Security groups can be bound to a specific interface. The notion of this breaks down when considering the forward direction, since there are two interfaces involved: incoming and outgoing, which can be different depending on the kind of traffic.
With the current implementation, the firewall refuses to generate rulesets with security groups that are bound to specific interfaces. Check for this case explicitly and skip creating rules in the forward chain when a security group bound to a specific interface is encountered. Signed-off-by: Stefan Hanreich <s.hanre...@proxmox.com> Tested-by: Hannes Duerr <h.du...@proxmox.com> --- Notes: Changes from v1: * split from https://lore.proxmox.com/pve-devel/20250123101300.72647-1-s.hanre...@proxmox.com/ * rebased on top of master proxmox-firewall/src/rule.rs | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/proxmox-firewall/src/rule.rs b/proxmox-firewall/src/rule.rs index b20a9c5..14ee544 100644 --- a/proxmox-firewall/src/rule.rs +++ b/proxmox-firewall/src/rule.rs @@ -201,6 +201,10 @@ fn handle_iface(rules: &mut [NftRule], env: &NftRuleEnv, name: &str) -> Result<( impl ToNftRules for RuleGroup { fn to_nft_rules(&self, rules: &mut Vec<NftRule>, env: &NftRuleEnv) -> Result<(), Error> { + if env.direction == Direction::Forward && self.iface().is_some() { + return Ok(()); + } + let chain_name = format!("group-{}-{}", self.group(), env.direction); rules.push(NftRule::new(Statement::jump(chain_name))); -- 2.39.5 _______________________________________________ pve-devel mailing list pve-devel@lists.proxmox.com https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel