!tCyGickeVqkHsYjWnh:nixos.org

NixOS Networking

882 Members
Declaratively manage your switching, routing, wireless, tunneling and more. | Don't rely on `networking.*` for interface and routing setup, use systemd-networkd, ifstate or NetworkManager instead. | Set `SYSTEMD_LOG_LEVEL=debug` to debug networking issues with networkd | No bad nft puns, please. | Room recommendations: #sysops:nixos.org254 Servers

Load older messages


SenderMessageTime
7 Feb 2026
@k900:0upti.meK900 However, right now our firewall basically does ct status dnat accept 22:05:44
@k900:0upti.meK900Which works for v4 because there is NAT22:05:49
@k900:0upti.meK900 But not for v6, because pinholing is not NAT 22:05:55
@k900:0upti.meK900And the miniupnpd chain is never actually hit22:06:04
@k900:0upti.meK900So uhhh22:06:13
@k900:0upti.meK900Thoughts22:06:14
@raitobezarius:matrix.orgraitobezariusnot deeply familiar with pinholing but doesn't it have any conntrack correspondance?22:15:06
@k900:0upti.meK900Nope22:16:34
@k900:0upti.meK900It's basically just adding a rule for "ip daddr ... tcp dport ... accept"22:17:06
@k900:0upti.meK900You do it on the global IPv622:17:35
@k900:0upti.meK900So the default is to not forward anything into the LAN but a client can ask nicely22:17:47
@raitobezarius:matrix.orgraitobezariusso if this thing dynamically add a ip daddr X tcp dport Y accept, aren't you just missing ip6_forwarding=1 ?22:19:29
@k900:0upti.meK900The problem is that it's adding it to its own chain22:19:51
@k900:0upti.meK900That is not hooked up to anything22:19:55
@k900:0upti.meK900And right now our normal firewall doesn't know it exists22:20:10
@raitobezarius:matrix.orgraitobezariusso why not jump to that chain inside your main filter table?22:20:15
@k900:0upti.meK900That's what I'm currently doing, but the nixos module sets it up as another table entirely22:20:34
@k900:0upti.meK900So you can't even jump to it from the normal filter rules22:20:50
@raitobezarius:matrix.orgraitobezariusi don't think it makes a lot of sense22:21:47
@raitobezarius:matrix.orgraitobezariusit should be a chain of the filter table22:21:53
@raitobezarius:matrix.orgraitobezariusminiupd is not its entire networking stack with its entire lifecycle22:22:01
@raitobezarius:matrix.orgraitobezariusotherwise, idk, you need to have another script that listens and modify the whole nftables config live22:23:03
@raitobezarius:matrix.orgraitobezariuswhile understanding what the fuck is going on22:23:07
@k900:0upti.meK900Yeah22:30:26
@k900:0upti.meK900Starting to have a design formulating in my head23:03:55
@k900:0upti.meK900I think23:03:56
@k900:0upti.meK900Step 1, RFC42 the thing23:04:03
@k900:0upti.meK900 Step 2, services.miniupnpd.firewallIntegration or whatever, which requires filterForward and just makes it write to the nixos-fw table 23:04:39
@k900:0upti.meK900Step 3, probably turn that on by default?23:04:56
@zimward:zimward.moezimward joined the room.23:18:56

There are no newer messages yet.


Back to Room ListRoom Version: 6