On Tue, 27 Aug 2019, Eloi Coutant wrote:

> Hi,
> 
> Thanks for coming back to me about this issue. Unfortunately, as it was too
> critical an issue to keep in "prod" (on a self-hosted server), I chose to
> switch to another firewall controller.

No worries, the information you provided lets me know that you would see
the issue without this fix:

https://git.launchpad.net/ufw/commit/?id=569edf283bd18c5816f980b8480cf02f1d1ead03

This will be fixed in the next ufw upload.

> 
> I had the following custom apps:
> 
> [OpenSSH600]
> title=Secure shell server, an rshd replacement
> description=OpenSSH is a free implementation of the Secure Shell protocol.
> ports=600/tcp
> 
> [Mail]
> title=AnBuCo Mail
> description=Dovecot+Postfix+Sieve
> ports=143,993,25,465,587,4190/tcp
> 
> [F2BMail]
> title= Fail2ban Mail
> description=Dovecot+Postfix+Sieve
> ports=143,993,25,465,587,4190/tcp
> 
> [F2BRecidive]
> title=Fail2ban recidive
> description=close all connections
> ports=143,993,25,465,587,41910,600/tcp
> 
> and the rules were enabled like so:
> # ufw allow in OpenSSH600
> # ufw allow out OpenSSH600
> # ufw allow in Mail
> # ufw allow out Mail
> # ufw allow in 'Nginx Full'
> # ufw allow out 'Nginx Full'
> # ufw allow out DNS
> 
> The "F2BXXXX" rules were added and deleted by fail2ban using the default
> /etc/fail2ban/action.d/ufw.conf actions.
> 
> Skipping the fail2ban rules, 'ufw status verbose' was returning when running
> well:
> 
> > 80,443/tcp (Nginx Full)    ALLOW IN    Anywhere
> > 8080/tcp (WWW Cache)       ALLOW IN    Anywhere
> > 53 (DNS)                   ALLOW IN    Anywhere
> > 123/udp                    ALLOW IN    Anywhere         # NTP
> > 24441                      ALLOW IN    Anywhere         # Pyzor
> > 873/tcp                    ALLOW IN    Anywhere         # Rsync
> > 137,138/udp (Samba)        ALLOW IN    Anywhere
> > 139,445/tcp (Samba)        ALLOW IN    Anywhere
> > 600/tcp (OpenSSH600)       ALLOW IN    Anywhere
> > 25,143,465,587,993,4190/tcp (Mail) ALLOW IN    Anywhere
> > 67/udp                     ALLOW IN    Anywhere
> > 68/udp                     ALLOW IN    Anywhere
> >
> > 123/udp                    ALLOW OUT   Anywhere          # NTP
> > 2703/tcp                   ALLOW OUT   Anywhere          # Razor
> > 7/tcp                      ALLOW OUT   Anywhere          # Razor
> > 24441                      ALLOW OUT   Anywhere          # Pyzor
> > 11371                      ALLOW OUT   Anywhere          # GPG Keys
> > 873/tcp                    ALLOW OUT   Anywhere          # Rsync
> > 67/udp                     ALLOW OUT   Anywhere
> > 68/udp                     ALLOW OUT   Anywhere
> > 25,143,465,587,993,4190/tcp (Mail) ALLOW OUT   Anywhere
> > 80,443/tcp (Nginx Full)    ALLOW OUT   Anywhere
> > 53 (DNS)                   ALLOW OUT   Anywhere
> > 137,138/udp (Samba)        ALLOW OUT   Anywhere
> > 139,445/tcp (Samba)        ALLOW OUT   Anywhere
> 
> 
> Some rules disappeared while other stayed when 'ufw app update all' was
> triggered. I cannot unfortunately tell you precisely which apps were
> deleted; my logs seem to indicate that it was in majority outgoing rules for
> 'Nginx Full', 'DNS' and 'Mail'.
> 
> Sorry if I cannot be more helpful, the issue was in my opinion a bit too
> critical to continue with ufw at the time.
> 
> Cheers
> Eloi
> 
> Le 25/08/2019 à 20:48, Jamie Strandboge a écrit :
> > I believe this will be fixed with this:
> > https://git.launchpad.net/ufw/commit/?id=569edf283bd18c5816f980b8480cf02f1d1ead03
> > 
> > However there isn't enough information in this bug report to be sure.
> > Can you provide the full list of ufw app rules in the order you add them
> > for any rules that reference Nginx Full, DNS and Mail? You can send that
> > to me privately if you prefer.
> > 
> > Thanks!
> > 
-- 
Jamie Strandboge             | http://www.canonical.com

Attachment: signature.asc
Description: PGP signature

Reply via email to