NetBSD-Bugs archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: kern/59615: NPF seems to block all traffic with an HEAD (11.99.x) kernel and netbsd-10 userland



The following reply was made to PR kern/59615; it has been noted by GNATS.

From: Leonardo Taccari <leot%NetBSD.org@localhost>
To: gnats-bugs%netbsd.org@localhost
Cc: 
Subject: Re: kern/59615: NPF seems to block all traffic with an HEAD (11.99.x) kernel and netbsd-10 userland
Date: Sun, 31 Aug 2025 15:01:53 +0200

 I have shared that also with joe@ who recently has done changes in NPF
 and he requested npfctl stats output.
 
 Attached here the `npfctl stats` transcript just after the boot and
 login as root, 4 pings that fails and then the transcript of `npfctl
 stats` again:
 
  # npfctl stats
  Packets passed:
          8 default pass
          0 ruleset pass
          0 state pass
  Packets blocked:
          0 default block
          9 ruleset block
  State and NAT entries:
          0 state allocations
          0 state destructions
          0 NAT entry allocations
          0 NAT entry destructions
  Network buffers:
          0 non-contiguous cases
          0 contig alloc failures
  Invalid packet state cases:
          0 cases in total
          0 TCP case I
          0 TCP case II
          0 TCP case III
  Packet race cases:
          0 NAT association race
          0 duplicate state race
  Fragmentation:
          0 fragments
          0 reassembled
          0 failed reassembly
  Other:
          0 unexpected errors
  # ping -c 4 10.0.2.3
  PING 10.0.2.3 (10.0.2.3): 56 data bytes
  ping: sendto: Network is unreachable
  ping: sendto: Network is unreachable
  ping: sendto: Network is unreachable
  ping: sendto: Network is unreachable
  ^C
  ----10.0.2.3 PING Statistics----
  4 packets transmitted, 0 packets received, 100.0% packet loss
  # npfctl stats
  Packets passed:
          8 default pass
          0 ruleset pass
          0 state pass
  Packets blocked:
          0 default block
          17 ruleset block
  State and NAT entries:
          0 state allocations
          0 state destructions
          0 NAT entry allocations
          0 NAT entry destructions
  Network buffers:
          0 non-contiguous cases
          0 contig alloc failures
  Invalid packet state cases:
          0 cases in total
          0 TCP case I
          0 TCP case II
          0 TCP case III
  Packet race cases:
          0 NAT association race
          0 duplicate state race
  Fragmentation:
          0 fragments
          0 reassembled
          0 failed reassembly
  Other:
          0 unexpected errors
 
 It seems that the "ruleset block" counter increases despite the NPF
 rules should permit egress ICMP traffic.
 


Home | Main Index | Thread Index | Old Index