Public bug reported:
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac
/autopkgtest-artful-canonical-kernel-team-
ppa/artful/amd64/s/snapd/20170517_171222_5c77c@/log.gz
2017-05-17 17:11:40 Error restoring
autopkgtest:ubuntu-17.10-amd64:tests/main/econnreset :
-----
+ echo 'Remove the firewall rule again'
Remove the firewall rule again
++ id -u test
+ iptables -D OUTPUT -m owner --uid-owner 12345 -j REJECT -p tcp --reject-with
tcp-reset
iptables: No chain/target/match by that name.
-----
Can be easily reproduced by hand:
$ sudo iptables -I OUTPUT -m owner --uid-owner $(id -u) -j REJECT -p tcp
--reject-with tcp-reset
$ sudo iptables -D OUTPUT -m owner --uid-owner $(id -u) -j REJECT -p tcp
--reject-with tcp-reset
iptables: No chain/target/match by that name.
The rule is successfully deleted in xenial/zesty.
** Affects: linux (Ubuntu)
Importance: Medium
Assignee: Seth Forshee (sforshee)
Status: In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1691752
Title:
iptables regression causing snapd ADT failure
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1691752/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs