The plugins in this repository implement CNI Specification v0.4.0.
At the moment, the CNI Plugins
maintained by the CNI team do not support nftables. The below plugins do.
This repository contains the following plugins:
cni-nftables-portmap: port mapping withnftablescni-nftables-firewall: firewalling withnftables
The plugins had been tested on the following systems:
- CentOS 8:
- kernel version:
4.18.0-193.14.2.el8_2.x86_64 - nftables version
v0.9.3 (Topsy)
- kernel version:
First, download the plugins:
go install github.com/greenpau/cni-plugins/cmd/cni-nftables-portmap@latest
go install github.com/greenpau/cni-plugins/cmd/cni-nftables-firewall@latestCheck the location of the downloaded plugins:
$ which cni-nftables-portmap
~/dev/go/bin/cni-nftables-portmap
Next, copy the plugins to /usr/local/lib/cni/ directory.
mv ~/dev/go/bin/cni-nftables-{portmap,firewall} /usr/local/lib/cni/After the above, copy assets/net.d/87-podman-bridge.conflist to
/etc/cni/net.d/.
sudo cp assets/net.d/87-podman-bridge.conflist /etc/cni/net.d/The configuration is as follows:
{
"cniVersion": "0.4.0",
"name": "podman",
"plugins": [
{
"type": "bridge",
"bridge": "cni-podman0",
"isGateway": true,
"ipMasq": false,
"ipam": {
"type": "host-local",
"routes": [
{
"dst": "0.0.0.0/0"
}
],
"ranges": [
[
{
"subnet": "10.88.0.0/16",
"gateway": "10.88.0.1"
}
]
]
}
},
{
"type": "cni-nftables-portmap",
"capabilities": {
"portMappings": true
}
},
{
"type": "cni-nftables-firewall",
"forward_chain_name": "forward"
}
]
}Please note the ipMasq key is being set to false.
Review network config:
$ sudo podman network ls
NAME VERSION PLUGINS
podman 0.4.0 bridge,cni-nftables-portmap,cni-nftables-firewallNext, run the following command to place a container in the previously
created podman network and query AWS Check IP website:
podman run --net=podman -it nicolaka/netshoot curl http://checkip.amazonaws.com/Run the following commands to test port-mapping plugin by placing
a container in podman network and exposing a web server in
the container.
First, start the container:
podman run --net=podman -P -d nginxdemos/helloAlternatively, map the container port to port 8080:
podman run --net=podman -p 8080:80/tcp -d nginxdemos/helloVerify connectivity to the container:
curl -v http://HOST_IP:8080For localhost port mapping to work it is necessary to set route_localnet sysctl
sysctl -w net.ipv4.conf.all.route_localnet=1Also, don't limit your sending and receiving of 127.0.0.1 to the lo
interface.
nft add rule filter input iifname != 'lo' ip saddr 127.0.0.0/8 counter drop
nft add rule filter input iifname != 'lo' ip daddr 127.0.0.0/8 counter drop
This will block communication between the localhost and the container network. Instead, match the physical interfaces explicitly, like this.
nft add rule filter input iifname eth0 ip saddr 127.0.0.0/8 counter drop
nft add rule filter input iifname eth0 ip daddr 127.0.0.0/8 counter drop
nft add rule filter input iifname eth1 ip saddr 127.0.0.0/8 counter drop
nft add rule filter input iifname eth1 ip daddr 127.0.0.0/8 counter drop
This allows the container network to communicate with localhost.
TBD.
There could be an issue with checksums when using portmap plugin.
Specifically, packets would arrive to a container, but they would be
disregarded and no SYN/ACK would be sent.
When running tcpdump inside a container, there is checksum error
cksum 0xd776 (incorrect -> 0xd8b9).
$ tcpdump -i eth0 -vvv -nne
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
01:05:16.704789 ee:58:3f:4d:1f:23 > ea:56:b4:c6:4f:c7, ethertype IPv4 (0x0800), length 58: (tos 0x0, ttl 63, id 8844, offset 0, flags [none], proto TCP (6), length 44)
10.0.2.2.54017 > 10.88.0.116.80: Flags [S], cksum 0xd776 (incorrect -> 0xd8b9), seq 2337032705, win 65535, options [mss 1460], length 0
See similar issue here.
The solution is upgrading to nftables v0.9.3 (Topsy).