Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#30419 - [iptables] comments no longer working as expected
Attached to Project:
Arch Linux
Opened by Adrian C. (anrxc) - Saturday, 23 June 2012, 20:07 GMT
Last edited by Evangelos Foutras (foutrelis) - Wednesday, 25 July 2012, 06:41 GMT
Opened by Adrian C. (anrxc) - Saturday, 23 June 2012, 20:07 GMT
Last edited by Evangelos Foutras (foutrelis) - Wednesday, 25 July 2012, 06:41 GMT
|
DetailsHello performed this upgrade and noticed comments in my iptables rules are broken:
[2012-06-22 16:26] upgraded iptables (1.4.13-1 -> 1.4.14-2) Additional info: # iptables --list -n | head Chain INPUT (policy DROP) target prot opt source destination ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED DROP all -- 192.168.0.2 0.0.0.0/0 /* --comment */ DROP all -- 192.168.0.13 0.0.0.0/0 /* --comment */ Original rules: # head /etc/iptables/iptables.rules *filter :INPUT DROP [1:36] :FORWARD DROP [0:0] :OUTPUT ACCEPT [0:0] -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT -A INPUT -s 192.168.0.2/32 -m comment --comment "Angmar MS-Windows" -j DROP -A INPUT -s 192.168.0.13/32 -m comment --comment "Phobos MS-Windows" -j DROP Now for the most interesting part, convert firewall back to rules: # iptables-save # Generated by iptables-save v1.4.14 on Sat Jun 23 22:01:55 2012 *filter :INPUT DROP [0:0] :FORWARD DROP [0:0] :OUTPUT ACCEPT [1507:240667] -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT -A INPUT -s 192.168.0.2/32 -m comment --comment --comment -j DROP -A INPUT -s 192.168.0.13/32 -m comment --comment --comment -j DROP |
This task depends upon
Closed by Evangelos Foutras (foutrelis)
Wednesday, 25 July 2012, 06:41 GMT
Reason for closing: Fixed
Additional comments about closing: iptables 1.4.14-3 includes fryasu's patch from the upstream bug report.
Wednesday, 25 July 2012, 06:41 GMT
Reason for closing: Fixed
Additional comments about closing: iptables 1.4.14-3 includes fryasu's patch from the upstream bug report.
-A INPUT -s 192.168.0.2/32 -m comment --comment Angmar -j DROP
I suppose it did work in the previous version? If so I suppose this is an upstream regression. In that case please open a bug report upstream and link it here.
Which seems to have been reported upstream: http://bugzilla.netfilter.org/show_bug.cgi?id=782
Thank you.