*sigh* Found this is the code:
#ifdef VIR_NFTABLES_INCLUDE_HOST_RULES /* These rules copied from the iptables backend, have been removed * from the nftab because they are redundant since we are using our own * table that is default accept; there are no other users that * could add a reject rule that we would need to / be able to * override with these rules */ /* allow DHCP requests through to dnsmasq & back out */ nftablesAddTcpInput(fw, VIR_FIREWALL_LAYER_IPV4, def->bridge, 67); nftablesAddUdpInput(fw, VIR_FIREWALL_LAYER_IPV4, def->bridge, 67); nftablesAddTcpOutput(fw, VIR_FIREWALL_LAYER_IPV4, def->bridge, 68); nftablesAddUdpOutput(fw, VIR_FIREWALL_LAYER_IPV4, def->bridge, 68); Turns out this is correct, so it *was* an nftables ordering problem, I just didn't know that libvirt didn't lay those rules down in nftables mode so it looked broken. Once I removed the relevant reject in my nftables config, it worked. On Fri, Feb 21, 2025 at 12:06 AM Robin Powell <robinleepow...@gmail.com> wrote: > Setting `firewall_backend = "iptables"` and allowing it to use the > iptables-nft shim *did* get the right rules into place. > > I then ran smack into the "my main input chain has a default deny rule", > but that's my problem. :) > > On Thu, Feb 20, 2025 at 10:33 PM <robinleepow...@gmail.com> wrote: > >> I do not think this is any of the similar issues that have been >> posted to this list; I've checked. >> >> In particular, this in *NOT* an issue with nft rules precedence; the >> rules are simply not being written by libvirt. >> >> I'm running vagrant which is running libvirt on a Fedora 41 host. I >> do not think this is a vagrant problem, but if people want me to run >> virsh commands directly I certainly can. >> >> Anyway, vagrant was failing until I noticed that the default for >> /etc/libvirt/network.conf is now nftables, which I did not have set >> up. When I set `firewall_backend = "iptables"`, everything worked >> fine. >> >> I want to emphasize that: the same vagrant / libvirt setup *was* >> working with iptables. >> >> But I took that as a sign that it was time to move to nftables, so I >> moved everything on this host and stuff is back to working. >> >> But libvirt just isn't writing out the right nft rules. Like, at >> all. >> >> Here's the network vagrant creates: >> >> $ sudo virsh net-dumpxml vagrant-libvirt >> <network connections='1' ipv6='yes'> >> <name>vagrant-libvirt</name> >> <uuid>b2d93ef4-b305-4382-a380-c1eca92d8ebd</uuid> >> <forward mode='nat'> >> <nat> >> <port start='1024' end='65535'/> >> </nat> >> </forward> >> <bridge name='virbr1' stp='on' delay='0'/> >> <mac address='52:54:00:63:d3:f6'/> >> <ip address='192.168.121.1' netmask='255.255.255.0'> >> <dhcp> >> <range start='192.168.121.1' end='192.168.121.254'/> >> </dhcp> >> </ip> >> </network> >> >> And here's the *entire* libvirt-related ruleset in nftables: >> >> table ip libvirt_network { >> chain forward { >> type filter hook forward priority filter; policy >> accept; >> counter packets 0 bytes 0 jump guest_cross >> counter packets 0 bytes 0 jump guest_input >> counter packets 0 bytes 0 jump guest_output >> } >> >> chain guest_output { >> ip saddr 192.168.121.0/24 iif "virbr1" counter >> packets 0 bytes 0 accept >> iif "virbr1" counter packets 0 bytes 0 reject >> } >> >> chain guest_input { >> oif "virbr1" ip daddr 192.168.121.0/24 ct state >> established,related counter packets 0 bytes 0 accept >> oif "virbr1" counter packets 0 bytes 0 reject >> } >> >> chain guest_cross { >> iif "virbr1" oif "virbr1" counter packets 0 bytes 0 >> accept >> } >> >> chain guest_nat { >> type nat hook postrouting priority srcnat; policy >> accept; >> ip saddr 192.168.121.0/24 ip daddr 224.0.0.0/24 >> counter packets 1 bytes 187 return >> ip saddr 192.168.121.0/24 ip daddr 255.255.255.255 >> counter packets 0 bytes 0 return >> meta l4proto tcp ip saddr 192.168.121.0/24 ip daddr >> != 192.168.121.0/24 counter packets 0 bytes 0 masquerade to :1024-65535 >> meta l4proto udp ip saddr 192.168.121.0/24 ip daddr >> != 192.168.121.0/24 counter packets 0 bytes 0 masquerade to :1024-65535 >> ip saddr 192.168.121.0/24 ip daddr != >> 192.168.121.0/24 counter packets 0 bytes 0 masquerade >> } >> } >> table ip6 libvirt_network { >> chain forward { >> type filter hook forward priority filter; policy >> accept; >> counter packets 0 bytes 0 jump guest_cross >> counter packets 0 bytes 0 jump guest_input >> counter packets 0 bytes 0 jump guest_output >> } >> >> chain guest_output { >> iif "virbr1" counter packets 0 bytes 0 reject >> } >> >> chain guest_input { >> oif "virbr1" counter packets 0 bytes 0 reject >> } >> >> chain guest_cross { >> iif "virbr1" oif "virbr1" counter packets 0 bytes 0 >> accept >> } >> >> chain guest_nat { >> type nat hook postrouting priority srcnat; policy >> accept; >> } >> } >> >> Here's some log output (I have virtnetworkd running with -v): >> >> $ sudo journalctl -u virtnetworkd.service | grep -i nft >> [snip] >> Feb 20 21:36:42 stodi.digitalkingdom.org virtnetworkd[89119]: using >> firewall_backend: 'nftables' >> Feb 20 21:36:46 stodi.digitalkingdom.org virtnetworkd[89119]: >> Applying 'nft list table ip libvirt_network' >> Feb 20 21:36:46 stodi.digitalkingdom.org virtnetworkd[89119]: >> Applying 'nft list table ip6 libvirt_network' >> Feb 20 21:36:46 stodi.digitalkingdom.org virtnetworkd[89119]: >> Applying 'nft -ae insert rule ip libvirt_network guest_output iif virbr1 >> counter reject' >> Feb 20 21:36:46 stodi.digitalkingdom.org virtnetworkd[89119]: >> Applying 'nft -ae insert rule ip libvirt_network guest_input oif virbr1 >> counter reject' >> Feb 20 21:36:46 stodi.digitalkingdom.org virtnetworkd[89119]: >> Applying 'nft -ae insert rule ip libvirt_network guest_cross iif virbr1 oif >> virbr1 counter accept' >> Feb 20 21:36:46 stodi.digitalkingdom.org virtnetworkd[89119]: >> Applying 'nft -ae insert rule ip6 libvirt_network guest_output iif virbr1 >> counter reject' >> Feb 20 21:36:46 stodi.digitalkingdom.org virtnetworkd[89119]: >> Applying 'nft -ae insert rule ip6 libvirt_network guest_input oif virbr1 >> counter reject' >> Feb 20 21:36:46 stodi.digitalkingdom.org virtnetworkd[89119]: >> Applying 'nft -ae insert rule ip6 libvirt_network guest_cross iif virbr1 >> oif virbr1 counter accept' >> Feb 20 21:36:47 stodi.digitalkingdom.org virtnetworkd[89119]: >> Applying 'nft -ae insert rule ip libvirt_network guest_output ip saddr >> 192.168.121.0/24 iif virbr1 counter accept' >> Feb 20 21:36:47 stodi.digitalkingdom.org virtnetworkd[89119]: >> Applying 'nft -ae insert rule ip libvirt_network guest_input oif virbr1 ip >> daddr 192.168.121.0/24 ct state related,established counter accept' >> Feb 20 21:36:47 stodi.digitalkingdom.org virtnetworkd[89119]: >> Applying 'nft -ae insert rule ip libvirt_network guest_nat ip saddr >> 192.168.121.0/24 ip daddr '!=' 192.168.121.0/24 counter masquerade' >> Feb 20 21:36:47 stodi.digitalkingdom.org virtnetworkd[89119]: >> Applying 'nft -ae insert rule ip libvirt_network guest_nat meta l4proto udp >> ip saddr 192.168.121.0/24 ip daddr '!=' 192.168.121.0/24 counter >> masquerade to :1024-65535' >> Feb 20 21:36:47 stodi.digitalkingdom.org virtnetworkd[89119]: >> Applying 'nft -ae insert rule ip libvirt_network guest_nat meta l4proto tcp >> ip saddr 192.168.121.0/24 ip daddr '!=' 192.168.121.0/24 counter >> masquerade to :1024-65535' >> Feb 20 21:36:47 stodi.digitalkingdom.org virtnetworkd[89119]: >> Applying 'nft -ae insert rule ip libvirt_network guest_nat ip saddr >> 192.168.121.0/24 ip daddr 255.255.255.255/32 counter return' >> Feb 20 21:36:47 stodi.digitalkingdom.org virtnetworkd[89119]: >> Applying 'nft -ae insert rule ip libvirt_network guest_nat ip saddr >> 192.168.121.0/24 ip daddr 224.0.0.0/24 counter return' >> >> So it's not like trying to create the rules and failing, that I can >> see; it just isn't trying. >> >> To clarify this setup appears to be missing every rule that would be >> needed for DHCPv4 and DNS to work. >> >> Like https://gitlab.com/libvirt/libvirt/-/issues/88#note_694493261 >> shows rules for udp 67 and 53 that are just 100% not being created >> at all. >> >> I have no idea what's going wrong here or even where to look; the >> code at >> >> https://lists.libvirt.org/archives/list/de...@lists.libvirt.org/thread/GT75XY7H3VJB5LTNRG4WYK47WGTQYYCZ/ >> sure *looks like* it should be unconditionally adding those rules. >> >> Help? >> >