I cannot reproduce this. Getting back to a known state: $ grep IPV6 /etc/default/ufw IPV6=no $ sudo ufw reset ... $ sudo ufw enable Firewall is active and enabled on system startup $ sudo ufw status Status: active $ sudo ip6tables -L INPUT -v Chain INPUT (policy DROP 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 0 0 ACCEPT all lo any anywhere anywhere
Ok, the firewall is now enabled without IPV6 support, and all IPV6 traffic on the loopback is accepted. This is expected and by design. Let's add IPv6: $ grep IPV6 /etc/default/ufw IPV6=yes $ sudo ufw reset ... $ sudo ufw enable Firewall is active and enabled on system startup $ sudo ufw status Status: active $ sudo ip6tables -L INPUT -v Chain INPUT (policy DROP 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 0 0 ACCEPT all lo any anywhere anywhere 0 0 ufw6-before-logging-input all any any anywhere anywhere 0 0 ufw6-before-input all any any anywhere anywhere 0 0 ufw6-after-input all any any anywhere anywhere 0 0 ufw6-after-logging-input all any any anywhere anywhere 0 0 ufw6-reject-input all any any anywhere anywhere 0 0 ufw6-track-input all any any anywhere anywhere $ sudo ufw allow OpenSSH Rule added Rule added (v6) $ sudo ufw status Status: active To Action From -- ------ ---- OpenSSH ALLOW Anywhere OpenSSH (v6) ALLOW Anywhere (v6) $ sudo ip6tables -L ufw6-user-input Chain ufw6-user-input (1 references) target prot opt source destination ACCEPT tcp anywhere anywhere tcp dpt:ssh /* 'dapp_OpenSSH' */ Can you run the above commands and see if you have different results? -- ufw breaks ipv6 https://bugs.launchpad.net/bugs/633044 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs