Re: firewalld / iptables.service past F17

2012-05-02 Thread Jiri Popelka

I've updated the feature page.

--
Jiri

On 04/30/2012 10:24 PM, Kévin Raymond wrote:


Does that imply that new installs will be easily switched from firewalld
to static iptables? I always do new install but I want to keep my firewall
static, with my current iptables script.


Once we actually go to firewalld by default, then yes, at least as long
as lokkit and s-c-f are maintained. The procedure is, more or less:

systemctl disable firewalld.service
systemctl stop firewalld.service
systemctl enable iptables.service
systemctl start iptables.service
lokkit --enabled


Hi, from last week FESCo meeting, firewalld has been marked as
postponned to F18.

If so, could you please update the wiki page?
http://fedoraproject.org/wiki/Features/firewalld-default

In the docs team, we assume that firewalld is still the default in the
Release Notes…

Cheers,

--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: firewalld / iptables.service past F17

2012-05-02 Thread Adam Williamson
On Thu, 2012-04-26 at 11:22 +0200, Reindl Harald wrote:
 
 Am 26.04.2012 11:18, schrieb Adam Williamson:
  Does that imply that new installs will be easily switched from firewalld
  to static iptables? I always do new install but I want to keep my firewall
  static, with my current iptables script.
  
  Once we actually go to firewalld by default, then yes, at least as long
  as lokkit and s-c-f are maintained
 
 the machines where iptables.service is needed do not have
 any GUI installed and so system-config-firewall does not
 matter

There's a TUI version of it too, still.

 the really important things are only iptables.service and
 /etc/sysconfig/iptables-config, the rest is done with
 shellscripts

Yeah, you can always do it that way too.
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Twitter: AdamW_Fedora | identi.ca: adamwfedora
http://www.happyassassin.net

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: firewalld / iptables.service past F17

2012-04-30 Thread Kévin Raymond
  
  Does that imply that new installs will be easily switched from firewalld
  to static iptables? I always do new install but I want to keep my firewall
  static, with my current iptables script.
 
 Once we actually go to firewalld by default, then yes, at least as long
 as lokkit and s-c-f are maintained. The procedure is, more or less:
 
 systemctl disable firewalld.service
 systemctl stop firewalld.service
 systemctl enable iptables.service
 systemctl start iptables.service
 lokkit --enabled

Hi, from last week FESCo meeting, firewalld has been marked as
postponned to F18.

If so, could you please update the wiki page?
http://fedoraproject.org/wiki/Features/firewalld-default

In the docs team, we assume that firewalld is still the default in the
Release Notes…

Cheers,

-- 
Kévin Raymond
(Shaiton)


pgpcQ5C0fraId.pgp
Description: PGP signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: firewalld / iptables.service past F17

2012-04-26 Thread Chris Murphy
Is anyone else seeing on F17 TC1 startup a systemd message that iptables failed?
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: firewalld / iptables.service past F17

2012-04-26 Thread Adam Williamson
On Wed, 2012-04-25 at 17:27 -0600, Dariusz J. Garbowski wrote:
 On 25/04/12 10:55 AM, Adam Williamson wrote:
  On Tue, 2012-04-24 at 09:30 -0500, Jon Ciesla wrote:
 
  Nothing is being taken away, the default is being changed.  If you're
  using Fedora in production, I presume you're installing with
  Kickstart.
 
  It's worth noting that if the question is how does firewalld handle
  upgrades, I think it may be somewhat irrelevant because AFAIK even when
  firewalld was going to be the F17 default, we never implemented anything
  to cause upgraded systems to switch to it. It was only new installs
  which were getting firewalld. Upgraded ones stuck with the static
  iptables/s-c-f/lokkit system.
 
 Does that imply that new installs will be easily switched from firewalld
 to static iptables? I always do new install but I want to keep my firewall
 static, with my current iptables script.

Once we actually go to firewalld by default, then yes, at least as long
as lokkit and s-c-f are maintained. The procedure is, more or less:

systemctl disable firewalld.service
systemctl stop firewalld.service
systemctl enable iptables.service
systemctl start iptables.service
lokkit --enabled
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Twitter: AdamW_Fedora | identi.ca: adamwfedora
http://www.happyassassin.net

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: firewalld / iptables.service past F17

2012-04-26 Thread Reindl Harald


Am 26.04.2012 11:18, schrieb Adam Williamson:
 Does that imply that new installs will be easily switched from firewalld
 to static iptables? I always do new install but I want to keep my firewall
 static, with my current iptables script.
 
 Once we actually go to firewalld by default, then yes, at least as long
 as lokkit and s-c-f are maintained

the machines where iptables.service is needed do not have
any GUI installed and so system-config-firewall does not
matter

the really important things are only iptables.service and
/etc/sysconfig/iptables-config, the rest is done with
shellscripts




signature.asc
Description: OpenPGP digital signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: firewalld / iptables.service past F17

2012-04-26 Thread Dariusz J. Garbowski

On 26/04/12 03:18 AM, Adam Williamson wrote:

On Wed, 2012-04-25 at 17:27 -0600, Dariusz J. Garbowski wrote:


Does that imply that new installs will be easily switched from firewalld
to static iptables? I always do new install but I want to keep my firewall
static, with my current iptables script.


Once we actually go to firewalld by default, then yes, at least as long
as lokkit and s-c-f are maintained. The procedure is, more or less:

systemctl disable firewalld.service
systemctl stop firewalld.service
systemctl enable iptables.service
systemctl start iptables.service
lokkit --enabled


Thumbs up for this. Please keep it in working condition!

Dariusz

--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: firewalld / iptables.service past F17

2012-04-25 Thread Adam Williamson
On Tue, 2012-04-24 at 09:30 -0500, Jon Ciesla wrote:

 Nothing is being taken away, the default is being changed.  If you're
 using Fedora in production, I presume you're installing with
 Kickstart.  

It's worth noting that if the question is how does firewalld handle
upgrades, I think it may be somewhat irrelevant because AFAIK even when
firewalld was going to be the F17 default, we never implemented anything
to cause upgraded systems to switch to it. It was only new installs
which were getting firewalld. Upgraded ones stuck with the static
iptables/s-c-f/lokkit system.
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Twitter: AdamW_Fedora | identi.ca: adamwfedora
http://www.happyassassin.net

-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: firewalld / iptables.service past F17

2012-04-25 Thread Dariusz J. Garbowski

On 25/04/12 10:55 AM, Adam Williamson wrote:

On Tue, 2012-04-24 at 09:30 -0500, Jon Ciesla wrote:


Nothing is being taken away, the default is being changed.  If you're
using Fedora in production, I presume you're installing with
Kickstart.


It's worth noting that if the question is how does firewalld handle
upgrades, I think it may be somewhat irrelevant because AFAIK even when
firewalld was going to be the F17 default, we never implemented anything
to cause upgraded systems to switch to it. It was only new installs
which were getting firewalld. Upgraded ones stuck with the static
iptables/s-c-f/lokkit system.


Does that imply that new installs will be easily switched from firewalld
to static iptables? I always do new install but I want to keep my firewall
static, with my current iptables script.

Dariusz


--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: firewalld / iptables.service past F17

2012-04-24 Thread Reindl Harald
Am 24.04.2012 02:08, schrieb Oron Peled:
 Looks like this transition (as is currently planned) is going to
 break many setups. I want to show the three following use-cases
 which may be severely broken by this transition.

exactly this is the problem

i have attached my ip-tables script making at home a software-router
with forwarding of two different networks from my LAN via openvpn
and a static route

i only stripped the config-block and comments

but as you can see there are many useful decisions
by $HOSTNAME and this is only one of my scripts for
two machines
__-

another one is built the same way and serves 20 machines
while partly rules are for all machines, others depeding as
in my example on the hostname and there are a lot of really
useful and well thought specific drop/forward/reject rules
based on hostname and source/destination networks

this script has about 50 KB and a handful of bash-includes

well, one may say unmaintainable - but it is, it
has a good documentation and structure and we are using
it as reference for each iptables.sh needed where ever

it is practically impossible to convert this stuff because
nobody did write it down in one day, it is grown and maintained
over years with the whole infrastructure - yes you MAYBE CAN
try to re-implement all this rules in firewalld

but would you do this really in a production environment
in a security layer and how do you test from scratch?

please do not come now why fedora in prodction
because it just works if things are not careless removed
from the distribution - so please do not take away power
featureswhich are not really hurt to maintain

firewalld is at least another interface for netfilter
why want anybody take away perfectly working ones?
#! /bin/bash

strippd block with var-definitions

if [ $HOSTNAME == $HOSTNAME_HOME ]; then
 PUBLIC_PORTS=21,80,,$SSH_PORT
 LAN_PORTS=25 143 443 465 587 993 $VMWARE_PORTS 2000 $RDP_PORTS $SMB_PORTS 
$AVAHI_PORT
else
 PUBLIC_PORTS=80,$SSH_PORT
 LAN_PORTS=25 143 443 465 587 993 2000 $SMB_PORTS $AVAHI_PORT
fi

$IPTABLES -P INPUT DROP
$IPTABLES -P FORWARD DROP
$IPTABLES -F
$IPTABLES -X
CHAINS=`cat /proc/net/ip_tables_names 2/dev/null`
for i in $CHAINS; do $IPTABLES -t $i -F; done  echo Flush OK || echo Flush 
FAILED
for i in $CHAINS; do $IPTABLES -t $i -X; done  echo Clear OK || echo Clear 
FAILED
for i in $CHAINS; do $IPTABLES -t $i -Z; done

$IPTABLES -P INPUT DROP
$IPTABLES -P FORWARD DROP

$IPTABLES -A INPUT ! -i lo -m state --state INVALID -j DROP
$IPTABLES -A INPUT ! -i lo -p tcp -m state --state NEW --dport 0 -j DROP
$IPTABLES -A INPUT ! -i lo -p udp -m state --state NEW --dport 0 -j DROP
$IPTABLES -A INPUT ! -i lo -p tcp --tcp-flags ALL ACK,RST,SYN,FIN -j DROP
$IPTABLES -A INPUT ! -i lo -p tcp --tcp-flags ALL FIN -j DROP
$IPTABLES -A INPUT ! -i lo -p tcp --tcp-flags ALL FIN,URG,PSH -j DROP
$IPTABLES -A INPUT ! -i lo -p tcp --tcp-flags ALL ALL -j DROP
$IPTABLES -A INPUT ! -i lo -p tcp --tcp-flags ALL SYN,RST,ACK,FIN,URG -j DROP
$IPTABLES -A INPUT ! -i lo -p tcp --tcp-flags ALL NONE -j DROP
$IPTABLES -A INPUT ! -i lo -p tcp --tcp-flags SYN,FIN SYN,FIN -j DROP
$IPTABLES -A INPUT ! -i lo -p tcp --tcp-flags SYN,RST SYN,RST -j DROP
$IPTABLES -A INPUT ! -i lo -p tcp --tcp-flags FIN,RST FIN,RST -j DROP
$IPTABLES -A INPUT ! -i lo -p tcp --tcp-flags ACK,FIN FIN -j DROP
$IPTABLES -A INPUT ! -i lo -p tcp --tcp-flags ACK,PSH PSH -j DROP
$IPTABLES -A INPUT ! -i lo -p tcp --tcp-flags ACK,URG URG -j DROP
$IPTABLES -A INPUT ! -i lo -p tcp ! --syn -m state --state NEW -j DROP
$IPTABLES -A INPUT ! -i lo -f -j DROP
$IPTABLES -A INPUT ! -i lo -s 127.0.0.0/8 -j DROP
$IPTABLES -A INPUT -p all -s 10.0.0.253 -m state --state NEW -j DROP

# 
---

if [ $HOSTNAME == $HOSTNAME_HOME ]; then
 RATE_WHITELIST_RANGE=$LAN_RHSOFT
else
 RATE_WHITELIST_RANGE=$LAN_LOUNGE
fi
$IPTABLES -A INPUT ! -s 127.0.0.1 -p tcp -m multiport --destination-port 
$BLOCKED_PORTS  -m state --state NEW -j REJECT --reject-with tcp-reset

PORTSCAN_TRIGGERS_1=19,24,52,79,109,142,442,464,548,586,631,992,994,3305
PORTSCAN_TRIGGERS_2=23,3389,5900,5920,5922,5930,5931,5950
$IPTABLES -A INPUT ! -i lo ! -s $RATE_WHITELIST_RANGE -p tcp -m recent --name 
portscan1 --rcheck --seconds 2 -j REJECT --reject-with tcp-reset
$IPTABLES -A INPUT ! -i lo ! -s $RATE_WHITELIST_RANGE -p tcp -m recent --name 
portscan1 --remove
$IPTABLES -A INPUT ! -i lo ! -s $RATE_WHITELIST_RANGE -p tcp -m multiport 
--destination-port $PORTSCAN_TRIGGERS_1 -m limit --limit 10/h -j LOG 
--log-prefix Portscan: 
$IPTABLES -A INPUT ! -i lo ! -s $RATE_WHITELIST_RANGE -p tcp -m multiport 
--destination-port $PORTSCAN_TRIGGERS_1 -m tcp -m recent --name portscan1 --set 
-j REJECT --reject-with tcp-reset
$IPTABLES -A INPUT ! -i lo ! -s $RATE_WHITELIST_RANGE -p tcp -m recent --name 
portscan2 --rcheck --seconds 2 -j REJECT --reject-with tcp-reset

Re: firewalld / iptables.service past F17

2012-04-24 Thread Jon Ciesla
On Mon, Apr 23, 2012 at 7:32 PM, Reindl Harald h.rei...@thelounge.net wrote:
 Am 24.04.2012 02:08, schrieb Oron Peled:
 Looks like this transition (as is currently planned) is going to
 break many setups. I want to show the three following use-cases
 which may be severely broken by this transition.

 exactly this is the problem

 i have attached my ip-tables script making at home a software-router
 with forwarding of two different networks from my LAN via openvpn
 and a static route

 i only stripped the config-block and comments

 but as you can see there are many useful decisions
 by $HOSTNAME and this is only one of my scripts for
 two machines
 __-

 another one is built the same way and serves 20 machines
 while partly rules are for all machines, others depeding as
 in my example on the hostname and there are a lot of really
 useful and well thought specific drop/forward/reject rules
 based on hostname and source/destination networks

 this script has about 50 KB and a handful of bash-includes

 well, one may say unmaintainable - but it is, it
 has a good documentation and structure and we are using
 it as reference for each iptables.sh needed where ever

 it is practically impossible to convert this stuff because
 nobody did write it down in one day, it is grown and maintained
 over years with the whole infrastructure - yes you MAYBE CAN
 try to re-implement all this rules in firewalld

 but would you do this really in a production environment
 in a security layer and how do you test from scratch?

 please do not come now why fedora in prodction
 because it just works if things are not careless removed
 from the distribution - so please do not take away power
 featureswhich are not really hurt to maintain

 firewalld is at least another interface for netfilter
 why want anybody take away perfectly working ones?

Nothing is being taken away, the default is being changed.  If you're
using Fedora in production, I presume you're installing with
Kickstart.  You can set up anything you like in Kickstart, including
not using firewalld if you so desire.

-J

 --
 devel mailing list
 devel@lists.fedoraproject.org
 https://admin.fedoraproject.org/mailman/listinfo/devel



-- 
http://cecinestpasunefromage.wordpress.com/

in your fear, seek only peace
in your fear, seek only love

-d. bowie
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: firewalld / iptables.service past F17

2012-04-24 Thread Reindl Harald

Am 24.04.2012 16:30, schrieb Jon Ciesla:
 Nothing is being taken away, the default is being changed.  If you're
 using Fedora in production, I presume you're installing with
 Kickstart.  You can set up anything you like in Kickstart, including
 not using firewalld if you so desire.

thank you for your feedback
exactly this was my question

i liked to get sure that iptables.service is not planned to get
removed in future releases and my intention here was to explain
why it can not be replaced in many perfectly working environments
before future decisions are made to get not offended again why
i come up after things are done

installation and default does not matter for me, i usually install
my servers once and upgrade them, currently F16, installed with F8


i repeat my original question to have the full context here

 http://fedoraproject.org/wiki/Features/firewalld-default
 An explicit transition is planned after Fedora 18 with dropping support for 
 the
 static firewall with system-config-firewal/lokkit. A migration from the 
 static
 firewall model will be needed then.

 are there only the ui-interfaces meant or do someone
 consider drop iptbales.service at all? if so please
 re-consider this!



signature.asc
Description: OpenPGP digital signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: firewalld / iptables.service past F17

2012-04-24 Thread Jon Ciesla
On Tue, Apr 24, 2012 at 9:38 AM, Reindl Harald h.rei...@thelounge.net wrote:

 Am 24.04.2012 16:30, schrieb Jon Ciesla:
 Nothing is being taken away, the default is being changed.  If you're
 using Fedora in production, I presume you're installing with
 Kickstart.  You can set up anything you like in Kickstart, including
 not using firewalld if you so desire.

 thank you for your feedback
 exactly this was my question

 i liked to get sure that iptables.service is not planned to get
 removed in future releases and my intention here was to explain
 why it can not be replaced in many perfectly working environments
 before future decisions are made to get not offended again why
 i come up after things are done

That I'm not sure about.  Disabled, yes.  Removed, I don't believe so.

 installation and default does not matter for me, i usually install
 my servers once and upgrade them, currently F16, installed with F8
 

 i repeat my original question to have the full context here

 http://fedoraproject.org/wiki/Features/firewalld-default
 An explicit transition is planned after Fedora 18 with dropping support for 
 the
 static firewall with system-config-firewal/lokkit. A migration from the 
 static
 firewall model will be needed then.

 are there only the ui-interfaces meant or do someone
 consider drop iptbales.service at all? if so please
 re-consider this!


 --
 devel mailing list
 devel@lists.fedoraproject.org
 https://admin.fedoraproject.org/mailman/listinfo/devel



-- 
http://cecinestpasunefromage.wordpress.com/

in your fear, seek only peace
in your fear, seek only love

-d. bowie
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: firewalld / iptables.service past F17

2012-04-23 Thread Miloslav Trmač
On Tue, Apr 17, 2012 at 10:40 PM, Reindl Harald h.rei...@thelounge.net wrote:
 Hi

 one question before decisions are nailed down

 http://fedoraproject.org/wiki/Features/firewalld-default

 An explicit transition is planned after Fedora 18 with dropping support for 
 the
 static firewall with system-config-firewal/lokkit. A migration from the 
 static
 firewall model will be needed then.

 are there only the ui-interfaces meant or do someone
 consider drop iptbales.service at all? if so please
 re-consider this!

I was pushing for the deprecation to avoid a NetworkManager-like
duplication for the long term.

AFAICS you can s/iptables/firewall-cmd --direct --passthrough ipv4/,
and things should continue to work (perhaps with minor modifications
to avoid collisions with firewalld's default rule chains).

Or, if you insist, disable firewalld (... which might break some
applications), and turn your shell script into a systemd service; but
--direct --passthrough should be the preferred route.
   Mirek
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: firewalld / iptables.service past F17

2012-04-23 Thread Reindl Harald
Am 23.04.2012 17:32, schrieb Miloslav Trmač:
 On Tue, Apr 17, 2012 at 10:40 PM, Reindl Harald h.rei...@thelounge.net 
 wrote:
 http://fedoraproject.org/wiki/Features/firewalld-default

 An explicit transition is planned after Fedora 18 with dropping support for 
 the
 static firewall with system-config-firewal/lokkit. A migration from the 
 static
 firewall model will be needed then.

 are there only the ui-interfaces meant or do someone
 consider drop iptbales.service at all? if so please
 re-consider this!
 
 I was pushing for the deprecation to avoid a NetworkManager-like
 duplication for the long term.

i really, really like the idea of firewalld for many setups!
it is a really nice improvement for desktops over the long

but please consider that network-manager and desktop is not
all and on servers with vpn-gateways, routings and such
things you do not really like it

please do not start seeing linux as desktop-only OS, it is not
cool that it works for desktops and servers and this should
be considered in big changes

 AFAICS you can s/iptables/firewall-cmd --direct --passthrough ipv4/,
 and things should continue to work (perhaps with minor modifications
 to avoid collisions with firewalld's default rule chains).

i simply do not need want any default chains
the first in a iptables-script is reset them

the iptables.sh for the environment where i work is currently
50 KB large, distributed and for all machines in the network
the same

 Or, if you insist, disable firewalld (... which might break some
 applications), and turn your shell script into a systemd service; but
 --direct --passthrough should be the preferred route.

how to replace such things?

cat /etc/sysconfig/iptables-config
IPTABLES_MODULES=ip_nat_sip ip_nat_ftp nf_conntrack_ftp nf_nat_ftp


cat /etc/sysconfig/iptables-config
IPTABLES_MODULES=nf_conntrack_ftp  nf_nat_ftp

cat /etc/modprobe.d/local.conf
options nf_conntrack_ftp ports=21,4559
options ipt_recent ip_list_tot=5000 ip_pkt_list_tot=200




signature.asc
Description: OpenPGP digital signature
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Re: firewalld / iptables.service past F17

2012-04-23 Thread Oron Peled
On Monday, 23 בApril 2012 18:56:23 Reindl Harald wrote:
 Am 23.04.2012 17:32, schrieb Miloslav Trmač:
  On Tue, Apr 17, 2012 at 10:40 PM, Reindl Harald h.rei...@thelounge.net 
wrote:
  http://fedoraproject.org/wiki/Features/firewalld-default
 
  An explicit transition is planned after Fedora 18 with dropping support 
for the
  static firewall with system-config-firewal/lokkit. A migration from the 
static
  firewall model will be needed then.

Looks like this transition (as is currently planned) is going to
break many setups. I want to show the three following use-cases
which may be severely broken by this transition.

1. The simplest desktop case (firewalld is designed for such users).
   This is what I personally use on most of my desktops/laptops:

   * The user previously only used system-config-firewall (without
 custom rules -- we talk about simplest case)

   * The firewalld package does not even try to convert existing rules
 (just looked at the .spec file for the post*/pre*/trans*)

   * Results:
 - The user looses all her existing firewall settings without a warning
   (security).

 - If they had NAT (masquarading) -- pooof, no more Internet for you...

 - Almost all record of their previous settings is lost (sans .rpmsave)

 - If the poor user make another mistake (e.g: tries to re-install
   system-config-firewall), it may even clobber the .rpmsave
   [this is DATA-LOSS!]

2. Custom made firewall (e.g: hand-written script. I personally
   use this in rare/complex cases):

   * It obviously cannot be migrated automatically.

   * That's OK, as someone that can maintain the custom script, can
 migrate it manually.

   * But:
 - Just like item 1. above, we cannot take the risk that old
   data (e.g: existing /etc/sysconfig/iptables) would be somehow
   clobbered by install/upgrade/re-install of
   firewalld/system-config-firewall.
   [although the customization user is more likely to have backup
of said script, unlike the naive user from item 1.]

 - As others mentioned before, this use-case may contain features
   not (yet/ever?) in firewalld. So they need a (long-term) way
   to keep using their custom scripts (yes, even in F-21 unless
   by that time firewalld can have the full power of raw
   iptables script).
   [note: however, this use-case does *not* need system-config-firewall]

3. Complex firewall made by external tools (similar to 2.)
   My personal example is fwbuilder (packaged in Fedora):

   * I use it to centrally manage several firewalls

   * If firewalld becomes default after some upgrade, then:
 - Poof, some of these cannot be accessed (NAT...)

 - ... and alternative access (physical) is Hmmm problematic

 - I would call this super uncool (just a bit less uncool
   than the potential data-loss I mentioned before...)

Summary:
  * Regretfully, I think it's clear that firewalld as *default* is
a complete show-stopper (for now).

  * One (not hard) improvement is to preserve old data. E.g:
- During firewalld postinst (in install, upgrade is not
  the problem here), save a copy of all previous iptables
  config in a well defined location -- e.g:
   /etc/firewalld/old-iptables-data

- Make this data time-stamped to prevent overwriting in
  repeated (maybe mistaken) install/remove attempts. E.g:
   /etc/firewalld/.../2012-04-24_02-28/iptables
   /etc/firewalld/.../2012-04-24_02-28/iptables-config

- Also echo a message about it to stderr (I know its against
  the policy, but critical data-loss is more important IMO).

  * Try to migrate system-config-firewall data:
- That is harder, but even doing only the no-custom-rules case
  would prevent tons of problems for most (normal/naive) users.

- This would help even without/before firwalld is default.

  * Make installation/activate of firewalld optional even after
it is good enough to be default:
- Custom/complex setups will not be migrated (surely not before
  firewalld cannot cover the flexibility of raw iptables)

- So when people install servers, they may not want firewalld
  at all (regardless of system-config-firewall existance)

- Don't assume a live-cd is only used only for desktop installs.
  Many people (me included) install servers from a live-cd
  and add the rest later.

  Why? Because many times these are isolated servers (not on my
  kickstart-configured network), the live-cd image is smaller
  to download than a DVD, its already in my pocket on a DOK,
  etc, etc.

- So I think that even when firewalld is (eventually) good enough
  for a *default* install and even when system-config-firewall will
  already be a relic from the past -- we should allow power-users
  not to install it in the first place.

  I.e: it should be a *suggested* option.
  From a (future) UI