Your message dated Sat, 15 Nov 2025 18:19:13 +0000
with message-id <[email protected]>
and subject line Bug#1120683: fixed in iptables 1.8.11-3
has caused the Debian Bug report #1120683,
regarding iptables-nft refuses -n option when options -L and -Z are used
together
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1120683: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120683
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: iptables
Version: 1.8.11-2
Severity: normal
Dear Maintainer,
* What led up to the situation?
I have a homebrewed "fail2ban" type script that keeps a table of hosts to
ban and regularly cleans it out with a command like:
/sbin/iptables -w -n -v -L -Z bad-guys
* What exactly did you do (or not do) that was effective (or
ineffective)?
I tried running the command and got the error:
iptables v1.8.11 (nf_tables): Illegal option `--numeric' with this command
Try `iptables -h' or 'iptables --help' for more information.
* What was the outcome of this action?
The counters were not zeroed and no output was produced.
* What outcome did you expect instead?
That the counters be zeroed and the listing of the table (with the counters
before zeroing) be printed without adresss resolution.
This is a regression from 1.8.9-2 where the command does what I want:
# /sbin/iptables -w -n -v -L -Z bad-guys
Chain bad-guys (1 references)
pkts bytes target prot opt in out source destination
6 360 DROP 0 -- * * 193.221.16.92 0.0.0.0/0
0 0 DROP 0 -- * * 185.180.141.47 0.0.0.0/0
Zeroing chain `bad-guys'
-- System Information:
Debian Release: 13.1
APT prefers stable-updates
APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)
Kernel: Linux 6.12.48+deb13-amd64 (SMP w/16 CPU threads; PREEMPT)
Locale: LANG=C, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE=en_US:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
Versions of packages iptables depends on:
ii libc6 2.41-12
ii libip4tc2 1.8.11-2
ii libip6tc2 1.8.11-2
ii libmnl0 1.0.5-3
ii libnetfilter-conntrack3 1.1.0-1
ii libnfnetlink0 1.0.2-3
ii libnftnl11 1.2.9-1
ii libxtables12 1.8.11-2
ii netbase 6.5
Versions of packages iptables recommends:
ii nftables 1.1.3-1
Versions of packages iptables suggests:
pn firewalld <none>
ii kmod 34.2-2
-- no debconf information
--- End Message ---
--- Begin Message ---
Source: iptables
Source-Version: 1.8.11-3
Done: Jeremy Sowden <[email protected]>
We believe that the bug you reported is fixed in the latest version of
iptables, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Jeremy Sowden <[email protected]> (supplier of updated iptables package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sat, 15 Nov 2025 14:02:58 +0000
Source: iptables
Architecture: source
Version: 1.8.11-3
Distribution: unstable
Urgency: medium
Maintainer: Debian Netfilter Packaging Team
<[email protected]>
Changed-By: Jeremy Sowden <[email protected]>
Closes: 1120683
Changes:
iptables (1.8.11-3) unstable; urgency=medium
.
* [1c48ca3] d/patches: add patch to disable flaky Python tests
* [b3f231e] d/t/control: remove flaky restriction from Python test-suite
* [26d2d97] d/t/control: add missing dependencies for shell suite
* [0304523] d/patches: add upstream patch to accept an option if any
given command allows it (Closes: #1120683)
* [a6979b5] d/copyright: replace FSF postal address with URL in GPL text
* [f9737f8] d/control: bump Standards-Version to 4.7.2
* [05e135d] d/watch: convert to version 5
Checksums-Sha1:
ff8ad3eb05936aa0e3075eeb38b11254cf960567 3032 iptables_1.8.11-3.dsc
1db223018420b1d66ff3f5b299a8981cb0b048eb 30716 iptables_1.8.11-3.debian.tar.xz
98403fdc9bd72d7512bcb30d857589deb710c36e 9529 iptables_1.8.11-3_amd64.buildinfo
Checksums-Sha256:
15e5a078bd297e958ba6b0484242dec5e1b269ca979a8bc0c5f6fe73f4ba93b8 3032
iptables_1.8.11-3.dsc
0dfe259ec657e23b5150603f3d2a3f1f42972d42edd28d50d66143ed7acc09e6 30716
iptables_1.8.11-3.debian.tar.xz
69b44bca88476c59f312fc8defb1c1e1d3ce90fbe2a066f277cb1a75c3cbfa9c 9529
iptables_1.8.11-3_amd64.buildinfo
Files:
b7edaa5f80e76de673f44b8b0c1a1de4 3032 net optional iptables_1.8.11-3.dsc
242d2607bcd54892903ecb2c6e3f0c1c 30716 net optional
iptables_1.8.11-3.debian.tar.xz
0b237a0ea0b59d72223facc906c74de3 9529 net optional
iptables_1.8.11-3_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----
wsG7BAEBCgBvBYJpGMCyCRAphqwKvfEEDUcUAAAAAAAeACBzYWx0QG5vdGF0aW9u
cy5zZXF1b2lhLXBncC5vcmd6LZmhC5UspY5JFLquKuQi1hsqhw5refbq21QU/jfx
/hYhBGwdtFNj70A3vVbVFymGrAq98QQNAACslBAAqFIJHRbAFfRGc6NT0L080lCd
B2EAGzHJuzSmxzkDiXZdH+nb2Uenmag+W8aLRguEC4qk6SVeD0/avsDmTxn5AEGF
v8a/O2S4tZ/DfmoSIfEt9zCoXaLBQzpCYXzGgtna51Ntq8frodjuz6R3zd+S98CE
9ceXlbuKokG5KyKar9vMWnB3IEglrRV+VpeBTkZGoeTBbW3uPyUr101MjCIX0ctf
oQZ85Fk1nWYdsHabcwIbosT4SjapjN8RH5WHWfuWuphpawaq2ItPfY+YNKTRiKhF
nk9C+Zum5H63TkE1Uhc/sxpo9qfJMYLAUWBoYLzNFkkqDLjwQJm8JLWQitMSuKsN
XwlNdoO7chJELLdy33xB73Lpy+m2TTBQZaD/IYDwy25DruzlQh5jceK+xtdO4QqR
ZxMbke9PcO9EqrVSsrYSuwqB7aU/4myW5d8aGvluQ+DpLNX+yLvVBhxutaqGk0WI
YNtQoAGXTJlytrPLrDPpYHFgCOBzCYYpGWCtZx4ujTH4sBqu0eI/h/LvixlGXTxk
ooGq4yfkb8WC0KdSEaF8UmXQCjFlUtO3cCIFFDvH6BbL55XV8ZA0UOoeQF1bkK30
3irM+8N2yRRQ1jHJ82pmYbKybdz4fY1C+slqJS/vZTUfPanJiz0i7Y0YTS5ee07z
OpqwS5au/Si2gU0E56I=
=NF5A
-----END PGP SIGNATURE-----
pgpoXYYwFj2O3.pgp
Description: PGP signature
--- End Message ---