This bug was fixed in the package ufw - 0.21
---
ufw (0.21) intrepid; urgency=low
* add confirmation on enable when running under ssh (LP: #253840)
* don't reload the firewall on 'app update' when running under ssh
* update ufw.pot
* fix some pygettext errors
* warn if profi
Fix committed to trunk.
** Changed in: ufw (Ubuntu)
Status: Confirmed => Fix Committed
--
ufw should detect if the command being given will cut off SSH access and warn
if the user is connected via SSH.
https://bugs.launchpad.net/bugs/253840
You received this bug notification because you
Thank you for using Ubuntu and taking the time to report a bug. ufw
tries to be careful not to flush the chains, and will not do so if it is
possible to simply add a rule to a chain. Changing the default policy
(ie 'ufw default deny') is one of those commands that requires flushing
the chains. Howe