When running, the program sets some rules. Some of these rules prevent my virtual machines (QEMU/KVM with virt-manager, using NAT) from having any Internet traffic.
Said rules (with iptables):
Code: Select all
# iptables-legacy -L -n -v
Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
[...] some "ACCEPT" rules
0 0 DROP 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
[...] some "ACCEPT" rules
0 0 DROP 0 -- * * 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
[...] some "ACCEPT" rules
0 0 DROP 0 -- * * 0.0.0.0/0 0.0.0.0/0Code: Select all
# nft -a list ruleset
table ip filter { # handle 99
chain INPUT { # handle 1
type filter hook input priority filter; policy drop;
[...] - some "accept" rules
counter packets 0 bytes 0 drop # handle 11
}
chain FORWARD { # handle 2
type filter hook forward priority filter; policy drop;
[...] - some "accept" rules
counter packets 0 bytes 0 drop # handle 13
}
chain OUTPUT { # handle 3
type filter hook output priority filter; policy drop;
[...] - some "accept" rules
counter packets 0 bytes 0 drop # handle 38
}
}Quoting nftables Wiki:
It seems that "policy drop" already implies that anything not listed as "accept" is blocked, so I guess I cannot delete "drop" rules just like with iptables since they're not listed.nftables Wiki wrote:policy is the default verdict statement to control the flow in the base chain. Possible values are: accept (default) and drop. Warning: Setting the policy to drop discards all packets that have not been accepted by the ruleset.
Any suggestion on how to proceed? Should I add "accept" rules for each chain instead?
Thanks.

