** No longer affects: ufw (Ubuntu Lucid)

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ufw in Ubuntu.
https://bugs.launchpad.net/bugs/581744

Title:
  Purging should not set reset policies/chains if ufw wasn't enabled

Status in NULL Project:
  Invalid
Status in “ufw” package in Ubuntu:
  Fix Released

Bug description:
  Binary package hint: ufw

  [ufw_0.30pre1-0ubuntu2 on lucid]

  ufw's postrm script does the following on purge:

          for exe in iptables ip6tables
          do
              if which $exe > /dev/null 2>&1; then
                  $exe -P INPUT ACCEPT 2>/dev/null || true
                  $exe -P OUTPUT ACCEPT 2>/dev/null || true
                  $exe -P FORWARD ACCEPT 2>/dev/null || true
                  $exe -F 2>/dev/null || true
                  $exe -X 2>/dev/null || true
              fi
          done

  That's completely unexpected if ufw wasn't in use at all and there's another 
firewall configured (e.g. shorewall/shorewall6).
  The policies and chains should only be reset if ufw actually was in use.

To manage notifications about this bug go to:
https://bugs.launchpad.net/null-and-void/+bug/581744/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to