Your message dated Thu, 15 Nov 2018 11:51:02 +0000
with message-id <e1gngao-0001te...@fasolo.debian.org>
and subject line Bug#913114: fixed in iptables 1.8.2-1
has caused the Debian Bug report #913114,
regarding iptables 1.8 with ufw latest broken Firewall on boot
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
913114: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913114
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: iptables
Version: 1.6.2-1.1~bpo9+1
Severity: important

Dear Maintainer,

*** Reporter, please consider answering these questions, where appropriate ***

   * What led up to the situation?
   * What exactly did you do (or not do) that was effective (or
     ineffective)?
   * What was the outcome of this action?
   * What outcome did you expect instead?

*** End of the template - remove these template lines ***


-- System Information:
Debian Release: buster/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.15.0-1-amd64 (SMP w/1 CPU core)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), 
LANGUAGE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)
LSM: AppArmor: enabled

iptables recommends no packages.

iptables 1.8
ufw ufw (0.35-6) 


Versions of packages iptables suggests:
ii  kmod  25-1




-- no debconf information

Errors:
- ufw off on boot
- ufw enable echos icmp errors 
- if manual remove icmp rules then ufw echos logging errors

- on kernel 4.18 debian_amd64 System hang on boot cause all internal Sockets 
blocked

Workaround:

downgrade iptables to 1.6!

This is a major bug cause open doors!
Automatic Updated Systems under attack!

--- End Message ---
--- Begin Message ---
Source: iptables
Source-Version: 1.8.2-1

We believe that the bug you reported is fixed in the latest version of
iptables, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 913...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Arturo Borrero Gonzalez <art...@debian.org> (supplier of updated iptables 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 15 Nov 2018 12:33:36 +0100
Source: iptables
Binary: iptables iptables-dev libxtables12 libxtables-dev libiptc0 libiptc-dev 
libip4tc0 libip4tc-dev libip6tc0 libip6tc-dev
Architecture: source
Version: 1.8.2-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Netfilter Packaging Team 
<pkg-netfilter-t...@lists.alioth.debian.org>
Changed-By: Arturo Borrero Gonzalez <art...@debian.org>
Description:
 iptables   - administration tools for packet filtering and NAT
 iptables-dev - transitional dummy package
 libip4tc-dev - Development files for libip4tc
 libip4tc0  - netfilter libip4tc library
 libip6tc-dev - Development files for libip6tc
 libip6tc0  - netfilter libip6tc library
 libiptc-dev - Development files for libiptc
 libiptc0   - netfilter libiptc library
 libxtables-dev - netfilter xtables library -- development files
 libxtables12 - netfilter xtables library
Closes: 816087 911899 912607 912610 912981 913088 913114 913742
Changes:
 iptables (1.8.2-1) unstable; urgency=medium
 .
   * This upstream release closes several bugs:
     Closes: #913742
     Closes: #913114
     Closes: #816087
     Closes: #913088
     Closes: #912607
     Closes: #912610
   * [0309474] New upstream version 1.8.2
   * [5d3a638] d/t/control: replace compat names with nft ones
   * [31d2d6e] d/NEWS: fix typos (Closes: #912981)
   * [b24cf92] iptables: don't ship paths served by update-alternatives
     (Closes: #911899)
   * [f5ec47b] d/patches: cherry-pick 
format-security_fixes_in_libip[6]t_icmp.patch
   * [2017f99] d/libxtables12.symbols: add new symbols
Checksums-Sha1:
 9bcfcdd9f0979d0db68caa4942dac4919b58b913 2699 iptables_1.8.2-1.dsc
 215c4ef4c6cd29ef0dd265b4fa5ec51a4f930c92 679858 iptables_1.8.2.orig.tar.bz2
 4fc5f0f79a1b1c5b1a231a5a4da2c36e3ea2f848 64348 iptables_1.8.2-1.debian.tar.xz
 1970a72fd294c8f9826f0e7231d799c188b75f02 9036 iptables_1.8.2-1_amd64.buildinfo
Checksums-Sha256:
 24d39c7cd9e9536c7e65b76c7e283d109684c4f25c9eefbc22be581a342f4cc9 2699 
iptables_1.8.2-1.dsc
 a3778b50ed1a3256f9ca975de82c2204e508001fc2471238c8c97f3d1c4c12af 679858 
iptables_1.8.2.orig.tar.bz2
 52eca8f1ea202addf1c53b77110031155cdc661abe72ba7400b6b6c0914d9044 64348 
iptables_1.8.2-1.debian.tar.xz
 84b1a46d35503ec0b35e33aed7c5c0767007885757bdb7c1ba0bf30825e2e570 9036 
iptables_1.8.2-1_amd64.buildinfo
Files:
 af84c8d6866471a46b1e9a8ea67c0204 2699 net important iptables_1.8.2-1.dsc
 944558e88ddcc3b9b0d9550070fa3599 679858 net important 
iptables_1.8.2.orig.tar.bz2
 01ce00c6a90f4683fde2447947a00de4 64348 net important 
iptables_1.8.2-1.debian.tar.xz
 0b6c0a4c65796c6067dc46f79e371d8f 9036 net important 
iptables_1.8.2-1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=zTdU
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to