Your message dated Sun, 24 Nov 2019 14:04:53 +0100 with message-id <[email protected]> and subject line Re: connman: wifi tethering does not work with nftables has caused the Debian Bug report #944335, regarding connman: wifi tethering does not work with nftables to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 944335: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=944335 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Package: connman Version: 1.36-2 Severity: normal Dear Maintainer, * What led up to the situation? I was trying to enable wifi tethering. * What exactly did you do (or not do) that was effective (or ineffective)? Enable wifi tethering with: connmanctl tether wifi on ssid password * What was the outcome of this action? Wifi tethering was enabled but the other device doesn't get an IP address. * What outcome did you expect instead? Getting a full functional wifi hotspot. I checked and found that connman is using the old iptables and since Debian Buster switched to nftables by default wifi tether doesn't work anymore. You can check with iptables-legacy that connman is using the old nat chain. You will also receive a warnig while using "iptables" that iptables-legacy rules are set. I could fix the issue by downloading the debian source and adding: "--with-firewall=nftable" to dh_auto_configure in debian/rules. Also libnftnl-dev, libmnl-dev need to be added to the Build-Depends in debian/control. Of course connman won't work with the old iptables-legacy then but since nftables is the default now in Buster it should work out of the box in my opinion. Kind regards Ray -- System Information: Debian Release: 10.1 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable') Architecture: amd64 (x86_64) Foreign Architectures: i386, arm64 Kernel: Linux 4.19.0-6-amd64 (SMP w/8 CPU cores) Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE= (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages connman depends on: ii dbus 1.12.16-1 ii iptables 1.8.2-4 ii libc6 2.28-10 ii libdbus-1-3 1.12.16-1 ii libglib2.0-0 2.58.3-2+deb10u1 ii libgnutls30 3.6.7-4 ii libmnl0 1.0.4-2 ii libnftnl11 1.1.2-2 ii libreadline7 7.0-5 ii lsb-base 10.2019051400 Versions of packages connman recommends: ii bluez 5.50-1 ii ofono 1.21-1 ii wpasupplicant 2:2.7+git20190128+0c1e29f-6+deb10u1 Versions of packages connman suggests: ii connman-vpn 1.36-2 -- no debconf information
--- End Message ---
--- Begin Message ---> Of course connman won't work with the old iptables-legacy then but since > nftables is the default now in Buster it should work out of the box in > my opinion. Isn't that easy - need a careful review, introduction of some packages and will be done maybe with the next upload to NEW.
--- End Message ---

