nf_conntrack: automatic helper assignment is deprecated

Bug #1556419 reported by dino99
36
This bug affects 7 people
Affects Status Importance Assigned to Milestone
iptables (Ubuntu)
Confirmed
Medium
Unassigned
linux (Ubuntu)
Fix Released
Medium
Unassigned
ufw (Ubuntu)
Fix Released
Medium
Jamie Strandboge

Bug Description

Get this logged into journalctl (since a moment):

 kernel: nf_conntrack: automatic helper assignment is deprecated and it will be removed soon. Use the iptables CT target to attach helpers instead.

ProblemType: Bug
DistroRelease: Ubuntu 16.04
Package: linux-image-4.4.0-13-generic 4.4.0-13.29
ProcVersionSignature: Ubuntu 4.4.0-13.29-generic 4.4.5
Uname: Linux 4.4.0-13-generic x86_64
NonfreeKernelModules: nvidia_uvm nvidia_modeset nvidia
ApportVersion: 2.20-0ubuntu3
Architecture: amd64
AudioDevicesInUse:
 USER PID ACCESS COMMAND
 /dev/snd/controlC1: oem 1942 F.... pulseaudio
 /dev/snd/pcmC0D0p: oem 1942 F...m pulseaudio
 /dev/snd/controlC0: oem 1942 F.... pulseaudio
CurrentDesktop: GNOME
Date: Sat Mar 12 14:52:09 2016
HibernationDevice: RESUME=UUID=0a9ca7f0-6eeb-4b21-b70f-670fa600de16
IwConfig:
 eth0 no wireless extensions.

 eth1 no wireless extensions.

 lo no wireless extensions.
Lsusb:
 Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
 Bus 003 Device 002: ID 046d:c062 Logitech, Inc. M-UAS144 [LS1 Laser Mouse]
 Bus 003 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
 Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
MachineType: ASUSTEK COMPUTER INC P5W DH Deluxe
ProcFB:

ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.4.0-13-generic root=UUID=7c755ed6-51cc-4b75-88ac-9c75acf82749 ro
RelatedPackageVersions:
 linux-restricted-modules-4.4.0-13-generic N/A
 linux-backports-modules-4.4.0-13-generic N/A
 linux-firmware 1.156
RfKill:

SourcePackage: linux
UpgradeStatus: No upgrade log present (probably fresh install)
dmi.bios.date: 07/22/2010
dmi.bios.vendor: American Megatrends Inc.
dmi.bios.version: 3002
dmi.board.asset.tag: To Be Filled By O.E.M.
dmi.board.name: P5W DH Deluxe
dmi.board.vendor: ASUSTeK Computer INC.
dmi.board.version: Rev 1.xx
dmi.chassis.asset.tag: Asset-1234567890
dmi.chassis.type: 3
dmi.chassis.vendor: Chassis Manufacture
dmi.chassis.version: Chassis Version
dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvr3002:bd07/22/2010:svnASUSTEKCOMPUTERINC:pnP5WDHDeluxe:pvrSystemVersion:rvnASUSTeKComputerINC.:rnP5WDHDeluxe:rvrRev1.xx:cvnChassisManufacture:ct3:cvrChassisVersion:
dmi.product.name: P5W DH Deluxe
dmi.product.version: System Version
dmi.sys.vendor: ASUSTEK COMPUTER INC

Revision history for this message
dino99 (9d9) wrote :
Revision history for this message
Brad Figg (brad-figg) wrote : Status changed to Confirmed

This change was made by a bot.

Changed in linux (Ubuntu):
status: New → Confirmed
Revision history for this message
dino99 (9d9) wrote :

https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=a9006892643a8f4e885b692de0708bcb35a7d530
netfilter: nf_ct_helper: allow to disable automatic helper assignment

This patch allows you to disable automatic conntrack helper lookup based on TCP/UDP ports, eg. echo 0 > /proc/sys/net/netfilter/nf_conntrack_helper [ Note: flows that already got a helper will keep using it even if automatic helper assignment has been disabled ] Once this behaviour has been disabled, you have to explicitly use the iptables CT target to attach helper to flows. There are good reasons to stop supporting automatic helper assignment, for further information, please read: ​http://www.netfilter.org/news.html#2012-04-03 This patch also adds one message to inform that automatic helper assignment is deprecated and it will be removed soon (this is spotted only once, with the first flow that gets a helper attached to make it as less annoying as possible).

https://home.regit.org/netfilter-en/secure-use-of-helpers/

Revision history for this message
dino99 (9d9) wrote :

Kernel build settings & iptables entries:

http://www.odi.ch/weblog/posting.php?posting=663

Revision history for this message
Joseph Salisbury (jsalisbury) wrote :

Did this issue start happening after an update/upgrade? Was there a prior kernel version where you were not having this particular problem?

Would it be possible for you to test the latest upstream kernel? Refer to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest v4.5 kernel[0].

If this bug is fixed in the mainline kernel, please add the following tag 'kernel-fixed-upstream'.

If the mainline kernel does not fix this bug, please add the tag: 'kernel-bug-exists-upstream'.

Once testing of the upstream kernel is complete, please mark this bug as "Confirmed".

Thanks in advance.

[0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.5-wily/

Changed in linux (Ubuntu):
importance: Undecided → Medium
status: Confirmed → Incomplete
Revision history for this message
Jamie Strandboge (jdstrand) wrote :

FYI, this is not a new issue.

Revision history for this message
dino99 (9d9) wrote :

Tested the final 4.5 kernel; and the error is not shown:

*******
kernel: ip_tables: (C) 2000-2006 Netfilter Core Team
kernel: nf_conntrack version 0.5.0 (16384 buckets, 65536 max)
ureadahead[281]: ureadahead: Error while tracing: No such file or directory
**********
(note: the "ureadahead" error seeems related to the recent "ltrace" changes, as the package has not been rebuilt. But ubuntu-minimal should not pull that oldish package as systemd is now used)

(note2: the post #4 above explain how to compile the kernel to avoid the reported error; looks like the ubuntu kernel does not use these settings for compilation)

tags: added: kernel-fixed-upstream
Changed in linux (Ubuntu):
status: Incomplete → Confirmed
Revision history for this message
dino99 (9d9) wrote :

Feedback:

i've checked the log again with a 4.5 kernel boot, and the error still exist; so #7 is not fully exact: maybe some race or some other reason.

tags: removed: kernel-fixed-upstream
Revision history for this message
Launchpad Janitor (janitor) wrote :

Status changed to 'Confirmed' because the bug affects multiple users.

Changed in iptables (Ubuntu):
status: New → Confirmed
tags: added: yakkety
Changed in iptables (Ubuntu):
importance: Undecided → High
importance: High → Medium
Revision history for this message
daniel CURTIS (anoda) wrote :

Hi. The same problem here. Release 16.04.2 LTS, iptables 1.6.0-2ubuntu3 etc. I noticed this one in dmesg entry:

$ sudo dmesg |grep iptables
[ 1168.282586] nf_conntrack: automatic helper assignment is deprecated and it will be removed soon. Use the iptables CT target to attach helpers instead.

I have one more problem with this release; when iptables is in use (with very simple rules) there is not internet connection. But using ufw firewall, everything seems to work OK.

Thanks.

Revision history for this message
spike speigel (frail-knight) wrote :

Hello, I just started seeing this on Ubuntu 17.10.

tags: added: artful
Revision history for this message
spike speigel (frail-knight) wrote :

nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead.

Revision history for this message
elatllat (elatllat) wrote :

Shows up in dmesg on Ubuntu 18.04 with UFW.

Changed in ufw (Ubuntu):
status: New → Triaged
importance: Undecided → Medium
assignee: nobody → Jamie Strandboge (jdstrand)
Revision history for this message
Jamie Strandboge (jdstrand) wrote :

The linux task can be marked as Fix Released since net/netfilter/nf_conntrack_helper has defaulted to 0 since 4.7.

Changed in ufw (Ubuntu):
status: Triaged → In Progress
Changed in linux (Ubuntu):
status: Confirmed → Fix Released
Revision history for this message
Jamie Strandboge (jdstrand) wrote :

Users seeing this issue should modify IPT_MODULES in /etc/defaults/ufw to be empty. Ubuntu 20.04 will do this be default and future releases of ufw will introduce rule syntax for working with helper rules.

Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package ufw - 0.36-6

---------------
ufw (0.36-6) unstable; urgency=medium

  * 0009-empty-non-functioning-ipt-modules.patch: empty out IPT_MODULES and
    update documentation regarding modern use of connection tracking modules.
    ufw historically used IPT_MODULES in /etc/defaults/ufw to
    load various connection tracking modules, but use of this mechanism has
    been deprecated for some time. These days, the kernel defaults to
    deactivating flows for various connection tracking modules so users have
    to perform an extra sysctl step to use this old mechanism anyway, so empty
    IPT_MODULES and better document use of connection tracking modules. A
    future upload will introduce rule syntax for working with connection
    tracking helper rules. (LP: #1556419)
  * 0010-add-other-firewall-checks.patch: adjust the check-requirements
    diagnostic tool to warn about other installed firewall software
  * 0011-suppress-legacy-warnings-in-tests.patch: suppress iptables warnings
    about legacy rules being present in root functional tests

 -- Jamie Strandboge <email address hidden> Thu, 02 Apr 2020 12:05:30 +0000

Changed in ufw (Ubuntu):
status: In Progress → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.