• 1 Post
  • 265 Comments
Joined 3 years ago
cake
Cake day: June 30th, 2023

help-circle



  • Status: Closed

    That means it wasn’t accepted, see also the last comment before closing:

    It’s an optional field in the userdb JSON object. It’s not a policy engine, not an API for apps. We just define the field, so that it’s standardized iff people want to store the date there, but it’s entirely optional.

    Hence, please move your discussion elsewhere, you are misunderstanding what systemd does here. It enforces zero policy, it leaves that up for other parts of the system.

    And sorry, I am really not interested in these discussions here. it’s not the right place for this, and please don’t bring it here. Thank you.





  • Update your nftables rulefile or use nft commands to update your firewall to the following:

    # extract
    chain OUT {
        type filter hook output priority 0; policy drop;
        udp dport 123 accept
    
        limit rate 3/second log prefix "Nftables Blocked: OUT: "
    }
    
    chain IN {
        type filter hook input priority 0; policy drop;
        ct state established, related accept
    
        limit rate 3/second log prefix "Nftables Blocked: IN: "
    }
    

    Blocked pakets will show up in the kernel log (dmesg/journalcl)

    If you want more information on why it is blocked then enable nftrace for those packets

    nft add rule inet/ip/ip6 tablename OUT udp dport 123 meta nftrace set 1
    nft add rule inet/ip/ip6 tablename IN udp dport 123 meta nftrace set 1
    nft monitor trace
    

    Or

    nft add rule inet/ip/ip6 tablename OUT meta nftrace set 1
    

    Or maybe even

    nft add rule inet/ip/ip6 tablename PREROUTING udp dport 123 meta nftrace set 1
    
    

    Additionally you can use tcpdump -i <interface> to show network packets before they enter the firewall, there you should be able to tell what it’s a trying to do.