firewalld 0.6.1 release
A new release of firewalld, version 0.6.1, is available.
This is a bug fix only release.
- Correct source/destination in rich rule masquerade
- Only modify ifcfg files for permanent configuration changes
- Fix a backtrace when calling common_reverse_rule()
- man firewalld.conf: Show nftables is the default FirewallBackend
- firewall-config: fix some untranslated strings that caused a UI bug causing rich rules to not be modify-able
- services/steam-streaming: replace unicode quotation with ASCII apostrophe
- fw_direct: avoid log for untracked passthrough queries
- fixed many issues if iptables is actually iptables-nft
- Use preferred location for AppData files
- ipXtables: fix ICMP block inversion with set-log-denied
- fixes ICMP block inversion with set-log-denied with IndividualCalls=yes
- nftables: fix set-log-denied if target is not ACCEPT
- fw_direct: strip _direct chain suffix if using nftables
Improved interactions with NetworkManager:
- For generated NetworkManager connections, don’t forward request to NetworkManager
- For non-permanent interface to zone assignments don’t involve NetworkManager
- Query NetworkManager for permanent interface assignments
testsuite fixes:
- tests/functions: Remove bashism
- installcheck: pass PYTHON to testsuite, fixes python tests on distro with mixed python versions
- testsuite: avoid multiple inclusion warning
- testsuite: Only enable debug output if testsuite ran with debug flag
Source available here:
- Tarball: firewalld-0.6.1.tar.gz
- SHA256: 9fd94f4a5803ec6d1bf4a15f3b90d46fdf0ffa1b5187ff80a470460e3a1a8538
- Complete changelog on github: 0.6.0 to 0.6.1
nftables backend
Introduction
As noted in the v0.6.0 release announcement, firewalld recently gained support for using nftables as a firewall backend. This post will highlight why that’s a good thing, how it affects firewalld, and how to start using it. The content here may be interesting to intermediate to advanced users of firewalld or anyone generally interested in firewalling.
Why nftables?
nftables in a replacement for all of; iptables, ip6tables, arptables, ebtables, and ipset (henceforth know as “iptables and family”). It brings many advantages, some examples are; built in sets, faster rule updates, and combined ipv4/ipv6 processing. One of the most relevant advantages for firewalld is the ability to maintain all firewall rules through a single interface.
One issue with firewalld’s use of iptables and family is that firewalld assumes complete control of the hosts firewalling. With the nftables backend this is no longer true. Since nftables allows multiple namespaces (tables in nftables vernacular), firewalld will scope all of its rules, sets, and chains to the firewalld table. This will avoid much of the contention with other pieces of software that don’t interact directly with firewalld.
Another nicety of nftables is you can combine logging with verdicts in the same rule. This means you can optimize rules, e.g. log and drop a packet in the same rule. In iptables this would require two rules, both with the same match parameters.
How does firewalld use nftables?
firewalld interacts with nftables directly through the nft
binary. This is
similar to how firewalld currently interacts with iptables and family. In a
future release interaction with nftables will be further improved by using the
newly minted libnftables.
As can be seen in the firewalld structure diagram, nftables fits into firewalld alongside the other firewall backends.
All firewalld’s primitives (services, ports, forward ports, etc.) use nftables by default. In addition some translations occur; ipsets will be translated to native nftables sets, and ICMP types are morphed into nftables equivalents.
What about the direct interface?
Seasoned firewalld users may already be asking themselves, What about the direct interface? No worries, it’s still there and works almost exactly as it did in previous releases. When the nftables backend is enabled direct rules are treated specially and still use iptables and family. This means your existing configurations with custom direct rules will continue to work. However, there is one deliberate behavioral change - direct rules take precedence over all other firewalld rules. For further details see the Behavorial Changes section below.
How do I use the nftables backend?
In firewalld 0.6.0 and later nftables is the default backend - so all you have to do is upgrade. The switch over should be transparent to users. The nftables backend has feature parity with the old iptables backend. That means any issues or missing functionality will be treated as bugs.
If for some reason you need to revert to the old iptables backend, you can
easily do so by setting FirewallBackend
in /etc/firewalld/firewalld.conf
to
iptables
, then restart firewalld. However, please realise that future
firewalld development will focus on the nftables backend and not iptables.
This new configuration option is documented in the man pages.
What the future holds
The future of firewalld development will focus on the nftables backend. While the iptables backend is still supported new features won’t necessarily be implemented.
With the nftables backend firewalld has many possible improvements on the horizon:
- output filtering
- DoS protection or rate limiting
- log targets can be combined into the same rule as accept/drop
- avoid creating empty chains or rules
With all that said, the iptables backend is not going away anytime soon. It will be supported for many, many releases. It’s simply just not the primary focus.
Further information
Here follows further information that may be useful for those wanting some grittier details.
Behavioral Changes
The nftables backend does bring some behavioral changes. In most scenarios these won’t affect users, but may be relevant for more advanced use cases.
Direct interface precedence
In previous versions of firewalld rules added via the direct interface were still subject to firewalld’s rules that occur early in the ruleset. Most notably is the early acceptance of packets that are part of existing connections. This has led to confusion for users, for example see github issue 44.
With the nftables backend direct rules are deliberately given a higher precedence than all other firewalld rules. Now when a user adds a direct rule to drop traffic existing connections will also be affected.
Firewalld hook priority
nftables allows multiple chains to hook into netfilter at the same point. This is in contrast to iptables which only allowed one and the concept was completely hidden from users. firewalld takes advantage of this feature to add predictability by giving firewalld’s rules slightly lower precedence than iptables and default nftables hook priority values. Without this it would be undefined if firewalld’s chains would execute before or after other iptables/nftables chains.
The main consequence for users is that firewall rules created outside of firewalld (e.g. libvirt, docker, user, etc) will take precedence over firewalld’s rules.
Only flush firewalld’s rules
Since nftables allows namespaces (via tables) firewalld no longer does a complete flush of firewall rules. It will only flush rules in the firewalld table. This avoids scenarios where custom user rules or rules installed by other tools are unexpectedly wiped out when firewalld was restarted or reloaded.
Packet accept/drop precedence
As mentioned above, nftables allows multiple chains to use the same netfilter hook. A consequence of this is that packets that are accepted are still subject to the rules of other chains hooked into the hook type. For firewalld this means packets may be accepted early by custom iptables or nftables rules, but will still be subject to firewalld’s rules. In the drop case processing always stops immediately and no other hooks will process the packet.
firewalld 0.6.0 release
A new release of firewalld, version 0.6.0, is available.
This is a large feature release. Some new features warrant a separate blog post. As such, the release is only summarized here.
User facing features:
- nftables backend
This is the new default for all firewalld’s abstractions. The direct interface still supports iptables, ip6tables, and ebtables. It is configurable viaFirewallBackend
in/etc/firewalld/firewalld.conf
- valid values are;nftables
,iptables
. - new services
apcupsd, cockpit, distcc, etcd, finger, iSNS, llmnr, matrix, mqtt, nut, plex, rtsp, salt-master, samba-dc, slp, steam, subversion, svdrp, wbem-http, wsman - updated translations
A lot of development time was spent on improving continuous integration and sanity checks to give confidence in new code changes and contributions from others. This is reflected below in the list of developer focused improvements.
Developer focused improvements:
- lots of code refactoring to abstract firewall backend
- flake8 source code checking
- better debug output on exceptions (tracebacks)
- testsuite runs inside network namespaces
- improved testsuite coverage
New dependencies for nftables backend:
- nftables >= 0.9.0
- linux >= 4.18
While most of the nftables backend will function with earlier versions of nftables and Linux it is not recommended. Many bugs were found and fixed in these packages while firewalld’s nftables backend was being developed. Some examples are; iptables and nftables NAT coexistence, nftables AUDIT support, nftables set ranges with timeouts.
Source available here:
- Tarball: firewalld-0.6.0.tar.gz
- SHA256: 7aaa73dc95857079aa276e29d7d628d0faa7d50f29f5a0b6bae458ee7a5829a2
- Complete changelog on github: 0.5.0 to 0.6.0
firewalld 0.5.3 release
A new release of firewalld, version 0.5.3, is available.
This is a bug fix only release.
- fix ICMP block not being present in FORWARD chain
- allow adding entries to ipsets with timeout as indicated by firewall-cmd man page
- add service gre with proto-gre helper to allow conntracked GRE
Source available here:
- Tarball: firewalld-0.5.3.tar.gz
- SHA256: ba105de0b6dc75d208cc675718a140973e2eab2f60aa285068b0438331639ebc
- Complete changelog on github: 0.5.2 to 0.5.3
firewalld 0.5.2 release
A new release of firewalld, version 0.5.2, is available.
This is a bug fix only release.
- fix rule deduplication causing accidental removal of rules
- log failure to parse direct rules xml as an error
- firewall-config: Break infinite loop when firewalld is not running
- fix set-log-denied not taking effect
- po: update translations
Source available here:
- Tarball: firewalld-0.5.2.tar.gz
- SHA256: aa8e47bb11d9b25953ed2e278a989b0eb052b4466ea030ade0ed0cf1955614a4
- Complete changelog on github: 0.5.1 to 0.5.2