[Bug 627890] New: upgrade 11.2 to 11.3 SuSEfirewall2: Error: iptables-batch failed, re-running using iptables
http://bugzilla.novell.com/show_bug.cgi?id=627890 http://bugzilla.novell.com/show_bug.cgi?id=627890#c0 Summary: upgrade 11.2 to 11.3 SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Classification: openSUSE Product: openSUSE 11.3 Version: Final Platform: i586 OS/Version: openSUSE 11.3 Status: NEW Severity: Normal Priority: P5 - None Component: Installation AssignedTo: bnc-team-screening@forge.provo.novell.com ReportedBy: ndordea@computer.org QAContact: jsrain@novell.com Found By: --- Blocker: --- User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.2.8) Gecko/20100723 SUSE/3.6.8-0.1.1 Firefox/3.6.8 GTB5 Upgrade opensuse 11.2 to opensuse 11.3 After a boot, checking the logs I noticed these messages ( below) cat /var/log/messages | grep iptab Jul 28 10:54:26 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 28 10:54:57 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 28 15:21:07 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 28 15:22:14 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 28 16:03:35 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 28 16:04:20 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 28 17:02:52 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 28 17:12:02 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 28 18:30:12 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 28 19:09:31 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 28 19:10:25 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 28 19:50:22 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 28 19:52:40 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 28 20:06:34 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 28 20:07:29 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 29 10:27:40 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 29 10:39:34 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 30 09:28:26 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 30 09:37:29 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 30 16:25:58 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 30 16:26:45 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 30 17:51:02 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 30 17:53:12 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 31 10:13:40 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 31 10:22:52 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 31 11:04:18 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 31 11:05:56 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 31 11:36:29 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 31 11:37:07 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 31 11:54:08 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 31 11:55:21 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 31 18:53:13 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 31 18:57:42 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Aug 1 10:50:38 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Aug 1 11:11:11 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Aug 1 13:50:09 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Aug 1 13:50:55 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Aug 2 10:07:34 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Aug 2 10:56:19 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Aug 2 10:56:46 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Aug 2 11:14:39 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Aug 2 11:15:15 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Aug 2 18:56:30 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Aug 2 18:58:46 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Aug 3 09:34:48 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Aug 3 09:36:05 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Reproducible: Always Steps to Reproduce: 1. 2. 3. Actual Results: rocco@SuSE4Rocco:~> cat /var/log/messages | grep iptab Jul 28 10:54:26 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 28 10:54:57 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 28 15:21:07 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 28 15:22:14 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 28 16:03:35 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 28 16:04:20 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 28 17:02:52 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 28 17:12:02 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 28 18:30:12 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 28 19:09:31 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 28 19:10:25 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 28 19:50:22 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 28 19:52:40 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 28 20:06:34 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 28 20:07:29 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 29 10:27:40 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 29 10:39:34 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 30 09:28:26 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 30 09:37:29 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 30 16:25:58 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 30 16:26:45 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 30 17:51:02 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 30 17:53:12 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 31 10:13:40 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 31 10:22:52 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 31 11:04:18 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 31 11:05:56 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 31 11:36:29 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 31 11:37:07 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 31 11:54:08 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 31 11:55:21 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 31 18:53:13 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Jul 31 18:57:42 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Aug 1 10:50:38 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Aug 1 11:11:11 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Aug 1 13:50:09 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Aug 1 13:50:55 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Aug 2 10:07:34 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Aug 2 10:56:19 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Aug 2 10:56:46 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Aug 2 11:14:39 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Aug 2 11:15:15 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Aug 2 18:56:30 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Aug 2 18:58:46 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Aug 3 09:34:48 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables Aug 3 09:36:05 SuSE4Rocco SuSEfirewall2: Error: iptables-batch failed, re-running using iptables -- Configure bugmail: http://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
http://bugzilla.novell.com/show_bug.cgi?id=627890 http://bugzilla.novell.com/show_bug.cgi?id=627890#c yang xiaoyu <xyyang@novell.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |xyyang@novell.com AssignedTo|bnc-team-screening@forge.pr |lnussel@novell.com |ovo.novell.com | -- Configure bugmail: http://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
http://bugzilla.novell.com/show_bug.cgi?id=627890 http://bugzilla.novell.com/show_bug.cgi?id=627890#c1 Ludwig Nussel <lnussel@novell.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |NEEDINFO InfoProvider| |ndordea@computer.org --- Comment #1 from Ludwig Nussel <lnussel@novell.com> 2010-08-04 08:56:11 CEST --- please run SuSEfirewall2 manually as root and post the output. -- Configure bugmail: http://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
http://bugzilla.novell.com/show_bug.cgi?id=627890 http://bugzilla.novell.com/show_bug.cgi?id=627890#c2 Nick Dordea <ndordea@computer.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEEDINFO |NEW InfoProvider|ndordea@computer.org | --- Comment #2 from Nick Dordea <ndordea@computer.org> 2010-08-04 16:09:25 UTC --- (In reply to comment #1)
please run SuSEfirewall2 manually as root and post the output. ... done .... results follow .... # SuSEfirewall2 status SuSEfirewall2: SuSEfirewall2 not active
# SuSEfirewall2 SuSEfirewall2: Setting up rules from /etc/sysconfig/SuSEfirewall2 ... SuSEfirewall2: using default zone 'ext' for interface pan0 SuSEfirewall2: batch committing... SuSEfirewall2: Firewall rules successfully set # SuSEfirewall2 status ### iptables filter ### Chain INPUT (policy DROP 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0 48 20786 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state ESTABLISHED 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED 0 0 input_ext all -- eth0 * 0.0.0.0/0 0.0.0.0/0 0 0 input_ext all -- wlan1 * 0.0.0.0/0 0.0.0.0/0 0 0 input_ext all -- pan0 * 0.0.0.0/0 0.0.0.0/0 0 0 input_ext all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-IN-ILL-TARGET ' 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 Chain FORWARD (policy DROP 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 PHYSDEV match --physdev-is-bridged 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-FWD-ILL-ROUTING ' Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- * lo 0.0.0.0/0 0.0.0.0/0 49 2572 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state NEW,RELATED,ESTABLISHED 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-OUT-ERROR ' Chain forward_ext (0 references) pkts bytes target prot opt in out source destination Chain input_ext (4 references) pkts bytes target prot opt in out source destination 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 PKTTYPE = broadcast 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 4 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 icmp type 8 0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 5 tcp dpt:5801 flags:0x17/0x02 LOG flags 6 level 4 prefix `SFW2-INext-ACC-TCP ' 0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:5801 0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 5 tcp dpt:5901 flags:0x17/0x02 LOG flags 6 level 4 prefix `SFW2-INext-ACC-TCP ' 0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:5901 0 0 LOG udp -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:427 state NEW limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-INext-ACC ' 0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:427 0 0 LOG udp -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:5353 state NEW limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-INext-ACC ' 0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:5353 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 PKTTYPE = multicast 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 PKTTYPE = broadcast 0 0 LOG tcp -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 5 tcp flags:0x17/0x02 LOG flags 6 level 4 prefix `SFW2-INext-DROP-DEFLT ' 0 0 LOG icmp -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-INext-DROP-DEFLT ' 0 0 LOG udp -- * * 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 5 state NEW LOG flags 6 level 4 prefix `SFW2-INext-DROP-DEFLT ' 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 Chain reject_func (0 references) pkts bytes target prot opt in out source destination 0 0 REJECT tcp -- * * 0.0.0.0/0 0.0.0.0/0 reject-with tcp-reset 0 0 REJECT udp -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable 0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-proto-unreachable ### iptables raw ### Chain PREROUTING (policy ACCEPT 50 packets, 21823 bytes) pkts bytes target prot opt in out source destination 0 0 NOTRACK all -- lo * 0.0.0.0/0 0.0.0.0/0 Chain OUTPUT (policy ACCEPT 50 packets, 2624 bytes) pkts bytes target prot opt in out source destination 0 0 NOTRACK all -- * lo 0.0.0.0/0 0.0.0.0/0 ### ip6tables filter ### Chain INPUT (policy DROP 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 0 0 ACCEPT all lo * ::/0 ::/0 0 0 ACCEPT all * * ::/0 ::/0 state ESTABLISHED 0 0 ACCEPT icmpv6 * * ::/0 ::/0 state RELATED 0 0 input_ext all eth0 * ::/0 ::/0 0 0 input_ext all wlan1 * ::/0 ::/0 0 0 input_ext all pan0 * ::/0 ::/0 0 0 input_ext all * * ::/0 ::/0 0 0 LOG all * * ::/0 ::/0 limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-IN-ILL-TARGET ' 0 0 DROP all * * ::/0 ::/0 Chain FORWARD (policy DROP 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 0 0 ACCEPT all * * ::/0 ::/0 PHYSDEV match --physdev-is-bridged 0 0 LOG all * * ::/0 ::/0 limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-FWD-ILL-ROUTING ' Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 0 0 ACCEPT all * lo ::/0 ::/0 0 0 ACCEPT icmpv6 * * ::/0 ::/0 0 0 ACCEPT all * * ::/0 ::/0 state NEW,RELATED,ESTABLISHED 0 0 LOG all * * ::/0 ::/0 limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-OUT-ERROR ' Chain forward_ext (0 references) pkts bytes target prot opt in out source destination Chain input_ext (4 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT icmpv6 * * ::/0 ::/0 ipv6-icmp type 128 0 0 ACCEPT icmpv6 * * ::/0 ::/0 ipv6-icmp type 133 0 0 ACCEPT icmpv6 * * ::/0 ::/0 ipv6-icmp type 134 0 0 ACCEPT icmpv6 * * ::/0 ::/0 ipv6-icmp type 135 0 0 ACCEPT icmpv6 * * ::/0 ::/0 ipv6-icmp type 136 0 0 ACCEPT icmpv6 * * ::/0 ::/0 ipv6-icmp type 137 0 0 LOG tcp * * ::/0 ::/0 limit: avg 3/min burst 5 tcp dpt:5801 flags:0x17/0x02 LOG flags 6 level 4 prefix `SFW2-INext-ACC-TCP ' 0 0 ACCEPT tcp * * ::/0 ::/0 tcp dpt:5801 0 0 LOG tcp * * ::/0 ::/0 limit: avg 3/min burst 5 tcp dpt:5901 flags:0x17/0x02 LOG flags 6 level 4 prefix `SFW2-INext-ACC-TCP ' 0 0 ACCEPT tcp * * ::/0 ::/0 tcp dpt:5901 0 0 LOG udp * * ::/0 ::/0 udp spt:427 state NEW limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-INext-ACC ' 0 0 ACCEPT udp * * ::/0 ::/0 udp spt:427 0 0 LOG udp * * ::/0 ::/0 udp spt:5353 state NEW limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-INext-ACC ' 0 0 ACCEPT udp * * ::/0 ::/0 udp spt:5353 0 0 LOG tcp * * ::/0 ::/0 limit: avg 3/min burst 5 tcp flags:0x17/0x02 LOG flags 6 level 4 prefix `SFW2-INext-DROP-DEFLT ' 0 0 LOG icmpv6 * * ::/0 ::/0 limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-INext-DROP-DEFLT ' 0 0 LOG udp * * ::/0 ::/0 limit: avg 3/min burst 5 state NEW LOG flags 6 level 4 prefix `SFW2-INext-DROP-DEFLT ' 0 0 DROP all * * ::/0 ::/0 Chain reject_func (0 references) pkts bytes target prot opt in out source destination 0 0 REJECT tcp * * ::/0 ::/0 reject-with tcp-reset 0 0 REJECT udp * * ::/0 ::/0 reject-with icmp6-port-unreachable 0 0 REJECT all * * ::/0 ::/0 reject-with icmp6-addr-unreachable 0 0 DROP all * * ::/0 ::/0 ### ip6tables mangle ### Chain PREROUTING (policy ACCEPT 0 packets, 0 bytes) pkts bytes target prot opt in out source destination Chain INPUT (policy ACCEPT 0 packets, 0 bytes) pkts bytes target prot opt in out source destination Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) pkts bytes target prot opt in out source destination Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) pkts bytes target prot opt in out source destination Chain POSTROUTING (policy ACCEPT 0 packets, 0 bytes) pkts bytes target prot opt in out source destination ### ip6tables raw ### Chain PREROUTING (policy ACCEPT 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 0 0 NOTRACK all lo * ::/0 ::/0 Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 0 0 NOTRACK all * lo ::/0 ::/0 -- Configure bugmail: http://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
http://bugzilla.novell.com/show_bug.cgi?id=627890 http://bugzilla.novell.com/show_bug.cgi?id=627890#c3 Ludwig Nussel <lnussel@novell.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |NEEDINFO InfoProvider| |ndordea@computer.org --- Comment #3 from Ludwig Nussel <lnussel@novell.com> 2010-08-05 09:53:05 CEST --- Looks good. No error from iptables-batch. So maybe the problem is only in a zone for which no interfaces exist atm. What event triggers those error messages in the log? The errors seem to appear in pairs with one or two minutes in between. Some dial up interface? -- Configure bugmail: http://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
http://bugzilla.novell.com/show_bug.cgi?id=627890 http://bugzilla.novell.com/show_bug.cgi?id=627890#c4 Nick Dordea <ndordea@computer.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEEDINFO |NEW InfoProvider|ndordea@computer.org | --- Comment #4 from Nick Dordea <ndordea@computer.org> 2010-08-06 00:08:54 UTC --- (In reply to comment #3)
Looks good. No error from iptables-batch. So maybe the problem is only in a zone for which no interfaces exist atm. What event triggers those error messages in the log? The errors seem to appear in pairs with one or two minutes in between. Some dial up interface?
I have not seen the message lately. It might be due to the ip provider. Lately the internet+digital phone was awful. For the time being this bug can be closed. Thanks for the help. nd -- Configure bugmail: http://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
http://bugzilla.novell.com/show_bug.cgi?id=627890 http://bugzilla.novell.com/show_bug.cgi?id=627890#c5 Ludwig Nussel <lnussel@novell.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution| |WORKSFORME --- Comment #5 from Ludwig Nussel <lnussel@novell.com> 2010-08-06 09:33:19 CEST --- ok -- Configure bugmail: http://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@novell.com