{"id":54,"date":"2024-08-20T11:09:28","date_gmt":"2024-08-20T03:09:28","guid":{"rendered":"https:\/\/cnsn.rr.nu\/?p=54"},"modified":"2024-08-20T11:09:28","modified_gmt":"2024-08-20T03:09:28","slug":"nftables%e8%a7%84%e5%88%99%e8%af%a6%e7%bb%86%e5%8f%82%e6%95%b0%e4%bb%8b%e7%bb%8d","status":"publish","type":"post","link":"https:\/\/blog.cnsn.fun\/?p=54","title":{"rendered":"nftables\u89c4\u5219\u8be6\u7ec6\u53c2\u6570\u4ecb\u7ecd"},"content":{"rendered":"<h3>nftables \u8be6\u7ec6\u53c2\u6570\u548c\u914d\u7f6e<\/h3>\n<p><code>nftables<\/code> \u662f Linux \u5185\u6838\u7684\u5305\u8fc7\u6ee4\u6846\u67b6\uff0c\u63d0\u4f9b\u4e86\u66f4\u7075\u6d3b\u548c\u9ad8\u6548\u7684\u673a\u5236\u6765\u7f16\u5199\u548c\u7ba1\u7406\u9632\u706b\u5899\u89c4\u5219\u3002\u4e0b\u9762\u5c06\u8be6\u7ec6\u4ecb\u7ecd <code>nftables<\/code> \u7684\u914d\u7f6e\u53c2\u6570\u548c\u793a\u4f8b\u3002<\/p>\n<h3>\u57fa\u672c\u8bed\u6cd5\u548c\u7ed3\u6784<\/h3>\n<p>\u4f7f\u7528 <code>nft<\/code> \u547d\u4ee4\u6765\u7ba1\u7406\u89c4\u5219\u3002\u57fa\u672c\u8bed\u6cd5\u5982\u4e0b\uff1a<\/p>\n<pre><code class=\"language-bash\">nft add rule &lt;table&gt; &lt;chain&gt; &lt;rule-specification&gt;<\/code><\/pre>\n<h3>\u8868\uff08Table\uff09<\/h3>\n<p>\u8868\u662f\u89c4\u5219\u7684\u5bb9\u5668\uff0c\u53ef\u4ee5\u5305\u542b\u591a\u4e2a\u94fe\u3002\u8868\u53ef\u4ee5\u5b9a\u4e49\u5728\u4ee5\u4e0b\u547d\u540d\u7a7a\u95f4\u4e4b\u4e00\uff1a<\/p>\n<ul>\n<li><code>ip<\/code>\uff1aIPv4 \u5305<\/li>\n<li><code>ip6<\/code>\uff1aIPv6 \u5305<\/li>\n<li><code>arp<\/code>\uff1aARP \u5305<\/li>\n<li><code>inet<\/code>\uff1aIPv4 \u548c IPv6 \u5305<\/li>\n<li><code>bridge<\/code>\uff1a\u6865\u63a5\u5305<\/li>\n<li><code>netdev<\/code>\uff1a\u7f51\u7edc\u8bbe\u5907\u5305<\/li>\n<\/ul>\n<p>\u793a\u4f8b\uff1a<\/p>\n<pre><code class=\"language-bash\">nft add table inet filter<\/code><\/pre>\n<h3>\u94fe\uff08Chain\uff09<\/h3>\n<p>\u94fe\u662f\u89c4\u5219\u7684\u5bb9\u5668\uff0c\u6bcf\u4e2a\u94fe\u53ef\u4ee5\u6307\u5b9a\u4e00\u4e2a\u6302\u94a9\u7c7b\u578b\uff08hook\uff09\uff0c\u5982\u8f93\u5165\uff08input\uff09\u3001\u8f6c\u53d1\uff08forward\uff09\u3001\u8f93\u51fa\uff08output\uff09\u7b49\u3002\u94fe\u8fd8\u53ef\u4ee5\u6307\u5b9a\u4e00\u4e2a\u4f18\u5148\u7ea7\u3002<\/p>\n<p>\u793a\u4f8b\uff1a<\/p>\n<pre><code class=\"language-bash\">nft add chain inet filter input { type filter hook input priority 0 \\; }<\/code><\/pre>\n<h3>\u89c4\u5219\uff08Rule\uff09<\/h3>\n<p>\u89c4\u5219\u662f\u5177\u4f53\u7684\u5305\u8fc7\u6ee4\u6761\u4ef6\u548c\u52a8\u4f5c\u3002\u89c4\u5219\u53ef\u4ee5\u5305\u542b\u5339\u914d\u6761\u4ef6\uff08\u5982\u6e90\u5730\u5740\u3001\u76ee\u7684\u5730\u5740\u3001\u534f\u8bae\u7b49\uff09\u548c\u52a8\u4f5c\uff08\u5982\u63a5\u53d7\u3001\u62d2\u7edd\u3001\u8bb0\u5f55\u65e5\u5fd7\u7b49\uff09\u3002<\/p>\n<p>\u793a\u4f8b\uff1a<\/p>\n<pre><code class=\"language-bash\">nft add rule inet filter input ip saddr 192.168.1.0\/24 counter accept<\/code><\/pre>\n<h3>\u8be6\u7ec6\u53c2\u6570\u4ecb\u7ecd<\/h3>\n<h4>\u94fe\u53c2\u6570<\/h4>\n<ul>\n<li><code>type &lt;type&gt;<\/code>\uff1a\u6307\u5b9a\u94fe\u7684\u7c7b\u578b\uff0c\u53ef\u4ee5\u662f <code>filter<\/code>\u3001<code>nat<\/code>\u3001<code>route<\/code> \u7b49\u3002<\/li>\n<li><code>hook &lt;hook&gt;<\/code>\uff1a\u6307\u5b9a\u94fe\u7684\u6302\u94a9\u7c7b\u578b\uff0c\u53ef\u4ee5\u662f <code>prerouting<\/code>\u3001<code>input<\/code>\u3001<code>forward<\/code>\u3001<code>output<\/code>\u3001<code>postrouting<\/code>\u3002<\/li>\n<li><code>priority &lt;value&gt;<\/code>\uff1a\u6307\u5b9a\u94fe\u7684\u4f18\u5148\u7ea7\uff0c\u6570\u503c\u8d8a\u5c0f\u4f18\u5148\u7ea7\u8d8a\u9ad8\u3002<\/li>\n<li><code>policy &lt;policy&gt;<\/code>\uff1a\u6307\u5b9a\u94fe\u7684\u9ed8\u8ba4\u7b56\u7565\uff0c\u53ef\u4ee5\u662f <code>accept<\/code>\u3001<code>drop<\/code> \u7b49\u3002<\/li>\n<\/ul>\n<p>\u793a\u4f8b\uff1a<\/p>\n<pre><code class=\"language-bash\">nft add chain inet filter input { type filter hook input priority 0 \\; policy accept \\; }<\/code><\/pre>\n<h4>\u89c4\u5219\u53c2\u6570<\/h4>\n<ul>\n<li><code>ip saddr &lt;address&gt;<\/code>\uff1a\u5339\u914d\u6e90 IP \u5730\u5740\u3002<\/li>\n<li><code>ip daddr &lt;address&gt;<\/code>\uff1a\u5339\u914d\u76ee\u7684 IP \u5730\u5740\u3002<\/li>\n<li><code>ip protocol &lt;protocol&gt;<\/code>\uff1a\u5339\u914d IP \u534f\u8bae\uff0c\u5982 <code>tcp<\/code>\u3001<code>udp<\/code> \u7b49\u3002<\/li>\n<li><code>tcp sport &lt;port&gt;<\/code>\uff1a\u5339\u914d TCP \u6e90\u7aef\u53e3\u3002<\/li>\n<li><code>tcp dport &lt;port&gt;<\/code>\uff1a\u5339\u914d TCP \u76ee\u7684\u7aef\u53e3\u3002<\/li>\n<li><code>udp sport &lt;port&gt;<\/code>\uff1a\u5339\u914d UDP \u6e90\u7aef\u53e3\u3002<\/li>\n<li><code>udp dport &lt;port&gt;<\/code>\uff1a\u5339\u914d UDP \u76ee\u7684\u7aef\u53e3\u3002<\/li>\n<li><code>counter<\/code>\uff1a\u8ba1\u6570\u5339\u914d\u7684\u5305\u3002<\/li>\n<li><code>log<\/code>\uff1a\u8bb0\u5f55\u65e5\u5fd7\u3002<\/li>\n<li><code>accept<\/code>\uff1a\u63a5\u53d7\u5305\u3002<\/li>\n<li><code>drop<\/code>\uff1a\u4e22\u5f03\u5305\u3002<\/li>\n<li><code>reject<\/code>\uff1a\u62d2\u7edd\u5305\uff0c\u5e76\u53d1\u9001 ICMP \u9519\u8bef\u6d88\u606f\u3002<\/li>\n<li><code>mark &lt;value&gt;<\/code>\uff1a\u6807\u8bb0\u5305\u3002<\/li>\n<li><code>queue<\/code>\uff1a\u5c06\u5305\u53d1\u9001\u5230\u7528\u6237\u7a7a\u95f4\u8fdb\u884c\u5904\u7406\u3002<\/li>\n<\/ul>\n<p>\u793a\u4f8b\uff1a<\/p>\n<pre><code class=\"language-bash\">nft add rule inet filter input ip saddr 192.168.1.0\/24 counter accept\nnft add rule inet filter input tcp dport 22 counter drop<\/code><\/pre>\n<h4>NAT \u53c2\u6570<\/h4>\n<ul>\n<li><code>snat &lt;address&gt;<\/code>\uff1a\u6e90\u5730\u5740\u8f6c\u6362\u3002<\/li>\n<li><code>dnat &lt;address&gt;<\/code>\uff1a\u76ee\u7684\u5730\u5740\u8f6c\u6362\u3002<\/li>\n<li><code>masquerade<\/code>\uff1a\u5730\u5740\u4f2a\u88c5\u3002<\/li>\n<\/ul>\n<p>\u793a\u4f8b\uff1a<\/p>\n<pre><code class=\"language-bash\">nft add table ip nat\nnft add chain ip nat prerouting { type nat hook prerouting priority -100 \\; }\nnft add chain ip nat postrouting { type nat hook postrouting priority 100 \\; }\nnft add rule ip nat prerouting ip daddr 192.168.1.100 dnat to 10.0.0.100\nnft add rule ip nat postrouting ip saddr 10.0.0.0\/24 masquerade<\/code><\/pre>\n<h3>\u4f7f\u7528\u94fe\u4f18\u5148\u7ea7\u6765\u786e\u4fdd\u5904\u7406\u987a\u5e8f<\/h3>\n<p><code>nftables<\/code> \u4f7f\u7528\u94fe\u7684 <code>priority<\/code> \u9009\u9879\u6765\u786e\u4fdd\u89c4\u5219\u5728\u7f51\u7edc\u6808\u7684\u4e0d\u540c\u9636\u6bb5\u4f18\u5148\u5904\u7406\u3002\u6bcf\u4e2a\u94fe\u53ef\u4ee5\u6307\u5b9a\u4e00\u4e2a\u4f18\u5148\u7ea7\uff0c\u6570\u503c\u8d8a\u5c0f\u4f18\u5148\u7ea7\u8d8a\u9ad8\u3002<\/p>\n<p>\u9ed8\u8ba4\u60c5\u51b5\u4e0b\uff0c<code>nftables<\/code> \u94fe\u7684\u4f18\u5148\u7ea7\u8bbe\u7f6e\u4e3a 0\u3002\u53ef\u4ee5\u901a\u8fc7\u5c06\u4f18\u5148\u7ea7\u8bbe\u7f6e\u4e3a\u8d1f\u6570\uff08\u4f8b\u5982 -10\uff09\u6765\u786e\u4fdd <code>nftables<\/code> \u94fe\u4f18\u5148\u4e8e <code>iptables<\/code> \u5904\u7406\u6570\u636e\u5305\u3002<\/p>\n<h3>\u5b8c\u6574\u793a\u4f8b<\/h3>\n<p>\u4ee5\u4e0b\u662f\u4e00\u4e2a\u5b8c\u6574\u7684 <code>nftables<\/code> \u914d\u7f6e\u793a\u4f8b\uff0c\u5c55\u793a\u4e86\u5982\u4f55\u8bbe\u7f6e\u4e00\u4e2a\u7b80\u5355\u7684\u9632\u706b\u5899\u89c4\u5219\u96c6\uff1a<\/p>\n<pre><code class=\"language-bash\">#!\/usr\/sbin\/nft -f\n\n# \u521b\u5efa\u8868\ntable inet filter {\n    # \u521b\u5efa\u94fe\n    chain input {\n        type filter hook input priority -10; policy drop;\n        # \u5141\u8bb8\u73af\u56de\u63a5\u53e3\n        iif lo accept\n        # \u5141\u8bb8\u5df2\u5efa\u7acb\u548c\u76f8\u5173\u7684\u8fde\u63a5\n        ct state established,related accept\n        # \u5141\u8bb8ICMP\u5305\n        ip protocol icmp accept\n        # \u5141\u8bb8SSH\u8fde\u63a5\n        tcp dport 22 accept\n        # \u8bb0\u5f55\u5e76\u62d2\u7edd\u5176\u4ed6\u5305\n        log prefix &quot;nftables input drop: &quot; drop\n    }\n\n    chain forward {\n        type filter hook forward priority -10; policy drop;\n    }\n\n    chain output {\n        type filter hook output priority -10; policy accept;\n    }\n}\n\ntable ip nat {\n    chain prerouting {\n        type nat hook prerouting priority -100;\n        # \u793a\u4f8bDNAT\u89c4\u5219\n        ip daddr 192.168.1.100 dnat to 10.0.0.100\n    }\n\n    chain postrouting {\n        type nat hook postrouting priority 100;\n        # \u793a\u4f8bSNAT\u89c4\u5219\n        ip saddr 10.0.0.0\/24 masquerade\n    }\n}<\/code><\/pre>\n<h3>\u5904\u7406\u987a\u5e8f<\/h3>\n<p>\u5728\u4e0a\u9762\u7684\u793a\u4f8b\u4e2d\uff0c<code>filter<\/code> \u8868\u4e2d\u7684 <code>input<\/code> \u94fe\u3001<code>forward<\/code> \u94fe\u548c <code>output<\/code> \u94fe\u7684\u4f18\u5148\u7ea7\u90fd\u8bbe\u7f6e\u4e3a -10\uff0c\u8fd9\u786e\u4fdd\u4e86\u8fd9\u4e9b\u94fe\u4f1a\u5728\u9ed8\u8ba4\u4f18\u5148\u7ea7\u4e3a 0 \u7684\u94fe\u4e4b\u524d\u5904\u7406\u6570\u636e\u5305\u3002\u540c\u65f6\uff0c<code>nat<\/code> \u8868\u4e2d\u7684 <code>prerouting<\/code> \u94fe\u7684\u4f18\u5148\u7ea7\u8bbe\u7f6e\u4e3a -100\uff0c\u786e\u4fdd\u5b83\u5728\u975e\u5e38\u65e9\u7684\u9636\u6bb5\u5904\u7406\u6570\u636e\u5305\uff0c\u800c <code>postrouting<\/code> \u94fe\u7684\u4f18\u5148\u7ea7\u8bbe\u7f6e\u4e3a 100\uff0c\u786e\u4fdd\u5b83\u5728\u540e\u671f\u5904\u7406\u6570\u636e\u5305\u3002<\/p>\n<h3>Route \u94fe\u7c7b\u578b<\/h3>\n<p><code>route<\/code> \u94fe\u7c7b\u578b\u4e3b\u8981\u7528\u4e8e\u4fee\u6539\u6570\u636e\u5305\u7684\u8def\u7531\uff0c\u5e38\u89c1\u7684\u7528\u9014\u5305\u62ec\u6539\u53d8\u6570\u636e\u5305\u7684\u4e0b\u4e00\u8df3\u5730\u5740\u6216\u63a5\u53e3\u3002\u5b83\u53ef\u4ee5\u6302\u8f7d\u5728\u4ee5\u4e0b\u94a9\u5b50\u70b9\uff08hooks\uff09\u4e0a\uff1a<\/p>\n<ul>\n<li><code>input<\/code><\/li>\n<li><code>forward<\/code><\/li>\n<li><code>output<\/code><\/li>\n<li><code>postrouting<\/code><\/li>\n<\/ul>\n<h3>\u793a\u4f8b\uff1aroute \u94fe\u7c7b\u578b<\/h3>\n<h4>\u521b\u5efa\u8868\u548c\u94fe<\/h4>\n<p>\u9996\u5148\uff0c\u521b\u5efa\u4e00\u4e2a\u5305\u542b <code>route<\/code> \u94fe\u7c7b\u578b\u7684\u8868\u548c\u94fe\u3002<\/p>\n<pre><code>bash\u590d\u5236\u4ee3\u7801#!\/usr\/sbin\/nft -f\n\ntable inet mytable {\n    chain preroute {\n        type route hook prerouting priority -150; policy accept;\n    }\n\n    chain route_output {\n        type route hook output priority -150; policy accept;\n    }\n}<\/code><\/pre>\n<h4>\u6dfb\u52a0\u89c4\u5219<\/h4>\n<p>\u63a5\u4e0b\u6765\uff0c\u5728 <code>route<\/code> \u94fe\u4e2d\u6dfb\u52a0\u89c4\u5219\uff0c\u4ee5\u4fee\u6539\u6570\u636e\u5305\u7684\u8def\u7531\u3002<\/p>\n<pre><code>bash\u590d\u5236\u4ee3\u7801nft add table inet mytable\n\n# \u521b\u5efa preroute \u94fe\nnft add chain inet mytable preroute { type route hook prerouting priority -150 \\; }\n\n# \u521b\u5efa route_output \u94fe\nnft add chain inet mytable route_output { type route hook output priority -150 \\; }\n\n# \u5728 preroute \u94fe\u4e2d\u6dfb\u52a0\u89c4\u5219\uff0c\u5c06\u6240\u6709\u76ee\u7684\u5730\u5740\u4e3a 192.168.1.100 \u7684\u6570\u636e\u5305\u91cd\u8def\u7531\u5230 192.168.1.1\nnft add rule inet mytable preroute ip daddr 192.168.1.100 ip nexthop 192.168.1.1\n\n# \u5728 route_output \u94fe\u4e2d\u6dfb\u52a0\u89c4\u5219\uff0c\u5c06\u6240\u6709\u6e90\u5730\u5740\u4e3a 10.0.0.1 \u7684\u6570\u636e\u5305\u901a\u8fc7\u63a5\u53e3 eth0 \u53d1\u9001\nnft add rule inet mytable route_output ip saddr 10.0.0.1 oif eth0<\/code><\/pre>\n<h3>\u89e3\u91ca<\/h3>\n<ol>\n<li><strong>\u521b\u5efa\u8868\u548c\u94fe<\/strong>\uff1a\n<ul>\n<li>\u521b\u5efa\u4e86\u4e00\u4e2a\u540d\u4e3a <code>mytable<\/code> \u7684\u8868\u3002<\/li>\n<li>\u5728\u8868\u4e2d\u521b\u5efa\u4e86\u4e24\u4e2a\u94fe\uff1a<code>preroute<\/code> \u548c <code>route_output<\/code>\u3002<\/li>\n<li><code>preroute<\/code> \u94fe\u7528\u4e8e\u5728\u6570\u636e\u5305\u8fdb\u5165\u8def\u7531\u4e4b\u524d\u4fee\u6539\u5176\u8def\u7531\u3002<\/li>\n<li><code>route_output<\/code> \u94fe\u7528\u4e8e\u5728\u6570\u636e\u5305\u79bb\u5f00\u4e3b\u673a\u65f6\u4fee\u6539\u5176\u8def\u7531\u3002<\/li>\n<\/ul>\n<\/li>\n<li><strong>\u6dfb\u52a0\u89c4\u5219<\/strong>\uff1a\n<ul>\n<li>\u5728 <code>preroute<\/code> \u94fe\u4e2d\u6dfb\u52a0\u4e86\u4e00\u6761\u89c4\u5219\uff0c\u5c06\u6240\u6709\u76ee\u7684\u5730\u5740\u4e3a <code>192.168.1.100<\/code> \u7684\u6570\u636e\u5305\u91cd\u8def\u7531\u5230 <code>192.168.1.1<\/code>\u3002<\/li>\n<li>\u5728 <code>route_output<\/code> \u94fe\u4e2d\u6dfb\u52a0\u4e86\u4e00\u6761\u89c4\u5219\uff0c\u5c06\u6240\u6709\u6e90\u5730\u5740\u4e3a <code>10.0.0.1<\/code> \u7684\u6570\u636e\u5305\u901a\u8fc7\u63a5\u53e3 <code>eth0<\/code> \u53d1\u9001\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<h3>\u68c0\u67e5\u548c\u9a8c\u8bc1<\/h3>\n<p>\u914d\u7f6e\u5b8c\u6210\u540e\uff0c\u53ef\u4ee5\u4f7f\u7528\u4ee5\u4e0b\u547d\u4ee4\u68c0\u67e5\u548c\u9a8c\u8bc1\u9632\u706b\u5899\u89c4\u5219\uff1a<\/p>\n<h4>\u68c0\u67e5 <code>nftables<\/code> \u89c4\u5219<\/h4>\n<pre><code class=\"language-bash\">sudo nft list ruleset<\/code><\/pre>\n<h4>\u68c0\u67e5 <code>iptables<\/code> \u89c4\u5219<\/h4>\n<pre><code class=\"language-bash\">sudo iptables -L<\/code><\/pre>\n<h4>\u6d4b\u8bd5\u8fde\u63a5<\/h4>\n<p>\u4f7f\u7528 <code>ping<\/code>\u3001<code>curl<\/code> \u6216\u5176\u4ed6\u7f51\u7edc\u5de5\u5177\u6d4b\u8bd5\u8fde\u63a5\uff0c\u786e\u4fdd\u89c4\u5219\u6309\u9884\u671f\u5de5\u4f5c\u3002<\/p>\n<h3>\u603b\u7ed3<\/h3>\n<p>\u901a\u8fc7\u8be6\u7ec6\u4e86\u89e3 <code>nftables<\/code> \u7684\u89c4\u5219\u53c2\u6570\u548c\u914d\u7f6e\uff0c\u53ef\u4ee5\u7075\u6d3b\u5730\u63a7\u5236\u7f51\u7edc\u6d41\u91cf\uff0c\u5e76\u786e\u4fdd\u7cfb\u7edf\u7684\u5b89\u5168\u6027\u3002\u901a\u8fc7\u8bbe\u7f6e\u94fe\u7684\u4f18\u5148\u7ea7\uff0c\u53ef\u4ee5\u786e\u4fdd <code>nftables<\/code> \u89c4\u5219\u5728 <code>iptables<\/code> \u89c4\u5219\u4e4b\u524d\u5904\u7406\u6570\u636e\u5305\uff0c\u4ece\u800c\u5b9e\u73b0\u66f4\u7cbe\u7ec6\u7684\u6d41\u91cf\u63a7\u5236\u548c\u7ba1\u7406\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>nftables \u8be6\u7ec6\u53c2\u6570\u548c\u914d\u7f6e nftables \u662f Linux \u5185\u6838\u7684\u5305\u8fc7\u6ee4\u6846\u67b6\uff0c\u63d0\u4f9b\u4e86\u66f4\u7075\u6d3b\u548c\u9ad8\u6548\u7684\u673a\u5236 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[20,35],"class_list":["post-54","post","type-post","status-publish","format-standard","hentry","category-linux","tag-nftable","tag-35"],"_links":{"self":[{"href":"https:\/\/blog.cnsn.fun\/index.php?rest_route=\/wp\/v2\/posts\/54","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cnsn.fun\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cnsn.fun\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cnsn.fun\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cnsn.fun\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=54"}],"version-history":[{"count":0,"href":"https:\/\/blog.cnsn.fun\/index.php?rest_route=\/wp\/v2\/posts\/54\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cnsn.fun\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=54"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cnsn.fun\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=54"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cnsn.fun\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=54"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}