[pve-devel] [PATCH proxmox-firewall 1/1] fix #6831: move conntrack statement to forward chain

Hannes Laimer h.laimer at proxmox.com
Wed Oct 1 09:00:00 CEST 2025


Could reproduce the problem(s) and this fixes them. The changes also
makes sense, so consider this

Tested-by: Hannes Laimer <h.laimer at proxmox.com>
Reviewed-by: Hannes Laimer <h.laimer at proxmox.com>

On 9/23/25 14:27, Stefan Hanreich wrote:
> The conntrack statement was included in the host-forward chain, which
> is managed by the firewall daemon. It gets flushed in every iteration
> of the daemon, but the rule is never re-created in the daemon. This
> caused conntracked flows that are routed by the PVE host to not get
> accepted. Generally, the ruleset is constructed in a way that all
> chains that are managed by the firewall daemon are empty by default -
> this was the only exception. Move the ct state statement to the
> appropriate chain. Since the forward chain is in the inet table which
> never sees ARP traffic in the first place, remove the respective
> statement matching on ARP. This is most likely copied from the bridge
> table where this modifier is indeed necessary, since there ARP traffic
> is visible.
> 
> This also fixes a report from a user in the forum [1], where if the
> daemon fails to generate a ruleset there are growing number of entries
> in the host-forward chain that consists only of the ct state
> statement. This is because the host-forward chain never gets flushed
> by the default ruleset, but nftables inserts all rules in the chain an
> additional time when executing the default ruleset.
> 
> [1] https://forum.proxmox.com/threads/macro-firewall-rules-not-working-with-nftables.171262/#post-799600
> 
> Signed-off-by: Stefan Hanreich <s.hanreich at proxmox.com>
> ---
>   proxmox-firewall/resources/proxmox-firewall.nft | 5 ++---
>   1 file changed, 2 insertions(+), 3 deletions(-)
> 
> diff --git a/proxmox-firewall/resources/proxmox-firewall.nft b/proxmox-firewall/resources/proxmox-firewall.nft
> index 2456336..ea102ec 100644
> --- a/proxmox-firewall/resources/proxmox-firewall.nft
> +++ b/proxmox-firewall/resources/proxmox-firewall.nft
> @@ -267,6 +267,7 @@ table inet proxmox-firewall {
>   
>       chain forward {
>           type filter hook forward priority filter; policy accept;
> +        ct state vmap { established : accept, related : accept, invalid : jump invalid-conntrack }
>           jump host-forward
>           jump cluster-forward
>       }
> @@ -278,9 +279,7 @@ table inet proxmox-firewall {
>       chain host-out {}
>   
>       chain cluster-forward {}
> -    chain host-forward {
> -        meta protocol != arp ct state vmap { established : accept, related : accept, invalid : jump invalid-conntrack }
> -    }
> +    chain host-forward {}
>   
>       chain ct-in {}
>       chain invalid-conntrack { }





More information about the pve-devel mailing list