Your message dated Tue, 10 Jan 2017 22:01:34 +0000
with message-id <[email protected]>
and subject line Bug#849628: fixed in ufw 0.35-3
has caused the Debian Bug report #849628,
regarding ufw: FTBFS: Command '--dry-run route allow ssh/udp' exited with '1',
but expected '0'
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
849628: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=849628
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: ufw
Version: 0.35-2
Severity: serious
Justification: fails to build from source
User: [email protected]
Usertags: ftbfs
X-Debbugs-Cc: [email protected]
Dear Maintainer,
ufw fails to build from source in unstable/amd64:
[…]
test_get_iptables_version (tests.unit.test_util.UtilTestCase)
Test get_iptables_version() ... ok
test_get_netfilter_capabilities (tests.unit.test_util.UtilTestCase)
Test get_netfilter_capabilities() ... ok
test_get_netstat_output (tests.unit.test_util.UtilTestCase)
Test get_netstat_output() ... (TODO: fake-netstat) could not find tcp in:
(TODO: fake-netstat) could not find udp in:
(TODO: fake-netstat) could not find tcp in:
(TODO: fake-netstat) could not find udp in:
ok
test_get_ppid (tests.unit.test_util.UtilTestCase)
Test get_ppid() ... ok
test_get_services_proto (tests.unit.test_util.UtilTestCase)
Test get_services_proto() ... ok
test_hex_decode (tests.unit.test_util.UtilTestCase)
Test hex_decode() output ... ok
test_hex_encode (tests.unit.test_util.UtilTestCase)
Test hex_encode() output ... ok
test_human_sort (tests.unit.test_util.UtilTestCase)
Test human_sort() ... ok
test_in_network (tests.unit.test_util.UtilTestCase)
Test in_network() ... ok
test_msg (tests.unit.test_util.UtilTestCase)
Test msg() ... test msg()
('test msg()' output is intentional)
test msg()
('test msg()' output is intentional)
ok
test_normalize_address_host_netmask (tests.unit.test_util.UtilTestCase)
Test normalize_address() with host_netmask ... ok
test_normalize_address_invalid_netmask (tests.unit.test_util.UtilTestCase)
Test normalize_address() with invalid_netmask ... ok
test_normalize_address_ipv6_cidr (tests.unit.test_util.UtilTestCase)
Test normalize_address() with ipv6_cidr ... ok
test_normalize_address_ipv6_short_notation (tests.unit.test_util.UtilTestCase)
Test normalize_address() with ipv6_short_notation ... ok
test_normalize_address_netmask_to_cidr (tests.unit.test_util.UtilTestCase)
Test normalize_address() with netmask_to_cidr ... ok
test_normalize_address_valid_netmask_to_non_cidr
(tests.unit.test_util.UtilTestCase)
Test normalize_address() with valid_netmask_to_non_cidr ... ok
test_open_file_read (tests.unit.test_util.UtilTestCase)
Test open_file_read() ... ok
test_open_files (tests.unit.test_util.UtilTestCase)
Test open_files() ... ok
test_parse_netstat_output (tests.unit.test_util.UtilTestCase)
Test parse_netstat_output() ... ok
test_parse_port_proto (tests.unit.test_util.UtilTestCase)
Test parse_port_proto() ... ok
test_under_ssh (tests.unit.test_util.UtilTestCase)
Test under_ssh() ... WARN: Couldn't find pid (is /proc mounted?)
ok
test_valid_address (tests.unit.test_util.UtilTestCase)
Test valid_address() ... ok
test_valid_address4 (tests.unit.test_util.UtilTestCase)
Test valid_address4() ... ok
test_valid_address6 (tests.unit.test_util.UtilTestCase)
Test valid_address6() ... WARN: python does not have IPv6 support.
(IPv6 support warning is intentional)
ok
test_valid_netmask (tests.unit.test_util.UtilTestCase)
Test valid_netmask() ... ok
test_warn (tests.unit.test_util.UtilTestCase)
Test warn() ... WARN: test warn()
('WARN: test warn()' output is intentional)
ok
test_word_wrap (tests.unit.test_util.UtilTestCase)
Test word_wrap() ... ok
test_wrap_text (tests.unit.test_util.UtilTestCase)
Test wrap_text() ... ok
test_write_to_file (tests.unit.test_util.UtilTestCase)
Test write_to_file() ... ok
----------------------------------------------------------------------
Ran 45 tests in 0.301s
OK
------------------
Unit tests summary
------------------
Total=8 (Passed=8, Failed=0)
make[1]: Entering directory '«BUILDDIR»'
rm -rf ./build
rm -rf ./staging
rm -rf ./tests/testarea ./tests/unit/tmp
rm -rf ./tmp
rm -rf ./snap
rm -f ./locales/mo/*.mo
rm -f ./tests/unit/*.pyc ./tests/*.pyc ./src/*.pyc
rm -rf ./tests/unit/__pycache__ ./tests/__pycache__ ./src/__pycache__
rm -rf ./.coverage
rm -f ./ufw # unittest symlink
make[1]: Leaving directory '«BUILDDIR»'
= Functional Tests =
Performing tests 'installation/check_help'
- installing
- result:
PASS
Performing tests 'installation/check_root'
- installing
- result:
PASS
Performing tests 'bad/apps'
- installing
- result:
PASS
Performing tests 'bad/args'
- installing
- result:
PASS
Performing tests 'bad/netmasks'
- installing
- result:
PASS
Performing tests 'bad/policy'
- installing
- result:
PASS
Performing tests 'bugs/apps'
- installing
- result:
PASS
Performing tests 'bugs/misc'
- installing
- result:
PASS
Performing tests 'bugs/rules'
- installing
- result:
PASS
Performing tests 'good/apps'
- installing
- result:
PASS
Performing tests 'good/args'
- installing
- result:
PASS
Performing tests 'good/logging'
- installing
- result:
FAIL:
126c126
< ### tuple ### allow_log any 443 0.0.0.0/0 any 0.0.0.0/0 in
---
> ### tuple ### allow_log tcp 443 0.0.0.0/0 any 0.0.0.0/0 in
131,134d130
< -A ufw-user-logging-input -p udp --dport 443 -m conntrack --ctstate NEW -m
limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW ALLOW] "
< -A ufw-user-logging-input -p udp --dport 443 -j RETURN
< -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input
< -A ufw-user-input -p udp --dport 443 -j ACCEPT
334c330
< ### tuple ### allow_log-all any 443 0.0.0.0/0 any 0.0.0.0/0 in
---
> ### tuple ### allow_log-all tcp 443 0.0.0.0/0 any 0.0.0.0/0 in
339,342d334
< -A ufw-user-logging-input -p udp --dport 443 -m limit --limit 3/min
--limit-burst 10 -j LOG --log-prefix "[UFW ALLOW] "
< -A ufw-user-logging-input -p udp --dport 443 -j RETURN
< -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input
< -A ufw-user-input -p udp --dport 443 -j ACCEPT
542c534
< ### tuple ### deny_log any 443 0.0.0.0/0 any 0.0.0.0/0 in
---
> ### tuple ### deny_log tcp 443 0.0.0.0/0 any 0.0.0.0/0 in
547,550d538
< -A ufw-user-logging-input -p udp --dport 443 -m conntrack --ctstate NEW -m
limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] "
< -A ufw-user-logging-input -p udp --dport 443 -j RETURN
< -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input
< -A ufw-user-input -p udp --dport 443 -j DROP
750c738
< ### tuple ### deny_log-all any 443 0.0.0.0/0 any 0.0.0.0/0 in
---
> ### tuple ### deny_log-all tcp 443 0.0.0.0/0 any 0.0.0.0/0 in
755,758d742
< -A ufw-user-logging-input -p udp --dport 443 -m limit --limit 3/min
--limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] "
< -A ufw-user-logging-input -p udp --dport 443 -j RETURN
< -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input
< -A ufw-user-input -p udp --dport 443 -j DROP
966c950
< ### tuple ### limit_log any 443 0.0.0.0/0 any 0.0.0.0/0 in
---
> ### tuple ### limit_log tcp 443 0.0.0.0/0 any 0.0.0.0/0 in
973,978d956
< -A ufw-user-logging-input -p udp --dport 443 -m conntrack --ctstate NEW -m
limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW LIMIT] "
< -A ufw-user-logging-input -p udp --dport 443 -j RETURN
< -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input
< -A ufw-user-input -p udp --dport 443 -m conntrack --ctstate NEW -m recent
--set
< -A ufw-user-input -p udp --dport 443 -m conntrack --ctstate NEW -m recent
--update --seconds 30 --hitcount 6 -j ufw-user-limit
< -A ufw-user-input -p udp --dport 443 -j ufw-user-limit-accept
1198c1176
< ### tuple ### limit_log-all any 443 0.0.0.0/0 any 0.0.0.0/0 in
---
> ### tuple ### limit_log-all tcp 443 0.0.0.0/0 any 0.0.0.0/0 in
1205,1210d1182
< -A ufw-user-logging-input -p udp --dport 443 -m limit --limit 3/min
--limit-burst 10 -j LOG --log-prefix "[UFW LIMIT] "
< -A ufw-user-logging-input -p udp --dport 443 -j RETURN
< -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input
< -A ufw-user-input -p udp --dport 443 -m conntrack --ctstate NEW -m recent
--set
< -A ufw-user-input -p udp --dport 443 -m conntrack --ctstate NEW -m recent
--update --seconds 30 --hitcount 6 -j ufw-user-limit
< -A ufw-user-input -p udp --dport 443 -j ufw-user-limit-accept
1422c1394
< ### tuple ### reject_log any 443 0.0.0.0/0 any 0.0.0.0/0 in
---
> ### tuple ### reject_log tcp 443 0.0.0.0/0 any 0.0.0.0/0 in
1427,1430d1398
< -A ufw-user-logging-input -p udp --dport 443 -m conntrack --ctstate NEW -m
limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] "
< -A ufw-user-logging-input -p udp --dport 443 -j RETURN
< -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input
< -A ufw-user-input -p udp --dport 443 -j REJECT
1630c1598
< ### tuple ### reject_log-all any 443 0.0.0.0/0 any 0.0.0.0/0 in
---
> ### tuple ### reject_log-all tcp 443 0.0.0.0/0 any 0.0.0.0/0 in
1635,1638d1602
< -A ufw-user-logging-input -p udp --dport 443 -m limit --limit 3/min
--limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] "
< -A ufw-user-logging-input -p udp --dport 443 -j RETURN
< -A ufw-user-input -p udp --dport 443 -j ufw-user-logging-input
< -A ufw-user-input -p udp --dport 443 -j REJECT
Performing tests 'good/netmasks'
- installing
- result:
PASS
Performing tests 'good/policy'
- installing
- result:
PASS
Performing tests 'good/reports'
- installing
- result:
PASS
Performing tests 'good/route'
- installing
- result:
Command '--dry-run route allow ssh/udp' exited with '1', but expected '0'
** FAIL **
Performing tests 'good/rules'
- installing
- result:
Command '--dry-run allow ssh/udp' exited with '1', but expected '0'
** FAIL **
Performing tests 'ipv6/bad_args6'
- installing
- result:
PASS
Performing tests 'ipv6/good_args6'
- installing
- result:
PASS
Performing tests 'ipv6/logging'
- installing
- result:
PASS
Performing tests 'ipv6/rules6'
- installing
- result:
Command '--dry-run allow to 2001:db8:3:4:5:6:7:8 port tftp from 2001:db8::/32
port ssh' exited with '1', but expected '0'
** FAIL **
Performing tests 'ipv6/rules64'
- installing
- result:
Command '--dry-run allow ssh/udp' exited with '1', but expected '0'
** FAIL **
------------------------
Functional tests summary
------------------------
Attempted: 22 (2222 individual tests)
Skipped: 0
Errors: 5
debian/rules:32: recipe for target 'install' failed
make: *** [install] Error 1
dpkg-buildpackage: error: fakeroot debian/rules binary gave error exit status
2
[…]
The full build log is attached.
Regards,
--
,''`.
: :' : Chris Lamb
`. `'` [email protected] / chris-lamb.co.uk
`-
ufw.0.35-2.unstable.amd64.log.txt.gz
Description: Binary data
--- End Message ---
--- Begin Message ---
Source: ufw
Source-Version: 0.35-3
We believe that the bug you reported is fixed in the latest version of
ufw, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Jamie Strandboge <[email protected]> (supplier of updated ufw package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sun, 08 Jan 2017 16:33:45 +0000
Source: ufw
Binary: ufw python-ufw
Architecture: source all
Version: 0.35-3
Distribution: unstable
Urgency: medium
Maintainer: Jamie Strandboge <[email protected]>
Changed-By: Jamie Strandboge <[email protected]>
Description:
python-ufw - Uncomplicated FireWall Python modules
ufw - program for managing a Netfilter firewall
Closes: 849628
Changes:
ufw (0.35-3) unstable; urgency=medium
.
* 0002-bug849628.patch: adjust testsuite for recent changes to netbase
(Closes: 849628)
* 0003-use-default-tcp-syncookies.patch: don't override distribution default
for TCP syncookies
* 0004-lp1633698.patch: adjust ufw6-before-output rules for echo-reply and
echo-request (LP: #1633698)
* update debian/before6.rules.md5sum
* fix lintian errors:
- debian/control: Build-Depends on dh-python and debhelper >= 9
- debian/compat: use compatibility level 9
Checksums-Sha1:
5283724d8661a21de0cd5e684553cd0e158b1944 1951 ufw_0.35-3.dsc
80bf10b9f788131b9ac64e60907bb032ee8700f4 58316 ufw_0.35-3.debian.tar.xz
d12359df57528d0b62ec09d84e66d84d648d96a6 52886 python-ufw_0.35-3_all.deb
314bbcc62081d1e0c63f576b38bac7455329f21b 164224 ufw_0.35-3_all.deb
e4880afcda872dd2a8700a4e12081b0ca38c2ff3 6387 ufw_0.35-3_amd64.buildinfo
Checksums-Sha256:
98986c20b81867695a64af2a14fc43f3219314f1b5fb0df1cdab890a8eff6321 1951
ufw_0.35-3.dsc
78f581dc43119b302e64f9eda9851b606b3a3db22ae001fd499f689626039cba 58316
ufw_0.35-3.debian.tar.xz
3a226dc05d16a090d617eed28fb056f3bcb604d3a9687ca2540980df2e80c040 52886
python-ufw_0.35-3_all.deb
323d19fe6e540634c20235ecb42d8c0bcda4a783269c59643b77e7ac91045eda 164224
ufw_0.35-3_all.deb
942a570ac8ef0352bd77513e6ef45b1196c4bcaa301139602d193f8d6cabc8d5 6387
ufw_0.35-3_amd64.buildinfo
Files:
0cf113fc60697e257175fe59ad8d1064 1951 admin optional ufw_0.35-3.dsc
0a2bf9233440e2ecd29816a41f95cc96 58316 admin optional ufw_0.35-3.debian.tar.xz
a2c2039ed91ae0568dccbe723e78d984 52886 python optional
python-ufw_0.35-3_all.deb
5653db073ea8dd7a6cd1a40172ae425e 164224 admin optional ufw_0.35-3_all.deb
344124a5b6865bdb943225a098dc33f9 6387 admin optional ufw_0.35-3_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
Comment: Kees Cook <[email protected]>
iQIcBAEBCgAGBQJYdUzQAAoJEIly9N/cbcAmx0MP/iJGhjODNagh+bw4uy+Zybe3
qTIG4Uc4T8yulmvasZil6oiSvucEd8O87ItzP2bgM2fmvbF+PKsk6QTg3kE4GK8n
oa3H/I9+I/zelrJjfKYcALDE95cyRYl8jrbLvcjZ5mNKtUB2ax7XBeVXTyj74hfg
WnkPJvceuHKXPSsP4EtPiojLJn3TXrg9puQWpZ5p7AZI7F1qVZ5mnTSbF7EUPzwZ
JO30I7iRaihvQ/TMlFkTOB+eV/L3cmnWEHES+CGI+2nMp+yI+P74K9fflTmjDZqw
su45QKMde38g+ACe5q9WSoGffjAFUl2YKKSA+z+NiC2Bun+9H3WsKku6XdWGQquY
5dZ2RfLkg0h0tx5TeOOM3YLg54MO7ed974MeiuRVrO9K3/yY9nEpugK6PDnkzWmd
xTVEnWLVZG5v7iCdcBqewVJuL81lowX3eSP3FaEmI1RqDXGaF/kFD7QHnTgjFwP7
3jMJoHR7HElF+YTTal2+Q7Q2nb/lALJGOpEOggTbGfMEog5NNTIdPtOoUobYU2hq
geiZF4VVCtOVGy77xS1aEmZbMdhE8J1YE3Tzy4qIzgL1Tz7o9WlpdERXgJKJ66FC
1I+tNxojXulO07hs/Pt+ZQn3V4XKbkuDLpthqI1kfQHH7k2uoRz5N3BEho5KXpyQ
ocTEG9qeiipH6pEsyx/q
=VNx1
-----END PGP SIGNATURE-----
--- End Message ---