Your message dated Sun, 17 Jul 2016 04:37:56 +0000 with message-id <[email protected]> and subject line Bug#726343: fixed in shorewall 5.0.10.1-1 has caused the Debian Bug report #726343, regarding shorewall: 'service shorewall stop' actually does '/sbin/shorewall clear', NOT '/sbin/shorewall stop' to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 726343: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=726343 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Package: shorewall Version: 4.5.5.3-3 Severity: normal I can understand that Debian wants 'service foo stop' to do what Debian users expect a Debian service to do when told to "stop", not necessarily the same thing that upstream planned. I found the SAFESTOP variable in /etc/default/shorewall, which can be used to change this behavior, and that's a great solution, but ... I think this Debianized feature is a bit of a trap. After digging, I found that all I needed to know was in fact documented, but it would have been very nice if when I issued 'service shorewall stop' the output would note that shorewall's "clear" command (not "stop") is really being used. Current init script output line: echo -n "Stopping \"Shorewall firewall\": " Proposed line: echo -n "Clearing all \"Shorewall firewall\" rules: " I'd ideally like to see a reference to some documentation, or some in-line documentation, right there in the message, but I understand that lines like that should be kept to a reasonable length. I consider this a security issue (although not a vulnerability per se), as the default settings make it easy for a novice (or experienced-but-momentarily-careless) user to remove all firewall rules, allowing open access, when he intended to enter shorewall's relatively locked down "stopped" state. Shorewall has its own idea of what it means to "stop", so if we're going to do something different when a user, in principle, yells out, "Hey shorewall, stop!", I think we should at least make it as clear as possible what we really did. I'll also note the name of the variable SAFESTOP. The name implies, "Set this option if you want 'stop' to be 'safe'." The impression I get is that the "stop" action is, by default, UNsafe. (That may be a bit of a stretch, but I thought I'd throw it out there.) -- System Information: Debian Release: 7.1 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable') Architecture: i386 (i686) Kernel: Linux 3.2.0-4-686-pae (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages shorewall depends on: ii bc 1.06.95-2 ii debconf [debconf-2.0] 1.5.49 ii iproute 20120521-3+b3 ii iptables 1.4.14-3.1 ii perl-modules 5.14.2-21 ii shorewall-core 4.5.5.3-3 shorewall recommends no packages. Versions of packages shorewall suggests: ii linux-image-3.2.0-4-686-pae [linux-image] 3.2.46-1+deb7u1 pn make <none> pn shorewall-doc <none> -- Configuration Files: /etc/default/shorewall changed: startup=1 OPTIONS="" STARTOPTIONS="" RESTARTOPTIONS="" INITLOG=/dev/null SAFESTOP=1 /etc/shorewall/params [Errno 13] Permission denied: u'/etc/shorewall/params' /etc/shorewall/shorewall.conf changed: STARTUP_ENABLED=Yes VERBOSITY=1 BLACKLIST_LOGLEVEL= LOG_MARTIANS=Yes LOG_VERBOSITY=2 LOGALLNEW= LOGFILE=/var/log/messages LOGFORMAT="Shorewall:%s:%s:" LOGTAGONLY=No LOGLIMIT= MACLIST_LOG_LEVEL=info RELATED_LOG_LEVEL= SFILTER_LOG_LEVEL=info SMURF_LOG_LEVEL=info STARTUP_LOG=/var/log/shorewall-init.log TCP_FLAGS_LOG_LEVEL=info CONFIG_PATH="${CONFDIR}/shorewall:${SHAREDIR}/shorewall" GEOIPDIR=/usr/share/xt_geoip/LE IPTABLES= IP= IPSET= LOCKFILE= MODULESDIR= PATH="/sbin:/bin:/usr/sbin:/usr/bin:/usr/local/bin:/usr/local/sbin" PERL=/usr/bin/perl RESTOREFILE=restore SHOREWALL_SHELL=/bin/sh SUBSYSLOCK="" TC= ACCEPT_DEFAULT=none DROP_DEFAULT=Drop NFQUEUE_DEFAULT=none QUEUE_DEFAULT=none REJECT_DEFAULT=Reject RCP_COMMAND='scp ${files} ${root}@${system}:${destination}' RSH_COMMAND='ssh ${root}@${system} ${command}' ACCOUNTING=Yes ACCOUNTING_TABLE=filter ADD_IP_ALIASES=No ADD_SNAT_ALIASES=No ADMINISABSENTMINDED=No AUTO_COMMENT=Yes AUTOMAKE=No BLACKLISTNEWONLY=Yes CLAMPMSS=No CLEAR_TC=Yes COMPLETE=No DELETE_THEN_ADD=Yes DETECT_DNAT_IPADDRS=No DISABLE_IPV6=Yes DONT_LOAD= DYNAMIC_BLACKLIST=Yes EXPAND_POLICIES=Yes EXPORTMODULES=Yes FASTACCEPT=No FORWARD_CLEAR_MARK= IMPLICIT_CONTINUE=No IPSET_WARNINGS=Yes IP_FORWARDING=Keep KEEP_RT_TABLES=No LEGACY_FASTSTART=Yes LOAD_HELPERS_ONLY=No MACLIST_TABLE=filter MACLIST_TTL= MANGLE_ENABLED=Yes MAPOLDACTIONS=No MARK_IN_FORWARD_CHAIN=No MODULE_SUFFIX=ko MULTICAST=No MUTEX_TIMEOUT=60 NULL_ROUTE_RFC1918=No OPTIMIZE=0 OPTIMIZE_ACCOUNTING=No REQUIRE_INTERFACE=No RESTORE_DEFAULT_ROUTE=Yes RETAIN_ALIASES=No ROUTE_FILTER=Yes SAVE_IPSETS=No TC_ENABLED=Internal TC_EXPERT=No TC_PRIOMAP="2 3 3 3 2 3 1 1 2 2 2 2 2 2 2 2" TRACK_PROVIDERS=No USE_DEFAULT_RT=No USE_PHYSICAL_NAMES=No ZONE2ZONE=2 BLACKLIST_DISPOSITION=DROP MACLIST_DISPOSITION=REJECT RELATED_DISPOSITION=ACCEPT SMURF_DISPOSITION=DROP SFILTER_DISPOSITION=DROP TCP_FLAGS_DISPOSITION=DROP TC_BITS= PROVIDER_BITS= PROVIDER_OFFSET= MASK_BITS= ZONE_BITS=0 IPSECFILE=zones -- debconf information: shorewall/dont_restart: shorewall/major_release: shorewall/invalid_config: -- Aaron Bugher IT Support Specialist Geophysical Fluid Dynamics Institute
--- End Message ---
--- Begin Message ---Source: shorewall Source-Version: 5.0.10.1-1 We believe that the bug you reported is fixed in the latest version of shorewall, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [email protected], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Roberto C. Sanchez <[email protected]> (supplier of updated shorewall package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [email protected]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Sat, 16 Jul 2016 23:40:05 -0400 Source: shorewall Binary: shorewall Architecture: source all Version: 5.0.10.1-1 Distribution: unstable Urgency: medium Maintainer: Roberto C. Sanchez <[email protected]> Changed-By: Roberto C. Sanchez <[email protected]> Description: shorewall - Shoreline Firewall, netfilter configurator Closes: 726343 830110 830881 Changes: shorewall (5.0.10.1-1) unstable; urgency=medium . * New Upstream Version (Closes: #830110, #726343) * Use a more reliable check for systemd (Closes: #830881) Checksums-Sha1: 4d465ca0335a15c0e19da6ba20a5e6f33625e30a 1868 shorewall_5.0.10.1-1.dsc cb325d41fa1c1c323f05ae92ffe866eb17885df4 789820 shorewall_5.0.10.1.orig.tar.gz ede955dd5d75d2897fc70e7912404f0010762138 35232 shorewall_5.0.10.1-1.debian.tar.xz 9bfbd6ce3eee02728ab715c74d13e7b4756ed902 726942 shorewall_5.0.10.1-1_all.deb Checksums-Sha256: e6bd9c9c9cdf90eb6ed703b70942f3bde4ab96d6aeb8fd1f72f7396536fc9cb7 1868 shorewall_5.0.10.1-1.dsc 5a79e4cb934fb1162c8e3a66789adf85dbd8f38acd170a23f8bcc966ad55dc3d 789820 shorewall_5.0.10.1.orig.tar.gz 201f221742dfafc48f1b00d320a31f2292bcfed857e4b16b46f2dd1198f47a85 35232 shorewall_5.0.10.1-1.debian.tar.xz 5664ac38f4ab974b18150d3a29950a14729e7e0fbcbb7308389f7e8b65cdaa8b 726942 shorewall_5.0.10.1-1_all.deb Files: 90a937dc1ea8e7ccaa75a31c67b514d4 1868 net optional shorewall_5.0.10.1-1.dsc f001106919e35e28de0e9836ea017ec4 789820 net optional shorewall_5.0.10.1.orig.tar.gz 5788e48a17e05cd49b567288cae48e2d 35232 net optional shorewall_5.0.10.1-1.debian.tar.xz 02e05beb6cd6aad3d4a2ae6e07d86f78 726942 net optional shorewall_5.0.10.1-1_all.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJXiwPfAAoJECzXeF7dp7IPfkwP/RZohDaBRxNZjiqYXSeakoo2 n3zXYpoBm/pa3XDlw+Bhkoh2Mc7GCAKeOB4hAiQKB4VXEfVwPmGLeAkbByWUQhVX Ydj3DOD+4w0r/HuOxox09WyUdFPTrkcc2UgfnYhMbjzMPuDYBaPB0vDaaKaEFaE9 D84R1LbkMN5NL5buiCo/leXd/ZNY6ooBh8ky/cqQ11aev7n7hLH7cO4G3M6C5X5t /Y+CL6xXdeMoy0KAoG/rlI49pdIk3kFec5EMIGLMUogqLJSi475M1RlVXAtxvvoD 9FeulMn/k4FOx1VA+n+uWTZIkAfpUMDqQOy2THwgOBVcLhDjtn0Zp4ZgNRWkwxVx AMZnTDDUJmKJZ5GX2wTbnghGHK9/GkdQN7/+68VIjoeVBwp6cRLt/icxhWBHtpEW dxBAFufRdfQVHOTtZvdwJGdUL0H9YDEwBkE8EmkSNBOQB3tPwXmWvcN1oDHCN1WV A3pESZabKdlleUD8Pc7/uocSF2WjmhIimSvnXuyvSq5vFxRiqWy2ntnhGc54Tdxq UczlysLEZ242DjriS52usgFnFbFOJZRnGtNR740pMbtxl9rb99fU5jo8Mq2TDpYI 4tr9kzOzzizkrGdZoEz6Xo77ufT4O1u5N/HLYjQpNmEsMBc28gaedaPwDYViZjTz ykrYuyrbHV1h7ujbmG8s =N2oC -----END PGP SIGNATURE-----
--- End Message ---

