Yep

Iptables was updated a few hours after the last ufw update was released

Thanks for the quick response

On Fri, 2 Nov 2018, 01:52 Jamie Strandboge <ja...@canonical.com wrote:

> On Fri, 02 Nov 2018, Anuprita Duggal wrote:
>
> > == IPv6 ==
> ...
> > LOG: pass
> > hashlimit: pass
> > limit: pass
> ...
> > All tests passed
> > Suzu.memeYa@build ~ $
> >   Suzu.memeYa@build ~ $ sudo ufw enable
> >                                   Command may disrupt existing ssh
> > connections. Proceed with operation (y|n)? y
> > ERROR: Could not load logging rules
> > Suzu.memeYa@build ~ $
>
> Interesting. It appears something changed wrt iptables:
>
> $ sudo /sbin/iptables -L ufw-before-logging-input
> Chain ufw-before-logging-input (1 references)
> target     prot opt source               destination
>
> $ sudo /sbin/iptables -F ufw-before-logging-input
>
> $ sudo /sbin/iptables -Z ufw-before-logging-input
> iptables v1.8.1 (nf_tables):  (null) failed (Operation not supported):
> chain ufw-before-logging-input
>
> The man page for iptables doesn't say anything about this change.
>
> Here is a simple reproducer:
>
> $ sudo iptables --version
> iptables v1.8.1 (nf_tables)
>
> $ sudo iptables -N foo
>
> $ sudo iptables -L foo
> Chain foo (0 references)
> target     prot opt source               destination
>
> $ sudo iptables -F foo
>
> $ sudo iptables -Z foo  # REGRESSION
> iptables v1.8.1 (nf_tables):  (null) failed (Operation not supported):
> chain foo
>
> $ sudo iptables -X foo
>
>
> That said, if I update ufw to use the *-legacy versions of
> iptables/ip6tables
> tools, then everything works like before. I will keep this bug open for the
> incompatibility. I'll file a new bug against iptables for the (possible)
> regression. As a temporary workaround, feel free to downgrade to iptables
> 1.6.
>
> With preliminary testing, it seems that ufw can work with the nf_tables
> variety
> of iptables/ip6tables except for this -Z issue.
>
> --
> Jamie Strandboge             | http://www.canonical.com
>

Reply via email to