-
Notifications
You must be signed in to change notification settings - Fork 3.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
miniupnpd: bump version, drop igdv1 variant, add nftables support #17094
Conversation
f52ed65
to
182cf31
Compare
|
Thanks. I've incorrectly moved back the dependencies due to miniupnpd hardcoding iptables when detecting OpenWrt. Didn't properly check the dependencies anymore after fixing that. |
f04e069
to
3d90266
Compare
Tested the nftables variant and while it does seem to work and also create appropriate forwarding rules in it's tables, there is still something missing because the rules there don't have any effect.
I assume we still need a hook in fw4 to jump to the miniupnpd table. This can provide some hints maybe... |
The added rules work fine for me. |
With |
Yes. My main router is fully migrated to fw4. My Xbox (the reason for using miniupnpd) has "open NAT". How I understand it: nft works quite a bit differently than iptables; the "type X hook Y priority -25" already hooks the table/chain in the right place, with priority -25 causing these rules to be tried before all the fw4 rules. |
What does seem to be a problem is that these miniupnpd rules get duplicated every time a device requests a upnp mapping:
|
Is this work in progress? If so please mark it as a draft. |
I do not consider this a work in progress. Yes, the nftables variant might have some bugs, but the iptables variant should not change behaviour. I am using the nftables variant on my main router for more than a month and it is usable. I created an upstream issue, these fixes can be added later imo. |
Fixed a missing PROVIDES for the iptables variant and did basic runtime test on my backup router, which is still running firewall3. If no objections, I will merge this soon. |
Since version 2.2.3, miniupnpd will detect MS clients and force IGDv1. This reverts commit 7f5534a. Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
The next OpenWrt stable release aims to use firewall4 by default. As this uses nftables as backend, miniupnpd will no longer work. Create an iptables and nftables variant of the miniupnpd package so that miniupnpd can be used with either firewall variant. See openwrt#16818 for more info. Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
Dropped the bump as apparently that was merged from a later PR. |
Thoughts on backporting the version bump to 21.02 for the igd fix? |
is what this problem is solved ? i'm use a belkin rt3200 with upnp and firewall 4, ok i has found a little solution i has install miniupnpd iptables thanks for all |
Now that firewall4 with nftables is the default in master, should we declare the nftables variant as the DEFAULT_VARIANT for miniupnpd? Otherwise opkg may find the iptables variant first and install it. |
Sounds good to me. |
same for me, rules are there but have no effect... |
The Nftables dependencies are still screwed to some extent. |
Maintainer: NA
Compile/run tested: OpenWrt master r18045-71af55ae2a on qoriq
Please do not merge this before someone tested the iptables variant. I have currently only tested the nftables variant.