1
0

Compare commits

..

No commits in common. "5306b361814c65c9cd16c56f04da5a9e78d7855d" and "8affb151b51a11d76a94c8920d38696756b67a17" have entirely different histories.

View File

@ -106,16 +106,6 @@ in {
(accept "tcp dport 22") (accept "tcp dport 22")
]; ];
}; };
input-wan = {
type = "filter";
family = "ip6";
rules = [
(accept "udp dport 546") # dhcp client, needed for prefix delegation
];
};
input-ip6 = { input-ip6 = {
type = "filter"; type = "filter";
family = "ip6"; family = "ip6";
@ -124,7 +114,6 @@ in {
rules = [ rules = [
(accept "meta l4proto icmpv6") (accept "meta l4proto icmpv6")
"iifname int jump input-lan" "iifname int jump input-lan"
"iifname ppp0 jump input-wan"
(if allow-incoming (if allow-incoming
then accept "oifname \"int\" iifname \"ppp0\"" then accept "oifname \"int\" iifname \"ppp0\""
else "oifname \"int\" iifname \"ppp0\" jump incoming-allowed-ip6" else "oifname \"int\" iifname \"ppp0\" jump incoming-allowed-ip6"
@ -143,28 +132,4 @@ in {
# "oifname \"int\" ip6 daddr 2001:8b0:de3a:40de::e9d tcp dport 22" # "oifname \"int\" ip6 daddr 2001:8b0:de3a:40de::e9d tcp dport 22"
]; ];
}; };
nat-tx = {
type = "nat";
hook = "postrouting";
priority = "100";
policy = "accept";
family = "ip";
rules = [
"oifname \"ppp0\" masquerade"
];
};
nat-rx = {
type = "nat";
hook = "prerouting";
priority = "-100";
family = "ip";
policy = "accept";
rules = [
# per https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/security_guide/sec-configuring_nat_using_nftables:
# "Even if you do not add a rule to the prerouting chain, the
# nftables framework requires this chain to match incoming
# packet replies. "
];
};
} }