/proxmox-firewall.nft | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/proxmox-firewall/resources/proxmox-firewall.nft b/proxmox-firewall/resources/proxmox-firewall.nft index 2dd7c48..30f7b4f 100644 --- a/proxmox-firewall/resources/proxmox-firewall.nft +++ b/proxmox-firewall/resources/proxmox-firewall.nft @@ -356,7 +356,7 @@ table bridge proxmox-firewall-guests { } chain pre-vm-out { - meta protocol != arp ct state vmap { established : accept, related : accept, invalid : drop } + meta protocol != arp ct state vmap { established : accept, related : accept, invalid : jump invalid-conntrack } } chain vm-out { @@ -384,7 +384,7 @@ table bridge proxmox-firewall-guests { chain before-bridge { meta protocol arp accept - meta protocol != arp ct state vmap { established : accept, related : accept, invalid : drop } + meta protocol != arp ct state vmap { established : accept, related : accept, invalid : jump invalid-conntrack } } chain forward { -- 2.39.5 _______________________________________________ pve-devel mailing list pve-devel@lists.proxmox.com https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel