Package: iptables Version: 1.6.2-1.1~bpo9+1 Severity: important Dear Maintainer,
*** Reporter, please consider answering these questions, where appropriate *** * What led up to the situation? * What exactly did you do (or not do) that was effective (or ineffective)? * What was the outcome of this action? * What outcome did you expect instead? *** End of the template - remove these template lines *** -- System Information: Debian Release: buster/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 4.15.0-1-amd64 (SMP w/1 CPU core) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init) LSM: AppArmor: enabled iptables recommends no packages. iptables 1.8 ufw ufw (0.35-6) Versions of packages iptables suggests: ii kmod 25-1 -- no debconf information Errors: - ufw off on boot - ufw enable echos icmp errors - if manual remove icmp rules then ufw echos logging errors - on kernel 4.18 debian_amd64 System hang on boot cause all internal Sockets blocked Workaround: downgrade iptables to 1.6! This is a major bug cause open doors! Automatic Updated Systems under attack!