I cannot reproduce this.
Getting back to a known state:
$ grep IPV6 /etc/default/ufw
IPV6=no
$ sudo ufw reset
...
$ sudo ufw enable
Firewall is active and enabled on system startup
$ sudo ufw status
Status: active
$ sudo ip6tables -L INPUT -v
Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all lo any anywhere anywhere
Ok, the firewall is now enabled without IPV6 support, and all IPV6
traffic on the loopback is accepted. This is expected and by design.
Let's add IPv6:
$ grep IPV6 /etc/default/ufw
IPV6=yes
$ sudo ufw reset
...
$ sudo ufw enable
Firewall is active and enabled on system startup
$ sudo ufw status
Status: active
$ sudo ip6tables -L INPUT -v
Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all lo any anywhere anywhere
0 0 ufw6-before-logging-input all any any anywhere
anywhere
0 0 ufw6-before-input all any any anywhere
anywhere
0 0 ufw6-after-input all any any anywhere
anywhere
0 0 ufw6-after-logging-input all any any anywhere
anywhere
0 0 ufw6-reject-input all any any anywhere
anywhere
0 0 ufw6-track-input all any any anywhere
anywhere
$ sudo ufw allow OpenSSH
Rule added
Rule added (v6)
$ sudo ufw status
Status: active
To Action From
-- ------ ----
OpenSSH ALLOW Anywhere
OpenSSH (v6) ALLOW Anywhere (v6)
$ sudo ip6tables -L ufw6-user-input
Chain ufw6-user-input (1 references)
target prot opt source destination
ACCEPT tcp anywhere anywhere tcp dpt:ssh /*
'dapp_OpenSSH' */
Can you run the above commands and see if you have different results?
--
ufw breaks ipv6
https://bugs.launchpad.net/bugs/633044
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs