<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://wiki.nftables.org/wiki-nftables/index.php?action=history&amp;feed=atom&amp;title=Secmark</id>
	<title>Secmark - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://wiki.nftables.org/wiki-nftables/index.php?action=history&amp;feed=atom&amp;title=Secmark"/>
	<link rel="alternate" type="text/html" href="http://wiki.nftables.org/wiki-nftables/index.php?title=Secmark&amp;action=history"/>
	<updated>2026-04-11T09:11:21Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.43.6</generator>
	<entry>
		<id>http://wiki.nftables.org/wiki-nftables/index.php?title=Secmark&amp;diff=873&amp;oldid=prev</id>
		<title>Fmyhr: Initial page, using examples from nftables 0.9.1 release notes.</title>
		<link rel="alternate" type="text/html" href="http://wiki.nftables.org/wiki-nftables/index.php?title=Secmark&amp;diff=873&amp;oldid=prev"/>
		<updated>2021-04-09T15:04:19Z</updated>

		<summary type="html">&lt;p&gt;Initial page, using examples from nftables 0.9.1 release notes.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;#039;&amp;#039;secmark&amp;#039;&amp;#039; objects add netfilter [https://selinuxproject.org/page/NB_Networking#SECMARK SECMARK] labels to a ruleset, for use with [https://github.com/SELinuxProject SELinux] or other [https://en.wikipedia.org/wiki/Linux_Security_Modules Linux Security Modules]. At least [https://kernelnewbies.org/Linux_4.20 Linux kernel 4.20] and [https://marc.info/?l=netfilter&amp;amp;m=157532146917292&amp;amp;w=2 nftables 0.9.3] are required for &amp;#039;&amp;#039;secmark&amp;#039;&amp;#039; object support.&lt;br /&gt;
&lt;br /&gt;
= Using &amp;#039;&amp;#039;secmark&amp;#039;&amp;#039; in rules =&lt;br /&gt;
&lt;br /&gt;
The following ruleset defines an &amp;#039;&amp;#039;sshtag&amp;#039;&amp;#039; &amp;#039;&amp;#039;secmark&amp;#039;&amp;#039; object and uses it to set SECMARK on packets to port tcp/22 (ssh):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source&amp;gt;&lt;br /&gt;
table inet secmark_rule_demo {&lt;br /&gt;
&lt;br /&gt;
    secmark sshtag { &amp;quot;system_u:object_r:ssh_server_packet_t:s0&amp;quot; }&lt;br /&gt;
&lt;br /&gt;
    chain IN {&lt;br /&gt;
        type filter hook input priority filter;&lt;br /&gt;
&lt;br /&gt;
        tcp dport 22 meta secmark set &amp;quot;sshtag&amp;quot;&lt;br /&gt;
    }&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Using &amp;#039;&amp;#039;secmark&amp;#039;&amp;#039; in maps =&lt;br /&gt;
&lt;br /&gt;
You can also use &amp;#039;&amp;#039;secmark&amp;#039;&amp;#039; in maps:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source&amp;gt;&lt;br /&gt;
table inet secmark_map_demo {&lt;br /&gt;
&lt;br /&gt;
    secmark sshtag { &amp;quot;system_u:object_r:ssh_server_packet_t:s0&amp;quot; }&lt;br /&gt;
&lt;br /&gt;
    map secmapping {&lt;br /&gt;
        type inet_service : secmark&lt;br /&gt;
        elements = {&lt;br /&gt;
            22 : &amp;quot;sshtag&amp;quot;,&lt;br /&gt;
        }&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    chain IN {&lt;br /&gt;
        type filter hook input priority filter;&lt;br /&gt;
&lt;br /&gt;
        meta secmark set tcp dport map @secmapping&lt;br /&gt;
    }&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= See Also =&lt;br /&gt;
* [http://git.netfilter.org/nftables/tree/files/examples/secmark.nft secmark.nft] example distributed with nftables source&lt;/div&gt;</summary>
		<author><name>Fmyhr</name></author>
	</entry>
</feed>