Your message dated Sun, 24 Nov 2019 14:04:53 +0100
with message-id <[email protected]>
and subject line Re: connman: wifi tethering does not work with nftables
has caused the Debian Bug report #944335,
regarding connman: wifi tethering does not work with nftables
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
944335: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=944335
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: connman
Version: 1.36-2
Severity: normal

Dear Maintainer,

   * What led up to the situation?

   I was trying to enable wifi tethering.

   * What exactly did you do (or not do) that was effective (or
     ineffective)?

   Enable wifi tethering with: connmanctl tether wifi on ssid password

   * What was the outcome of this action?

   Wifi tethering was enabled but the other device doesn't get an IP
   address.

   * What outcome did you expect instead?
   Getting a full functional wifi hotspot.


I checked and found that connman is using the old iptables and since Debian
Buster switched to nftables by default wifi tether doesn't work anymore.
You can check with iptables-legacy that connman is using the old nat
chain. You will also receive a warnig while using "iptables" that
iptables-legacy rules are set.

I could fix the issue by downloading the debian source and adding:
"--with-firewall=nftable" to dh_auto_configure in debian/rules.
Also libnftnl-dev, libmnl-dev need to be added to the Build-Depends in
debian/control.

Of course connman won't work with the old iptables-legacy then but since
nftables is the default now in Buster it should work out of the box in
my opinion.

Kind regards
Ray

-- System Information:
Debian Release: 10.1
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386, arm64

Kernel: Linux 4.19.0-6-amd64 (SMP w/8 CPU cores)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE= 
(charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages connman depends on:
ii  dbus          1.12.16-1
ii  iptables      1.8.2-4
ii  libc6         2.28-10
ii  libdbus-1-3   1.12.16-1
ii  libglib2.0-0  2.58.3-2+deb10u1
ii  libgnutls30   3.6.7-4
ii  libmnl0       1.0.4-2
ii  libnftnl11    1.1.2-2
ii  libreadline7  7.0-5
ii  lsb-base      10.2019051400

Versions of packages connman recommends:
ii  bluez          5.50-1
ii  ofono          1.21-1
ii  wpasupplicant  2:2.7+git20190128+0c1e29f-6+deb10u1

Versions of packages connman suggests:
ii  connman-vpn  1.36-2

-- no debconf information

--- End Message ---
--- Begin Message ---
> Of course connman won't work with the old iptables-legacy then but since
> nftables is the default now in Buster it should work out of the box in
> my opinion.
Isn't that easy - need a careful review, introduction of some packages
and will be done maybe with the next upload to NEW.

--- End Message ---

Reply via email to