https://bugs.kde.org/show_bug.cgi?id=486340
Bug ID: 486340 Summary: Failure to show firewalld status Classification: Applications Product: systemsettings Version: 6.0.4 Platform: Arch Linux OS: Linux Status: REPORTED Severity: normal Priority: NOR Component: kcm_firewall Assignee: plasma-b...@kde.org Reporter: descartav...@gmail.com CC: lucas.bia...@kde.org, tcanabr...@kde.org Target Milestone: --- SUMMARY Firewall status show as disabled when it is enabled. STEPS TO REPRODUCE 1. `firewall-cmd --state` shows "running" 2. `systemctl status firewalld.service` shows "active"/"enabled". 3. Open the KDE settings, connection, firewall. 4. type in user password OBSERVED RESULT status is disabled EXPECTED RESULT correct status and rules shown. SOFTWARE/OS VERSIONS Operating System: Arch Linux KDE Plasma Version: 6.0.4 KDE Frameworks Version: 6.1.0 Qt Version: 6.7.0 Kernel Version: 6.8.7-arch1-2 (64-bit) Graphics Platform: Wayland Processors: 12 × AMD Ryzen 5 PRO 6650U with Radeon Graphics Memory: 30.7 GiB of RAM Graphics Processor: AMD Radeon Graphics Manufacturer: HP Product Name: HP EliteBook 845 14 inch G9 Notebook PC System Version: SBKPF ADDITIONAL INFORMATION ``` ● firewalld.service - firewalld - dynamic firewall daemon Loaded: loaded (/usr/lib/systemd/system/firewalld.service; enabled; preset: disabled) Active: active (running) since Tue 2024-04-30 05:59:04 -03; 2h 24min ago Docs: man:firewalld(1) Main PID: 715 (firewalld) Tasks: 2 (limit: 37657) Memory: 55.8M (peak: 57.4M) CPU: 346ms CGroup: /system.slice/firewalld.service └─715 /usr/bin/python /usr/bin/firewalld --nofork --nopid Apr 30 05:59:03 systemd[1]: Starting firewalld - dynamic firewall daemon... Apr 30 05:59:04 systemd[1]: Started firewalld - dynamic firewall daemon. ``` no other backends available ``` # systemctl status ufw.service Unit ufw.service could not be found. ``` about screen for firewall settings panel shows: Backend: firewalld Version: 2.1.1 nft frontends installed on system: iptables-nft, nftables, firewalld. $ iptables --list Chain INPUT (policy ACCEPT) target prot opt source destination Chain FORWARD (policy ACCEPT) target prot opt source destination Chain OUTPUT (policy ACCEPT) target prot opt source destination $ firewall-cmd --get-active-zones public (default) interfaces: wifi $ firewall-cmd --info-zone=public public (default, active) target: default ingress-priority: 0 egress-priority: 0 icmp-block-inversion: no interfaces: wlp1s0 sources: services: dhcpv6-client ssh portknock exitlesstornode wg8 ports: protocols: forward: yes masquerade: no forward-ports: source-ports: icmp-blocks: rich rules: -- You are receiving this mail because: You are watching all bug changes.