Control: tags -1 moreinfo unreproducible

Am 11.01.20 um 21:42 schrieb Brad Rigby:
> Source: firewalld
> Severity: normal
> 
> Dear Maintainer,
> 
> The debian wiki notes that debian is moving from iptables to nftables, and 
> the nftables page suggests installing this package.  So I did.  
> Unfortunately, I did so via an ssh connection, as the computer in question is 
> a headless router.  As soon as aptitude quit I was booted from the system.  I 
> therefore needed to find a keyboard and monitor, and cables, to hook up to 
> this somewhat antiquated system in order to fix the problem.
> 
> Please give a warning somewhere that before installing, a person should have 
> physical access to the machine.  Even better would be a debconf wrapper to 
> allow configuration before the default completely nukes everything.

It doesn't nuke everything.
Installing firewalld will install a firewall with a default policy.
The default policy is to allow SSH for the public zone which is what you
should get after installation.

Fwiw, installing firewalld (which version are you using btw) in buster
via SSH works fine for me without interruptions:

> root@debian:~# iptables -L -n
> Chain INPUT (policy ACCEPT)
> target     prot opt source               destination         
> ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0            ctstate 
> RELATED,ESTABLISHED
> ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0           
> INPUT_direct  all  --  0.0.0.0/0            0.0.0.0/0           
> INPUT_ZONES_SOURCE  all  --  0.0.0.0/0            0.0.0.0/0           
> INPUT_ZONES  all  --  0.0.0.0/0            0.0.0.0/0           
> DROP       all  --  0.0.0.0/0            0.0.0.0/0            ctstate INVALID
> REJECT     all  --  0.0.0.0/0            0.0.0.0/0            reject-with 
> icmp-host-prohibited
> 
> Chain FORWARD (policy ACCEPT)
> target     prot opt source               destination         
> ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0            ctstate 
> RELATED,ESTABLISHED
> ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0           
> FORWARD_direct  all  --  0.0.0.0/0            0.0.0.0/0           
> FORWARD_IN_ZONES_SOURCE  all  --  0.0.0.0/0            0.0.0.0/0           
> FORWARD_IN_ZONES  all  --  0.0.0.0/0            0.0.0.0/0           
> FORWARD_OUT_ZONES_SOURCE  all  --  0.0.0.0/0            0.0.0.0/0           
> FORWARD_OUT_ZONES  all  --  0.0.0.0/0            0.0.0.0/0           
> DROP       all  --  0.0.0.0/0            0.0.0.0/0            ctstate INVALID
> REJECT     all  --  0.0.0.0/0            0.0.0.0/0            reject-with 
> icmp-host-prohibited
> 
> Chain OUTPUT (policy ACCEPT)
> target     prot opt source               destination         
> OUTPUT_direct  all  --  0.0.0.0/0            0.0.0.0/0           
> 
> Chain INPUT_direct (1 references)
> target     prot opt source               destination         
> 
> Chain INPUT_ZONES_SOURCE (1 references)
> target     prot opt source               destination         
> 
> Chain INPUT_ZONES (1 references)
> target     prot opt source               destination         
> IN_public  all  --  0.0.0.0/0            0.0.0.0/0           [goto] 
> 
> Chain FORWARD_direct (1 references)
> target     prot opt source               destination         
> 
> Chain FORWARD_IN_ZONES_SOURCE (1 references)
> target     prot opt source               destination         
> 
> Chain FORWARD_IN_ZONES (1 references)
> target     prot opt source               destination         
> FWDI_public  all  --  0.0.0.0/0            0.0.0.0/0           [goto] 
> 
> Chain FORWARD_OUT_ZONES_SOURCE (1 references)
> target     prot opt source               destination         
> 
> Chain FORWARD_OUT_ZONES (1 references)
> target     prot opt source               destination         
> FWDO_public  all  --  0.0.0.0/0            0.0.0.0/0           [goto] 
> 
> Chain OUTPUT_direct (1 references)
> target     prot opt source               destination         
> 
> Chain IN_public (1 references)
> target     prot opt source               destination         
> IN_public_log  all  --  0.0.0.0/0            0.0.0.0/0           
> IN_public_deny  all  --  0.0.0.0/0            0.0.0.0/0           
> IN_public_allow  all  --  0.0.0.0/0            0.0.0.0/0           
> ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           
> 
> Chain IN_public_log (1 references)
> target     prot opt source               destination         
> 
> Chain IN_public_deny (1 references)
> target     prot opt source               destination         
> 
> Chain IN_public_allow (1 references)
> target     prot opt source               destination         
> ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpt:22 
> ctstate NEW,UNTRACKED
> 
> Chain FWDI_public (1 references)
> target     prot opt source               destination         
> FWDI_public_log  all  --  0.0.0.0/0            0.0.0.0/0           
> FWDI_public_deny  all  --  0.0.0.0/0            0.0.0.0/0           
> FWDI_public_allow  all  --  0.0.0.0/0            0.0.0.0/0           
> ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           
> 
> Chain FWDI_public_log (1 references)
> target     prot opt source               destination         
> 
> Chain FWDI_public_deny (1 references)
> target     prot opt source               destination         
> 
> Chain FWDI_public_allow (1 references)
> target     prot opt source               destination         
> 
> Chain FWDO_public (1 references)
> target     prot opt source               destination         
> FWDO_public_log  all  --  0.0.0.0/0            0.0.0.0/0           
> FWDO_public_deny  all  --  0.0.0.0/0            0.0.0.0/0           
> FWDO_public_allow  all  --  0.0.0.0/0            0.0.0.0/0           
> 
> Chain FWDO_public_log (1 references)
> target     prot opt source               destination         
> 
> Chain FWDO_public_deny (1 references)
> target     prot opt source               destination         
> 
> Chain FWDO_public_allow (1 references)
> target     prot opt source               destination         

Do you by any chance run SSH on a port != 22?

Can you paste the output of iptables -L -n







Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to