-
-
Notifications
You must be signed in to change notification settings - Fork 558
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New 0.30.x ACL features break iptables-nft routing table #2725
Comments
I'm also having the same issue on version 0.30.0. |
Yeah, I'm also not quite sure which rule is causing the issue. I would assume any rule that is inserted into that chain via nftables causes the issue?
It might be necessary to insert those rules
via iptables, something like
instead of using |
FWIW this completely broke Docker forwarding for me on multiple Ubuntu hosts, but not on all of them. |
Oh you're right, it's no longer possible to add certain rules that rely on the table being parsable, I'll adjust the title. I did encounter that but since I didn't make any changes to docker yet after updating to 0.30, I haven't noticed so far. As a workaround in the meantime if you don't want to downgrade, you can try running the netbird client in a docker container via |
This will be fixed in #2727 Meanwhile you can try setting env
The latter is not feasible since an The culprit is |
I've tried the suggested workaround but I still get the same error from iptables.
|
The env won't be picked up by the daemon, try it similar to here https://docs.netbird.io/how-to/troubleshooting-client#on-linux-with-systemd |
Ok, can confirm that it works.
|
Fixed in 0.30.2 I un-set the abovementioned environment variable, and restarted the netbird service. Thanks a lot for the quick response and implementation!! |
Describe the problem
It is no longer possible to list the routing table when netbird is active because it inserts incompatible rules.
I cannot fully switch over to nftables because docker requires iptables and modifying existing chains via nft is discouraged.
There are also side effects where you cannot insert certain rules anymore (which affects services like docker when it is creating new networks as it needs to modify iptables rules). Some iptables insertion and delete commands depend on the table being parsable.
To Reproduce
While netbird is running
Expected behavior
iptables work as expected (before 0.30).
Netbird does not modify any tables managed by iptables-nft via nftables.
Netbird either uses iptables commands to modify iptables-nft-managed tables,
or injects its own forward chain into `table ip netbird`` by setting a lower priority than the default of iprables-nft.won't work as outlined by #2725 (comment)Are you using NetBird Cloud?
selfhosted
NetBird version
0.30.1
Do you face any (non-mobile) client issues?
The aforementioned issue affects linux clients with iptables installed.
The text was updated successfully, but these errors were encountered: