Your message dated Sat, 18 Oct 2014 17:05:07 +0000
with message-id <[email protected]>
and subject line Bug#760551: fixed in shorewall 4.6.4.2-1
has caused the Debian Bug report #760551,
regarding shorewall: example 'universal' fails after upgrade
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
760551: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=760551
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: shorewall
Version: 4.6.3-1
Severity: normal

Hi,

after the latest update of shorewall the 'universal' example
configuration fails:

   $ sudo shorewall start
   Compiling...
   Processing /etc/shorewall/params ...
   Processing /etc/shorewall/shorewall.conf...
   Loading Modules...
   Compiling /etc/shorewall/zones...
   Compiling /etc/shorewall/interfaces...
   Determining Hosts in Zones...
   Locating Action Files...
   Compiling /etc/shorewall/policy...
   Adding rules for DHCP
   Compiling TCP Flags filtering...
   Compiling Kernel Route Filtering...
   Compiling Martian Logging...
   Compiling MAC Filtration -- Phase 1...
   Compiling /etc/shorewall/rules...
   Compiling /etc/shorewall/conntrack...
   Compiling MAC Filtration -- Phase 2...
   Applying Policies...
   Compiling /usr/share/shorewall/action.Drop for chain Drop...
   Compiling /usr/share/shorewall/action.Broadcast for chain Broadcast...
   Generating Rule Matrix...
   Optimizing Ruleset...
   Creating iptables-restore input...
   Shorewall configuration compiled to /var/lib/shorewall/.start
   Starting Shorewall....
      ERROR: No network interface available: Firewall state not changed
   Terminated

The configuration worked fine before.  With the help of [1], I found
that modifying '/etc/shorewall/interfaces' fixed/worked around the issue:

   andi@flashgordon:/etc/shorewall$ diff -u interfaces interfaces.good
   --- interfaces  2014-09-05 09:58:21.616550151 +0200
   +++ interfaces.good     2014-09-04 14:27:06.630210721 +0200
   @@ -11,4 +11,4 @@
    
###############################################################################
    #ZONE  INTERFACE       OPTIONS
    -      lo              ignore
   -net    all             dhcp,physical=+,routeback,optional
   +net    eth0            dhcp,routeback,optional

Looks like the wildcard '+' is not working as expected.

Thanks,

        Andi

[1] <URL:https://bbs.archlinux.org/viewtopic.php?pid=1449379#p1449379>


-- System Information:
Debian Release: jessie/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 3.14-2-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages shorewall depends on:
ii  bc                     1.06.95-9
ii  debconf [debconf-2.0]  1.5.53
ii  iproute                1:3.16.0-1
ii  iproute2               3.16.0-1
ii  iptables               1.4.21-2
ii  perl-modules           5.20.0-4
ii  shorewall-core         4.6.3-1

shorewall recommends no packages.

Versions of packages shorewall suggests:
ii  make           4.0-8
pn  shorewall-doc  <none>

--- End Message ---
--- Begin Message ---
Source: shorewall
Source-Version: 4.6.4.2-1

We believe that the bug you reported is fixed in the latest version of
shorewall, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Roberto C. Sanchez <[email protected]> (supplier of updated shorewall 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sat, 18 Oct 2014 12:44:25 -0400
Source: shorewall
Binary: shorewall
Architecture: source all
Version: 4.6.4.2-1
Distribution: unstable
Urgency: low
Maintainer: Roberto C. Sanchez <[email protected]>
Changed-By: Roberto C. Sanchez <[email protected]>
Description:
 shorewall  - Shoreline Firewall, netfilter configurator
Closes: 760551
Changes:
 shorewall (4.6.4.2-1) unstable; urgency=low
 .
   * New Upstream Version (Closes: #760551)
Checksums-Sha1:
 6d0a15b324cd5cb4b72009be68c81fac57aaa48d 1919 shorewall_4.6.4.2-1.dsc
 d12de185655b38d8606cf1e4c43165e9c29c2292 746086 shorewall_4.6.4.2.orig.tar.gz
 33e3176125360ab780994471181ed125f2e74015 34692 
shorewall_4.6.4.2-1.debian.tar.xz
 06c873d4d071a953805191a8dd679d61d49c3ede 694340 shorewall_4.6.4.2-1_all.deb
Checksums-Sha256:
 990f60c9b389508c7b978fb27b09b93112f683a0df8e69df3a3652943f06d05d 1919 
shorewall_4.6.4.2-1.dsc
 051e4cdefc084d29515015ba61747873407e8d1965bed86c013337cc4ebb851c 746086 
shorewall_4.6.4.2.orig.tar.gz
 7ad78bc30405411cfe718628d80587af116541599a44fe9fc56db525f0dcaebd 34692 
shorewall_4.6.4.2-1.debian.tar.xz
 05c9fac5222d559c13793a7c05430fcad120f20bd9a1af38c3d6e559b217a453 694340 
shorewall_4.6.4.2-1_all.deb
Files:
 141e60809fd2342397bfbd4ff444653d 1919 net optional shorewall_4.6.4.2-1.dsc
 0a4e4efb6c2b1704a280c337248f795a 746086 net optional 
shorewall_4.6.4.2.orig.tar.gz
 62795cd7889538ef055780cc1be9828c 34692 net optional 
shorewall_4.6.4.2-1.debian.tar.xz
 7e4f1e42f59c56fd63ff8e86844f67dd 694340 net optional 
shorewall_4.6.4.2-1_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=paFg
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to