I'm still plugging along on my 1st shorewall install, now trying to get IPv6 setup.
My config is still pretty simplistic, working first on just PING6 My shorewall6-lite config has /interfaces net EXTIF physical=enp5s0,tcpflags,forward=1,accept_ra=1,nosmurfs - INTIF physical=enp4s0,tcpflags,forward=1,accept_ra=1 /zones fw firewall net ipv6 lan ipv6 /policy $FW $FW ACCEPT err $FW all+ ACCEPT err lan net ACCEPT err net all DROP debug all all REJECT debug /rules ?SECTION ALL ?SECTION ESTABLISHED ?SECTION RELATED ?SECTION INVALID ?SECTION UNTRACKED ?SECTION NEW Ping(ACCEPT) all all On the server ip -6 addr show 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 state UNKNOWN qlen 1000 inet6 ::1/128 scope host valid_lft forever preferred_lft forever 2: enp5s0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000 inet6 fe80::e175:83e4:7fc1:b190/64 scope link valid_lft forever preferred_lft forever 3: enp4s0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000 inet6 fe80::e175:83e4:7fc1:b191/64 scope link valid_lft forever preferred_lft forever systemctl status shorewall6-lite -ln0 ● shorewall6-lite.service - Shorewall IPv6 firewall (lite) Loaded: loaded (/usr/lib/systemd/system/shorewall6-lite.service; enabled; vendor preset: disabled) Active: active (exited) since Tue 2021-05-18 11:06:43 EDT; 11s ago Process: 37445 ExecStart=/usr/sbin/shorewall -6l $OPTIONS start $STARTOPTIONS (code=exited, status=0/SUCCESS) Main PID: 37445 (code=exited, status=0/SUCCESS) CPU: 1.977s I can't even ping to itself ping6 fe80::e175:83e4:7fc1:b190 PING fe80::e175:83e4:7fc1:b190(fe80::e175:83e4:7fc1:b190) 56 data bytes (just sits there) ping6 fe80::e175:83e4:7fc1:b191 PING fe80::e175:83e4:7fc1:b191(fe80::e175:83e4:7fc1:b191) 56 data bytes (just sits there) That's with shorewall6-lite show 1 Shorewall6 Lite 5.2.8 filter Table at thad.local - Tue May 18 11:08:33 AM EDT 2021 2 3 Counters reset Tue May 18 11:06:43 AM EDT 2021 4 5 Chain INPUT (policy DROP 0 packets, 0 bytes) 6 pkts bytes target prot opt in out source destination 7 2 128 net-fw all enp5s0 * ::/0 ::/0 8 0 0 ACCEPT all lo * ::/0 ::/0 9 18 1808 AllowICMPs icmpv6 * * ::/0 ::/0 10 0 0 Broadcast all * * ::/0 ::/0 11 0 0 DROP all * * ::/0 ff00::/8 12 0 0 LOG all * * ::/0 ::/0 limit: up to 5/min burst 5 12 mode srcip LOG flags 0 level 7 prefix "INPUT:REJECT " 13 0 0 reject all * * ::/0 ::/0 [goto] 14 15 Chain FORWARD (policy DROP 0 packets, 0 bytes) 16 pkts bytes target prot opt in out source destination 17 0 0 net_frwd all enp5s0 * ::/0 ::/0 18 15 1200 INTIF_fwd all enp4s0 * ::/0 ::/0 19 0 0 AllowICMPs icmpv6 * * ::/0 ::/0 20 15 1200 Broadcast all * * ::/0 ::/0 21 0 0 DROP all * * ::/0 ff00::/8 22 9 720 LOG all * * ::/0 ::/0 limit: up to 5/min burst 5 22 mode srcip LOG flags 0 level 7 prefix "FORWARD:REJECT " 23 15 1200 reject all * * ::/0 ::/0 [goto] 24 25 Chain OUTPUT (policy DROP 0 packets, 0 bytes) 26 pkts bytes target prot opt in out source destination 27 0 0 ACCEPT all * * ::/0 ::/0 ctstate ESTABLISHED 28 24 2561 fw-net all * enp5s0 ::/0 ::/0 29 0 0 fw-fw all * lo ::/0 ::/0 30 18 1800 AllowICMPs icmpv6 * * ::/0 ::/0 31 0 0 Broadcast all * * ::/0 ::/0 32 0 0 DROP all * * ::/0 ff00::/8 33 0 0 LOG all * * ::/0 ::/0 limit: up to 5/min burst 5 33 mode srcip LOG flags 0 level 7 prefix "OUTPUT:REJECT " 34 0 0 reject all * * ::/0 ::/0 [goto] 35 36 Chain +fw-fw (2 references) 37 pkts bytes target prot opt in out source destination 38 0 0 LOG all * * ::/0 ::/0 limit: up to 5/min burst 5 38 mode srcip LOG flags 0 level 3 prefix "+fw:ACCEPT " 39 0 0 ACCEPT all * * ::/0 ::/0 40 41 Chain +net-fw (1 references) 42 pkts bytes target prot opt in out source destination 43 0 0 LOG all * * ::/0 ::/0 limit: up to 5/min burst 5 43 mode srcip LOG flags 0 level 3 prefix "+net:ACCEPT " 44 0 0 ACCEPT all * * ::/0 ::/0 45 46 Chain AllowICMPs (4 references) 47 pkts bytes target prot opt in out source destination 48 0 0 ACCEPT icmpv6 * * ::/0 ::/0 ipv6-icmptype 1 /* Needed 48 ICMP types (RFC4890) */ 49 0 0 ACCEPT icmpv6 * * ::/0 ::/0 ipv6-icmptype 2 /* Needed 49 ICMP types (RFC4890) */ 50 0 0 ACCEPT icmpv6 * * ::/0 ::/0 ipv6-icmptype 3 /* Needed 50 ICMP types (RFC4890) */ 51 0 0 ACCEPT icmpv6 * * ::/0 ::/0 ipv6-icmptype 4 /* Needed 51 ICMP types (RFC4890) */ 52 0 0 ACCEPT icmpv6 * * ::/0 ::/0 ipv6-icmptype 133 /* Neede 52 d ICMP types (RFC4890) */ 53 32 3328 ACCEPT icmpv6 * * ::/0 ::/0 ipv6-icmptype 134 /* Neede 53 d ICMP types (RFC4890) */ 54 2 144 ACCEPT icmpv6 * * ::/0 ::/0 ipv6-icmptype 135 /* Neede 54 d ICMP types (RFC4890) */ 55 4 264 ACCEPT icmpv6 * * ::/0 ::/0 ipv6-icmptype 136 /* Neede 55 d ICMP types (RFC4890) */ 56 0 0 ACCEPT icmpv6 * * ::/0 ::/0 ipv6-icmptype 137 /* Neede 56 d ICMP types (RFC4890) */ 57 0 0 ACCEPT icmpv6 * * ::/0 ::/0 ipv6-icmptype 141 /* Neede 57 d ICMP types (RFC4890) */ 58 0 0 ACCEPT icmpv6 * * ::/0 ::/0 ipv6-icmptype 142 /* Neede 58 d ICMP types (RFC4890) */ 59 0 0 ACCEPT icmpv6 * * fe80::/10 ::/0 ipv6-icmptype 130 /* Neede 59 d ICMP types (RFC4890) */ 60 0 0 ACCEPT icmpv6 * * fe80::/10 ::/0 ipv6-icmptype 131 /* Neede 60 d ICMP types (RFC4890) */ 61 0 0 ACCEPT icmpv6 * * fe80::/10 ::/0 ipv6-icmptype 132 /* Neede 61 d ICMP types (RFC4890) */ 62 0 0 ACCEPT icmpv6 * * fe80::/10 ::/0 ipv6-icmptype 143 /* Neede 62 d ICMP types (RFC4890) */ 63 0 0 ACCEPT icmpv6 * * ::/0 ::/0 ipv6-icmptype 148 /* Neede 63 d ICMP types (RFC4890) */ 64 0 0 ACCEPT icmpv6 * * ::/0 ::/0 ipv6-icmptype 149 /* Neede 64 d ICMP types (RFC4890) */ 65 0 0 ACCEPT icmpv6 * * fe80::/10 ::/0 ipv6-icmptype 151 /* Neede 65 d ICMP types (RFC4890) */ 66 0 0 ACCEPT icmpv6 * * fe80::/10 ::/0 ipv6-icmptype 152 /* Neede 66 d ICMP types (RFC4890) */ 67 0 0 ACCEPT icmpv6 * * fe80::/10 ::/0 ipv6-icmptype 153 /* Neede 67 d ICMP types (RFC4890) */ 68 69 Chain Broadcast (4 references) 70 pkts bytes target prot opt in out source destination 71 72 Chain INTIF_fwd (1 references) 73 pkts bytes target prot opt in out source destination 74 0 0 sfilter all * enp4s0 ::/0 ::/0 [goto] 75 0 0 DROP all * * ::/0 ::/0 ctstate INVALID,NEW,UNTRACK 75 ED match-set SW_DBL6 src 76 0 0 ACCEPT all * * ::/0 ::/0 ctstate ESTABLISHED 77 15 1200 tcpflags tcp * * ::/0 ::/0 78 79 Chain fw-fw (1 references) 80 pkts bytes target prot opt in out source destination 81 0 0 +fw-fw all * * ::/0 ::/0 ctstate RELATED 82 0 0 LOG all * * ::/0 ::/0 limit: up to 5/min burst 5 82 mode srcip LOG flags 0 level 3 prefix "fw:ACCEPT " 83 0 0 ACCEPT all * * ::/0 ::/0 84 85 Chain fw-net (1 references) 86 pkts bytes target prot opt in out source destination 87 0 0 +fw-fw all * * ::/0 ::/0 ctstate RELATED 88 22 2417 ACCEPT udp * * ::/0 ::/0 udp dpt:53 /* DNS */ 89 0 0 ACCEPT tcp * * ::/0 ::/0 tcp dpt:53 /* DNS */ 90 0 0 ACCEPT icmpv6 * * ::/0 ::/0 ipv6-icmptype 128 /* Ping 90 */ 91 2 144 LOG all * * ::/0 ::/0 limit: up to 5/min burst 5 91 mode srcip LOG flags 0 level 3 prefix "fw:ACCEPT " 92 2 144 ACCEPT all * * ::/0 ::/0 93 94 Chain logflags (7 references) 95 pkts bytes target prot opt in out source destination 96 0 0 LOG all * * ::/0 ::/0 limit: up to 5/min burst 5 96 mode srcip LOG flags 4 level 3 prefix "logflags:DROP " 97 0 0 DROP all * * ::/0 ::/0 98 99 Chain net-fw (1 references) 100 pkts bytes target prot opt in out source destination 101 0 0 DROP all * * ::/0 ::/0 ctstate INVALID,NEW,UNTRACK 101 ED match-set SW_DBL6 src 102 0 0 ACCEPT all * * ::/0 ::/0 ctstate ESTABLISHED 103 2 128 smurfs all * * ::/0 ::/0 ctstate INVALID,NEW,UNTRACK 103 ED 104 0 0 tcpflags tcp * * ::/0 ::/0 105 0 0 +net-fw all * * ::/0 ::/0 ctstate RELATED 106 0 0 ACCEPT icmpv6 * * ::/0 ::/0 ipv6-icmptype 128 /* Ping 106 */ 107 2 128 AllowICMPs icmpv6 * * ::/0 ::/0 108 0 0 Broadcast all * * ::/0 ::/0 109 0 0 DROP all * * ::/0 ff00::/8 110 0 0 LOG all * * ::/0 ::/0 limit: up to 5/min burst 5 110 mode srcip LOG flags 0 level 7 prefix "net:DROP " 111 0 0 DROP all * * ::/0 ::/0 112 113 Chain net_frwd (1 references) 114 pkts bytes target prot opt in out source destination 115 0 0 sfilter all * enp5s0 ::/0 ::/0 [goto] 116 0 0 DROP all * * ::/0 ::/0 ctstate INVALID,NEW,UNTRACK 116 ED match-set SW_DBL6 src 117 0 0 ACCEPT all * * ::/0 ::/0 ctstate ESTABLISHED 118 0 0 smurfs all * * ::/0 ::/0 ctstate INVALID,NEW,UNTRACK 118 ED 119 0 0 tcpflags tcp * * ::/0 ::/0 120 121 Chain reject (3 references) 122 pkts bytes target prot opt in out source destination 123 0 0 DROP all * * ff00::/8 ::/0 124 0 0 DROP 2 * * ::/0 ::/0 125 15 1200 REJECT tcp * * ::/0 ::/0 reject-with tcp-reset 126 0 0 REJECT udp * * ::/0 ::/0 reject-with icmp6-port-unre 126 achable 127 0 0 REJECT icmpv6 * * ::/0 ::/0 reject-with icmp6-addr-unr 127 eachable 128 0 0 REJECT all * * ::/0 ::/0 reject-with icmp6-adm-prohi 128 bited 129 130 Chain sfilter (2 references) 131 pkts bytes target prot opt in out source destination 132 0 0 LOG all * * ::/0 ::/0 limit: up to 5/min burst 5 132 mode srcip LOG flags 0 level 3 prefix "sfilter:DROP " 133 0 0 DROP all * * ::/0 ::/0 134 135 Chain sha-lh-df6b6641257157224ef0 (0 references) 136 pkts bytes target prot opt in out source destination 137 138 Chain sha-rh-d6b77076c61861d4f974 (0 references) 139 pkts bytes target prot opt in out source destination 140 141 Chain shorewall (0 references) 142 pkts bytes target prot opt in out source destination 143 0 0 all * * ::/0 ::/0 recent: SET name: %CURRENTT 143 IME side: source mask: ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff 144 145 Chain smurflog (1 references) 146 pkts bytes target prot opt in out source destination 147 0 0 LOG all * * ::/0 ::/0 limit: up to 5/min burst 5 147 mode srcip LOG flags 0 level 3 prefix "smurfs:DROP " 148 0 0 DROP all * * ::/0 ::/0 149 150 Chain smurfs (2 references) 151 pkts bytes target prot opt in out source destination 152 0 0 smurflog all * * ff00::/8 ::/0 [goto] 153 154 Chain tcpflags (3 references) 155 pkts bytes target prot opt in out source destination 156 0 0 logflags tcp * * ::/0 ::/0 [goto] tcp flags:0x3F/0x29 157 0 0 logflags tcp * * ::/0 ::/0 [goto] tcp flags:0x3F/0x00 158 0 0 logflags tcp * * ::/0 ::/0 [goto] tcp flags:0x06/0x06 159 0 0 logflags tcp * * ::/0 ::/0 [goto] tcp flags:0x05/0x05 160 0 0 logflags tcp * * ::/0 ::/0 [goto] tcp flags:0x03/0x03 161 0 0 logflags tcp * * ::/0 ::/0 [goto] tcp flags:0x19/0x09 162 0 0 logflags tcp * * ::/0 ::/0 [goto] tcp spt:0 flags:0x17 162 /0x02 If I clear the firewall, so, ip6tables -L -n Chain INPUT (policy ACCEPT) target prot opt source destination Chain FORWARD (policy ACCEPT) target prot opt source destination Chain OUTPUT (policy ACCEPT) target prot opt source destination Chain +fw-fw (0 references) target prot opt source destination Chain +net-fw (0 references) target prot opt source destination Chain AllowICMPs (0 references) target prot opt source destination Chain Broadcast (0 references) target prot opt source destination Chain INTIF_fwd (0 references) target prot opt source destination Chain fw-fw (0 references) target prot opt source destination Chain fw-net (0 references) target prot opt source destination Chain logflags (0 references) target prot opt source destination Chain net-fw (0 references) target prot opt source destination Chain net_frwd (0 references) target prot opt source destination Chain reject (0 references) target prot opt source destination Chain sfilter (0 references) target prot opt source destination Chain sha-lh-df6b6641257157224ef0 (0 references) target prot opt source destination Chain sha-rh-d6b77076c61861d4f974 (0 references) target prot opt source destination Chain shorewall (0 references) target prot opt source destination Chain smurflog (0 references) target prot opt source destination Chain smurfs (0 references) target prot opt source destination Chain tcpflags (0 references) target prot opt source destination Same thing, NO ping. And even with the 'debug' loglevel I don't see and related DROPs or REJECTs when I ping/fail. So as usual I guess I'm missing something. Any helpful pointers? Thanks! Thad _______________________________________________ Shorewall-users mailing list Shorewall-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/shorewall-users