Your message dated Tue, 20 Nov 2018 15:40:04 -0600
with message-id <20181120214004.GC5285@iolanthe>
and subject line Re: Bug#913112: ufw all traffic blocked, icmp-type + logging 
error on enable
has caused the Debian Bug report #911986,
regarding ufw is disabled on startup after the most recent update. also ufw 
enable returns "ERROR: could nkt load logging rules". ufw reload tells me that 
the firewall is inactive. if i run ufw status after the failed ufw command it 
does show that the firewall is active but ufw reload still fails
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
911986: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=911986
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: ufw
Version: 0.35-6
Severity: important
Tags: a11y



-- System Information:
Debian Release: buster/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386, i686

Kernel: Linux 4.19.0+ (SMP w/4 CPU cores)
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE=C.UTF-8 
(charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages ufw depends on:
ii  debconf [debconf-2.0]  1.5.69
ii  iptables               1.8.1-2
ii  lsb-base               9.20170808
ii  python3                3.6.7-1
ii  ucf                    3.0038

ufw recommends no packages.

Versions of packages ufw suggests:
ii  rsyslog  8.38.0-1+b1

-- Configuration Files:
/etc/default/ufw changed:
IPV6=yes
DEFAULT_INPUT_POLICY="REJECT"
DEFAULT_OUTPUT_POLICY="ACCEPT"
DEFAULT_FORWARD_POLICY="DROP"
DEFAULT_APPLICATION_POLICY="SKIP"
MANAGE_BUILTINS=no
IPT_SYSCTL=/etc/ufw/sysctl.conf
IPT_MODULES="nf_conntrack_ftp nf_nat_ftp nf_conntrack_netbios_ns"


-- debconf information:
  ufw/allow_known_ports:
  ufw/allow_custom_ports:
  ufw/enable: true
* ufw/existing_configuration:

--- End Message ---
--- Begin Message ---
This issue is caused be a regression in iptables 1.8.1:

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912610

This is now addressed in iptables. Please upgrade to iptables 1.8.2-2 and ufw
should start work again. If not, please file a new bug.

Thanks!

-- 
Jamie Strandboge             | http://www.canonical.com

Attachment: signature.asc
Description: PGP signature


--- End Message ---

Reply via email to