Your message dated Thu, 17 Apr 2025 17:57:59 +0200
with message-id <sa6cydalr08....@hjemme.reinholdtsen.name>
and subject line Re: opensnitch: Upstream change enables ebpf compilation
has caused the Debian Bug report #1037006,
regarding opensnitch: Explicitly use 'proc' fallback by default
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
1037006: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1037006
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: opensnitch
Version: 1.5.8.1-1+b2
Severity: wishlist
Tags: upstream
Dear Maintainer,
OpenSnitch in Debian is currently incompatible with (some?) kernel space
network tools such as wireguard and NFS. These are entirely unusable so
long as the opensnitchd service is running. An eBPF module is required
when the user does not wish to completely block such traffic, but until
recently the upstream build process could not be included in Debian. [0]
The following information may be helpful for determining whether this
change is small enough to include in a bookworm point release.
I have confirmed this works with the package version mentioned above.
Any new files are from the tree at commit 11baad0. [1]
- Replace "ebpf_prog/Makefile" with the newer file and delete unknown
targets (" opensnitch-procs.o opensnitch-dns.o") on line 30.
- Remove "ebpf_prog/file.patch" since it is no longer needed.
- Add directory "ebpf_prog/bpf_headers" containing 4 upstream files.
- Rename "ebpf_prog/bpf_headers" to "ebpf_prog/bpf" for compatibility.
With the appropriate linux-headers package installed, it should now be
possible to run 'make' in the "ebpf_prog" directory and copy the
resulting "opensnitch.o" file to "/etc/opensnitchd/". (The non-standard
location is fixed upstream and will be deprecated in a future release.)
[0] https://people.skolelinux.org/pere/blog/tags/opensnitch/
[1] https://github.com/evilsocket/opensnitch/tree/
11baad083d5396f4d30af5ce5b1ae6ad80bb5478
-- System Information:
Debian Release: 12.0
APT prefers testing-security
APT policy: (500, 'testing-security'), (500, 'testing')
Architecture: amd64 (x86_64)
Kernel: Linux 6.1.0-9-amd64 (SMP w/4 CPU threads; PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE
not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
Versions of packages opensnitch depends on:
ii libc6 2.36-9
ii libnetfilter-queue1 1.0.5-3
ii libnfnetlink0 1.0.2-2
Versions of packages opensnitch recommends:
ii python3-opensnitch-ui 1.5.8.1-1
--- End Message ---
--- Begin Message ---
Version: 1.5.9-1
I no longer believe setting proc as the fallback is needed nor useful,
as the daemon will automaticalla fall back to using proc if ebpf is
unavailable.
The 1.5.9-1 is picked fairly randomly as the first upload after
1.5.8.1-1, to get a semi-sensible version distribution in BTS.
The 1.6.8 version currently in experimental seem to work well with ebpf,
and I hope to get it into Trixie before the freeze.
--
Happy hacking
Petter Reinholdtsen
--- End Message ---