readme: iptables-nft recompile info

This commit is contained in:
bol-van
2022-02-06 12:28:44 +03:00
parent fc3858209d
commit eda06277cb
2 changed files with 25 additions and 4 deletions

View File

@@ -426,14 +426,25 @@ Looks like kernels <4.16 have no simple way to solve this problem. Unloading of
and its dependency nf_defrag_ipv6 helps but this severely impacts functionality.
Kernels 4.16+ exclude from defragmentation untracked packets.
See `blockcheck.sh` code for example.
Sometimes it's required to load `ip6table_raw` kernel module with parameter raw_before_defrag=1.
In openwrt module parameters are specified after module names separated by space in files located in `/etc/modules.d`.
In traditional linux first check if the problem actually exists using tcpdump or wireshark.
If it does check whether iptables-legacy or iptables-nft are used. If legacy create the file
In traditional linux check whether iptables-legacy or iptables-nft are used. If legacy create the file
`/etc/modprobe.d/ip6table_raw.conf` with the following content :
```
options ip6table_raw raw_before_defrag=1
```
In some linux distros its possible to change current ip6tables using this command: update-alternatives --config ip6tables
If you want to stay with nftables-nft you need to patch and recompile your version.
In nft.c find :
```
name= "PREROUTING",
type = "filter",
prio = -300, /* NF_IP_PRI_RAW */
```
and replace -300 to -450.
It must be done manually, `blockcheck.sh` cannot auto fix this for you.
## tpws