Hi, Laurence.

On Tue, Aug 06, 2013 at 10:55:10AM -0400, Laurence J. Lane wrote:
> tag 718810 moreinfo
> severity 718810 normal
> thanks
> 
> On Tue, Aug 6, 2013 at 12:46 AM, Eugene Berdnikov <b...@protva.ru> wrote:
> 
> >  I have such behaviour on several hosts running debian/testing.
> >  Downgrade to iptables-1.4.14 solves the problem.
> 
> http://paste.debian.net/23235/
> 
> I just created a fresh virtual machine with testing and the kernel
> listed in your report. I still do not see the problem you're having.
> There may be an issue between iptables and  whatever creates your
> iptables rules.

 It seems your guess about "issue between iptables and whatever
 creates your iptables rules" is true.

 If rules are created with iptables-1.4.14, they are shown and saved
 correctly with iptables-1.4.14.

 If rules are created with iptables-1.4.19, they are shown and saved
 correctly with iptables-1.4.19.

 If rules are created with iptables-1.4.14, followed by upgrade to
 iptables-1.4.19, then "iptables -L" and iptables-save show wrong
 results. Below is the log on debian/testing fresh system.

------------------------------------------------------------------------
vm1-debian:~# uname -a
Linux vm1-debian 3.2.0-4-686-pae #1 SMP Debian 3.2.41-2 i686 GNU/Linux
vm1-debian:~# iptables --version
iptables v1.4.14
vm1-debian:~# iptables -F
vm1-debian:~# iptables -nvL INPUT
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
vm1-debian:~# iptables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
vm1-debian:~# iptables -A INPUT -m state --state NEW -j ACCEPT
vm1-debian:~# iptables -nvL INPUT
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         state RELATED,ESTABLISHED
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
         state NEW
vm1-debian:~# 
vm1-debian:~# apt-cache policy iptables
iptables:
  Installed: 1.4.14-3.1
  Candidate: 1.4.19.1-1
  Version table:
     1.4.19.1-1 0
        500 ftp://ftp.funet.fi testing/main Packages
 *** 1.4.14-3.1 0
        100 /var/lib/dpkg/status
vm1-debian:~# apt-get install iptables
The following extra packages will be installed:
  libxtables10
The following NEW packages will be installed:
  libxtables10
The following packages will be upgraded:
  iptables
1 upgraded, 1 newly installed, 0 to remove and 169 not upgraded.
Need to get 0B/429kB of archives.
After this operation, 63.5kB of additional disk space will be used.
Do you want to continue [Y/n]? 
Preparing to replace iptables 1.4.14-3.1 (using 
.../iptables_1.4.19.1-1_i386.deb) ...
Unpacking replacement iptables ...
Selecting previously unselected package libxtables10.
Unpacking libxtables10 (from .../libxtables10_1.4.19.1-1_i386.deb) ...
Processing triggers for man-db ...
Setting up libxtables10 (1.4.19.1-1) ...
Setting up iptables (1.4.19.1-1) ...
vm1-debian:~# iptables --version
iptables v1.4.19.1
vm1-debian:~# iptables -nvL INPUT
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination 
        
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state 
    0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0   
        state 
vm1-debian:~# iptables-save 
# Generated by iptables-save v1.4.19.1 on Tue Aug  6 19:42:41 2013
*filter
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
-A INPUT -m state -j ACCEPT
-A INPUT -m state -j ACCEPT
COMMIT
# Completed on Tue Aug  6 19:42:41 2013
vm1-debian:~# 
------------------------------------------------------------------------

 This bug can lead to damage if usage pattern is "keep configuration
 in kernel, modify rules on the fly, save state with iptables-save".
 I use such workflow for my systems running 24x7.
-- 
 Eugene Berdnikov


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to