Hi Thomas, Hi Chris, On Fri, May 02, 2025 at 11:47:24AM +0200, Thomas Liske wrote: > I wonder why needrestart selects this service at all. Could you provide the > output of `needrestart -v` for this?
Unfortunately we already restarted all the affected nodes. Do you want me to try and recreate the problem in debvm? > > I think we should add an exception for nftables to $nrconf{override_rc} to > > avoid this problem since there doesn't seem to be any point in restarting > > it for security purposes. > > ACK, IMHO it should be completely ignored and one should consider the same > for iptables. But I still wonder why the service gets selected at all… My assumption: because the executable changed due to the migration of 1.1.2-1 to testing on 04-26. We saw the nftables service was restarted on affected nodes on 04-27 at about 6am i.e. almost certainly because of unattended-upgrades. Why do you think it should be ignored already? On Fri, May 02, 2025 at 11:50:20AM +0200, Chris Hofstaedtler wrote: > On Fri, May 02, 2025 at 11:37:04AM +0200, Daniel Gröber wrote: > > Justification: Breaks unrelated software > (IMO needrestart is not "unrelated" here.) I do think the severity is justified, nftables is the "unrelated" software needrestart is breaking. See https://release.debian.org/trixie/rc_policy.txt first section: >> * makes unrelated software on the system (or the whole system) >> break > Isn't this really a bug in nftables and maybe lxc? If restarting a > service wipes its configuration, maybe it should be fixed there. I did consider that. Unfortunately too much networking software is already doing things this way to my knowledge and personal dismay. Think: docker, libvirt etc. I think nftables should support a .d directory to fix this "properly". However since most upstream sofware treats the firwall as runtime state there's going to be an impedance mismatch if we just stick this in /etc/nftables.d. So really we'd have to also support /run/nftables.d to allow representing the intended semantics and I'm personally just not convinced that's the right thing to do yet since I haven't thought of this runtime-state consideration before. For now adding an exception for nftables fixes the immediate issue and doesn't have any downsides I can see and I'll carry the .d thing forward in any case -- now with a good example issue for why it's needed :-) Thanks, --Daniel
signature.asc
Description: PGP signature