Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 652329 Details for
Bug 878214
systemctl status firewalld.service - failed
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
# gedit /var/log/firewalld &
firewall_villa_log.txt (text/plain), 78.92 KB, created by
Flóki Pálsson
on 2012-11-26 21:37:30 UTC
(
hide
)
Description:
# gedit /var/log/firewalld &
Filename:
MIME Type:
Creator:
Flóki Pálsson
Created:
2012-11-26 21:37:30 UTC
Size:
78.92 KB
patch
obsolete
>2012-11-26 21:17:01 DEBUG1: start() >2012-11-26 21:17:01 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -F >2012-11-26 21:17:01 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -X >2012-11-26 21:17:01 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -Z >2012-11-26 21:17:01 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -P INPUT ACCEPT >2012-11-26 21:17:01 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -P OUTPUT ACCEPT >2012-11-26 21:17:01 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -P FORWARD ACCEPT >2012-11-26 21:17:01 DEBUG1: Loading firewalld config file '/etc/firewalld/firewalld.conf' >2012-11-26 21:17:01 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -N INPUT_direct >2012-11-26 21:17:01 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -N INPUT_ZONES >2012-11-26 21:17:01 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I INPUT 1 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I INPUT 2 -i lo -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I INPUT 3 -j INPUT_direct >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I INPUT 4 -j INPUT_ZONES >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I INPUT 5 -p icmp -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I INPUT 6 -j REJECT --reject-with icmp-host-prohibited >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -N FORWARD_direct >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -N FORWARD_ZONES >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I FORWARD 1 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I FORWARD 2 -i lo -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I FORWARD 3 -j FORWARD_direct >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I FORWARD 4 -j FORWARD_ZONES >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I FORWARD 5 -p icmp -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I FORWARD 6 -j REJECT --reject-with icmp-host-prohibited >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -N OUTPUT_direct >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I OUTPUT 1 -j OUTPUT_direct >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -N PREROUTING_direct >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -I PREROUTING 1 -j PREROUTING_direct >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -N PREROUTING_ZONES >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -I PREROUTING 2 -j PREROUTING_ZONES >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -N POSTROUTING_direct >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -I POSTROUTING 1 -j POSTROUTING_direct >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -N INPUT_direct >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -I INPUT 1 -j INPUT_direct >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -N OUTPUT_direct >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -I OUTPUT 1 -j OUTPUT_direct >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -N FORWARD_direct >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -I FORWARD 1 -j FORWARD_direct >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -N PREROUTING_direct >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -I PREROUTING 1 -j PREROUTING_direct >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -N PREROUTING_ZONES >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -I PREROUTING 2 -j PREROUTING_ZONES >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -N POSTROUTING_direct >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -I POSTROUTING 1 -j POSTROUTING_direct >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -N POSTROUTING_ZONES >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -I POSTROUTING 2 -j POSTROUTING_ZONES >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -N OUTPUT_direct >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -I OUTPUT 1 -j OUTPUT_direct >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -N INPUT_direct >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -N INPUT_ZONES >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I INPUT 1 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I INPUT 2 -i lo -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I INPUT 3 -j INPUT_direct >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I INPUT 4 -j INPUT_ZONES >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I INPUT 5 -p ipv6-icmp -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I INPUT 6 -j REJECT --reject-with icmp6-adm-prohibited >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -N FORWARD_direct >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -N FORWARD_ZONES >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I FORWARD 1 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I FORWARD 2 -i lo -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I FORWARD 3 -j FORWARD_direct >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I FORWARD 4 -j FORWARD_ZONES >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I FORWARD 5 -p ipv6-icmp -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I FORWARD 6 -j REJECT --reject-with icmp6-adm-prohibited >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -N OUTPUT_direct >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I OUTPUT 1 -j OUTPUT_direct >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -N PREROUTING_direct >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -I PREROUTING 1 -j PREROUTING_direct >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -N PREROUTING_ZONES >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -I PREROUTING 2 -j PREROUTING_ZONES >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -N POSTROUTING_direct >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -I POSTROUTING 1 -j POSTROUTING_direct >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -N INPUT_direct >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -I INPUT 1 -j INPUT_direct >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -N OUTPUT_direct >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -I OUTPUT 1 -j OUTPUT_direct >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -N FORWARD_direct >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -I FORWARD 1 -j FORWARD_direct >2012-11-26 21:17:02 DEBUG1: Loading icmptype file '/usr/lib/firewalld/icmptypes/echo-request.xml' >2012-11-26 21:17:02 DEBUG1: Loading icmptype file '/usr/lib/firewalld/icmptypes/time-exceeded.xml' >2012-11-26 21:17:02 DEBUG1: Loading icmptype file '/usr/lib/firewalld/icmptypes/source-quench.xml' >2012-11-26 21:17:02 DEBUG1: Loading icmptype file '/usr/lib/firewalld/icmptypes/router-advertisement.xml' >2012-11-26 21:17:02 DEBUG1: Loading icmptype file '/usr/lib/firewalld/icmptypes/destination-unreachable.xml' >2012-11-26 21:17:02 DEBUG1: Loading icmptype file '/usr/lib/firewalld/icmptypes/parameter-problem.xml' >2012-11-26 21:17:02 DEBUG1: Loading icmptype file '/usr/lib/firewalld/icmptypes/echo-reply.xml' >2012-11-26 21:17:02 DEBUG1: Loading icmptype file '/usr/lib/firewalld/icmptypes/router-solicitation.xml' >2012-11-26 21:17:02 DEBUG1: Loading icmptype file '/usr/lib/firewalld/icmptypes/redirect.xml' >2012-11-26 21:17:02 DEBUG1: Loading service file '/usr/lib/firewalld/services/bacula-client.xml' >2012-11-26 21:17:02 DEBUG1: Loading service file '/usr/lib/firewalld/services/libvirt.xml' >2012-11-26 21:17:02 DEBUG1: Loading service file '/usr/lib/firewalld/services/ipp.xml' >2012-11-26 21:17:02 DEBUG1: Loading service file '/usr/lib/firewalld/services/imaps.xml' >2012-11-26 21:17:02 DEBUG1: Loading service file '/usr/lib/firewalld/services/cluster-suite.xml' >2012-11-26 21:17:02 DEBUG1: Loading service file '/usr/lib/firewalld/services/http.xml' >2012-11-26 21:17:02 DEBUG1: Loading service file '/usr/lib/firewalld/services/tftp-client.xml' >2012-11-26 21:17:02 DEBUG1: Loading service file '/usr/lib/firewalld/services/mdns.xml' >2012-11-26 21:17:02 DEBUG1: Loading service file '/usr/lib/firewalld/services/nfs.xml' >2012-11-26 21:17:02 DEBUG1: Loading service file '/usr/lib/firewalld/services/dhcpv6-client.xml' >2012-11-26 21:17:02 DEBUG1: Loading service file '/usr/lib/firewalld/services/pop3s.xml' >2012-11-26 21:17:02 DEBUG1: Loading service file '/usr/lib/firewalld/services/https.xml' >2012-11-26 21:17:02 DEBUG1: Loading service file '/usr/lib/firewalld/services/dns.xml' >2012-11-26 21:17:02 DEBUG1: Loading service file '/usr/lib/firewalld/services/openvpn.xml' >2012-11-26 21:17:02 DEBUG1: Loading service file '/usr/lib/firewalld/services/ipp-client.xml' >2012-11-26 21:17:02 DEBUG1: Loading service file '/usr/lib/firewalld/services/radius.xml' >2012-11-26 21:17:02 DEBUG1: Loading service file '/usr/lib/firewalld/services/samba.xml' >2012-11-26 21:17:02 DEBUG1: Loading service file '/usr/lib/firewalld/services/libvirt-tls.xml' >2012-11-26 21:17:02 DEBUG1: Loading service file '/usr/lib/firewalld/services/samba-client.xml' >2012-11-26 21:17:02 DEBUG1: Loading service file '/usr/lib/firewalld/services/ipsec.xml' >2012-11-26 21:17:02 DEBUG1: Loading service file '/usr/lib/firewalld/services/amanda-client.xml' >2012-11-26 21:17:02 DEBUG1: Loading service file '/usr/lib/firewalld/services/ftp.xml' >2012-11-26 21:17:02 DEBUG1: Loading service file '/usr/lib/firewalld/services/tftp.xml' >2012-11-26 21:17:02 DEBUG1: Loading service file '/usr/lib/firewalld/services/telnet.xml' >2012-11-26 21:17:02 DEBUG1: Loading service file '/usr/lib/firewalld/services/bacula.xml' >2012-11-26 21:17:02 DEBUG1: Loading service file '/usr/lib/firewalld/services/smtp.xml' >2012-11-26 21:17:02 DEBUG1: Loading service file '/usr/lib/firewalld/services/ssh.xml' >2012-11-26 21:17:02 DEBUG1: Loading zone file '/usr/lib/firewalld/zones/home.xml' >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_home -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_home_deny -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_home_allow -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_home -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_home_deny -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_home_allow -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_home 1 -t filter -j IN_ZONE_home_deny >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_home 2 -t filter -j IN_ZONE_home_allow >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_home 1 -t filter -j IN_ZONE_home_deny >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_home 2 -t filter -j IN_ZONE_home_allow >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_home_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_home_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_home_allow -t filter -m udp -p udp --dport 631 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_home_allow -t filter -m udp -p udp --dport 631 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_home_allow -t filter -m udp -p udp --dport 5353 -d 224.0.0.251 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_home_allow -t filter -m udp -p udp --dport 5353 -d ff02::fb -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_home_allow -t filter -m udp -p udp --dport 137 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_home_allow -t filter -m udp -p udp --dport 138 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_home_allow -t filter -m udp -p udp --dport 137 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_home_allow -t filter -m udp -p udp --dport 138 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.modules.modules: /sbin/modprobe nf_conntrack_netbios_ns >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_home_allow -t filter -m udp -p udp --dport 546 -d fe80::/64 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:17:02 DEBUG1: Loading zone file '/usr/lib/firewalld/zones/drop.xml' >2012-11-26 21:17:02 DEBUG1: Loading zone file '/usr/lib/firewalld/zones/work.xml' >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_work -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_work_deny -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_work_allow -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_work -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_work_deny -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_work_allow -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_work 1 -t filter -j IN_ZONE_work_deny >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_work 2 -t filter -j IN_ZONE_work_allow >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_work 1 -t filter -j IN_ZONE_work_deny >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_work 2 -t filter -j IN_ZONE_work_allow >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_work_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_work_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_work_allow -t filter -m udp -p udp --dport 5353 -d 224.0.0.251 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_work_allow -t filter -m udp -p udp --dport 5353 -d ff02::fb -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_work_allow -t filter -m udp -p udp --dport 631 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_work_allow -t filter -m udp -p udp --dport 631 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_work_allow -t filter -m udp -p udp --dport 546 -d fe80::/64 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:17:02 DEBUG1: Loading zone file '/usr/lib/firewalld/zones/external.xml' >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_external -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_external_deny -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_external_allow -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_external -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_external_deny -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_external_allow -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_external 1 -t filter -j IN_ZONE_external_deny >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_external 2 -t filter -j IN_ZONE_external_allow >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_external 1 -t filter -j IN_ZONE_external_deny >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_external 2 -t filter -j IN_ZONE_external_allow >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_external_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_external_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N POST_ZONE_external -t nat >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N POST_ZONE_external_deny -t nat >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N POST_ZONE_external_allow -t nat >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I POST_ZONE_external 1 -t nat -j POST_ZONE_external_deny >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I POST_ZONE_external 2 -t nat -j POST_ZONE_external_allow >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N FWDO_ZONE_external -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N FWDO_ZONE_external_deny -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N FWDO_ZONE_external_allow -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N FWDO_ZONE_external -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N FWDO_ZONE_external_deny -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N FWDO_ZONE_external_allow -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I FWDO_ZONE_external 1 -t filter -j FWDO_ZONE_external_deny >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I FWDO_ZONE_external 2 -t filter -j FWDO_ZONE_external_allow >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I FWDO_ZONE_external 1 -t filter -j FWDO_ZONE_external_deny >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I FWDO_ZONE_external 2 -t filter -j FWDO_ZONE_external_allow >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A POST_ZONE_external_allow -t nat -j MASQUERADE >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A FWDO_ZONE_external_allow -t filter -j ACCEPT >2012-11-26 21:17:02 DEBUG1: Loading zone file '/usr/lib/firewalld/zones/dmz.xml' >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_dmz -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_dmz_deny -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_dmz_allow -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_dmz -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_dmz_deny -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_dmz_allow -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_dmz 1 -t filter -j IN_ZONE_dmz_deny >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_dmz 2 -t filter -j IN_ZONE_dmz_allow >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_dmz 1 -t filter -j IN_ZONE_dmz_deny >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_dmz 2 -t filter -j IN_ZONE_dmz_allow >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_dmz_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_dmz_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:17:02 DEBUG1: Loading zone file '/usr/lib/firewalld/zones/internal.xml' >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_internal -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_internal_deny -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_internal_allow -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_internal -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_internal_deny -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_internal_allow -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_internal 1 -t filter -j IN_ZONE_internal_deny >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_internal 2 -t filter -j IN_ZONE_internal_allow >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_internal 1 -t filter -j IN_ZONE_internal_deny >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_internal 2 -t filter -j IN_ZONE_internal_allow >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_internal_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_internal_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_internal_allow -t filter -m udp -p udp --dport 631 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_internal_allow -t filter -m udp -p udp --dport 631 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_internal_allow -t filter -m udp -p udp --dport 5353 -d 224.0.0.251 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_internal_allow -t filter -m udp -p udp --dport 5353 -d ff02::fb -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_internal_allow -t filter -m udp -p udp --dport 137 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_internal_allow -t filter -m udp -p udp --dport 138 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_internal_allow -t filter -m udp -p udp --dport 137 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_internal_allow -t filter -m udp -p udp --dport 138 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.modules.modules: /sbin/modprobe nf_conntrack_netbios_ns >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_internal_allow -t filter -m udp -p udp --dport 546 -d fe80::/64 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:17:02 DEBUG1: Loading zone file '/usr/lib/firewalld/zones/block.xml' >2012-11-26 21:17:02 DEBUG1: Loading zone file '/usr/lib/firewalld/zones/public.xml' >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_public -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_public_deny -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_public_allow -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_public -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_public_deny -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_public_allow -t filter >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_public 1 -t filter -j IN_ZONE_public_deny >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_public 2 -t filter -j IN_ZONE_public_allow >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_public 1 -t filter -j IN_ZONE_public_deny >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_public 2 -t filter -j IN_ZONE_public_allow >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_public_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_public_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_public_allow -t filter -m udp -p udp --dport 5353 -d 224.0.0.251 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_public_allow -t filter -m udp -p udp --dport 5353 -d ff02::fb -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:17:02 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_public_allow -t filter -m udp -p udp --dport 546 -d fe80::/64 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:17:02 DEBUG1: Loading zone file '/usr/lib/firewalld/zones/trusted.xml' >2012-11-26 21:17:02 DEBUG1: Using default zone 'public' >2012-11-26 21:17:02 DEBUG1: config.IcmpTypeAdded('redirect') >2012-11-26 21:17:02 DEBUG1: config.IcmpTypeAdded('router-solicitation') >2012-11-26 21:17:02 DEBUG1: config.IcmpTypeAdded('parameter-problem') >2012-11-26 21:17:02 DEBUG1: config.IcmpTypeAdded('destination-unreachable') >2012-11-26 21:17:02 DEBUG1: config.IcmpTypeAdded('echo-request') >2012-11-26 21:17:02 DEBUG1: config.IcmpTypeAdded('echo-reply') >2012-11-26 21:17:02 DEBUG1: config.IcmpTypeAdded('source-quench') >2012-11-26 21:17:02 DEBUG1: config.IcmpTypeAdded('time-exceeded') >2012-11-26 21:17:02 DEBUG1: config.IcmpTypeAdded('router-advertisement') >2012-11-26 21:17:02 DEBUG1: config.ServiceAdded('cluster-suite') >2012-11-26 21:17:02 DEBUG1: config.ServiceAdded('pop3s') >2012-11-26 21:17:02 DEBUG1: config.ServiceAdded('bacula-client') >2012-11-26 21:17:02 DEBUG1: config.ServiceAdded('smtp') >2012-11-26 21:17:02 DEBUG1: config.ServiceAdded('ipp') >2012-11-26 21:17:02 DEBUG1: config.ServiceAdded('radius') >2012-11-26 21:17:02 DEBUG1: config.ServiceAdded('bacula') >2012-11-26 21:17:02 DEBUG1: config.ServiceAdded('ftp') >2012-11-26 21:17:02 DEBUG1: config.ServiceAdded('mdns') >2012-11-26 21:17:02 DEBUG1: config.ServiceAdded('samba') >2012-11-26 21:17:02 DEBUG1: config.ServiceAdded('dhcpv6-client') >2012-11-26 21:17:02 DEBUG1: config.ServiceAdded('https') >2012-11-26 21:17:02 DEBUG1: config.ServiceAdded('openvpn') >2012-11-26 21:17:02 DEBUG1: config.ServiceAdded('imaps') >2012-11-26 21:17:02 DEBUG1: config.ServiceAdded('samba-client') >2012-11-26 21:17:02 DEBUG1: config.ServiceAdded('http') >2012-11-26 21:17:02 DEBUG1: config.ServiceAdded('dns') >2012-11-26 21:17:02 DEBUG1: config.ServiceAdded('telnet') >2012-11-26 21:17:02 DEBUG1: config.ServiceAdded('libvirt') >2012-11-26 21:17:02 DEBUG1: config.ServiceAdded('ssh') >2012-11-26 21:17:02 DEBUG1: config.ServiceAdded('ipsec') >2012-11-26 21:17:02 DEBUG1: config.ServiceAdded('ipp-client') >2012-11-26 21:17:02 DEBUG1: config.ServiceAdded('amanda-client') >2012-11-26 21:17:02 DEBUG1: config.ServiceAdded('tftp-client') >2012-11-26 21:17:02 DEBUG1: config.ServiceAdded('nfs') >2012-11-26 21:17:02 DEBUG1: config.ServiceAdded('tftp') >2012-11-26 21:17:02 DEBUG1: config.ServiceAdded('libvirt-tls') >2012-11-26 21:17:02 DEBUG1: config.ZoneAdded('block') >2012-11-26 21:17:02 DEBUG1: config.ZoneAdded('drop') >2012-11-26 21:17:02 DEBUG1: config.ZoneAdded('work') >2012-11-26 21:17:02 DEBUG1: config.ZoneAdded('internal') >2012-11-26 21:17:02 DEBUG1: config.ZoneAdded('external') >2012-11-26 21:17:02 DEBUG1: config.ZoneAdded('home') >2012-11-26 21:17:02 DEBUG1: config.ZoneAdded('dmz') >2012-11-26 21:17:02 DEBUG1: config.ZoneAdded('public') >2012-11-26 21:17:02 DEBUG1: config.ZoneAdded('trusted') >2012-11-26 21:17:03 DEBUG1: zone.addInterface('', 'em1') >2012-11-26 21:17:03 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N FWDO_ZONE_public -t filter >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N FWDO_ZONE_public_deny -t filter >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N FWDO_ZONE_public_allow -t filter >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N FWDO_ZONE_public -t filter >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N FWDO_ZONE_public_deny -t filter >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N FWDO_ZONE_public_allow -t filter >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I FWDO_ZONE_public 1 -t filter -j FWDO_ZONE_public_deny >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I FWDO_ZONE_public 2 -t filter -j FWDO_ZONE_public_allow >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I FWDO_ZONE_public 1 -t filter -j FWDO_ZONE_public_deny >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I FWDO_ZONE_public 2 -t filter -j FWDO_ZONE_public_allow >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N FWDI_ZONE_public -t filter >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N FWDI_ZONE_public_deny -t filter >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N FWDI_ZONE_public_allow -t filter >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N FWDI_ZONE_public -t filter >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N FWDI_ZONE_public_deny -t filter >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N FWDI_ZONE_public_allow -t filter >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I FWDI_ZONE_public 1 -t filter -j FWDI_ZONE_public_deny >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I FWDI_ZONE_public 2 -t filter -j FWDI_ZONE_public_allow >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I FWDI_ZONE_public 1 -t filter -j FWDI_ZONE_public_deny >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I FWDI_ZONE_public 2 -t filter -j FWDI_ZONE_public_allow >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N PRE_ZONE_public -t mangle >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N PRE_ZONE_public_deny -t mangle >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N PRE_ZONE_public_allow -t mangle >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N PRE_ZONE_public -t mangle >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N PRE_ZONE_public_deny -t mangle >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N PRE_ZONE_public_allow -t mangle >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I PRE_ZONE_public 1 -t mangle -j PRE_ZONE_public_deny >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I PRE_ZONE_public 2 -t mangle -j PRE_ZONE_public_allow >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I PRE_ZONE_public 1 -t mangle -j PRE_ZONE_public_deny >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I PRE_ZONE_public 2 -t mangle -j PRE_ZONE_public_allow >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N PRE_ZONE_public -t nat >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N PRE_ZONE_public_deny -t nat >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N PRE_ZONE_public_allow -t nat >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I PRE_ZONE_public 1 -t nat -j PRE_ZONE_public_deny >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I PRE_ZONE_public 2 -t nat -j PRE_ZONE_public_allow >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N POST_ZONE_public -t nat >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N POST_ZONE_public_deny -t nat >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N POST_ZONE_public_allow -t nat >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I POST_ZONE_public 1 -t nat -j POST_ZONE_public_deny >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I POST_ZONE_public 2 -t nat -j POST_ZONE_public_allow >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A INPUT_ZONES -t filter -i em1 -j IN_ZONE_public >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A INPUT_ZONES -t filter -i em1 -j IN_ZONE_public >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A FORWARD_ZONES -t filter -o em1 -j FWDO_ZONE_public >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A FORWARD_ZONES -t filter -o em1 -j FWDO_ZONE_public >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A FORWARD_ZONES -t filter -i em1 -j FWDI_ZONE_public >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A FORWARD_ZONES -t filter -i em1 -j FWDI_ZONE_public >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A PREROUTING_ZONES -t mangle -i em1 -j PRE_ZONE_public >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A PREROUTING_ZONES -t nat -i em1 -j PRE_ZONE_public >2012-11-26 21:17:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A POSTROUTING_ZONES -t nat -o em1 -j POST_ZONE_public >2012-11-26 21:17:04 DEBUG1: zone.InterfaceAdded('public', 'em1') >2012-11-26 21:17:11 DEBUG1: Get('org.fedoraproject.FirewallD1', 'state') >2012-11-26 21:17:12 DEBUG1: direct.passthrough('eb', '-t','nat','-L') >2012-11-26 21:17:12 DEBUG2: firewall.core.ebtables.ebtables: /sbin/ebtables -t nat -L >2012-11-26 21:17:12 DEBUG1: direct.passthrough('ipv4', '-n','-L','FORWARD') >2012-11-26 21:17:12 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -n -L FORWARD >2012-11-26 21:17:12 DEBUG1: direct.passthrough('ipv6', '-n','-L','FORWARD') >2012-11-26 21:17:12 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -n -L FORWARD >2012-11-26 21:18:12 DEBUG1: config.listZones() >2012-11-26 21:18:12 DEBUG1: getDefaultZone() >2012-11-26 21:18:12 DEBUG1: zone.getZones() >2012-11-26 21:18:12 DEBUG1: listServices() >2012-11-26 21:18:12 DEBUG1: listServices() >2012-11-26 21:18:12 DEBUG1: zone.getServices('public') >2012-11-26 21:18:12 DEBUG1: zone.getPorts('public') >2012-11-26 21:18:12 DEBUG1: zone.queryMasquerade('public') >2012-11-26 21:18:12 DEBUG1: zone.getForwardPorts('public') >2012-11-26 21:18:12 DEBUG1: zone.getIcmpBlocks('public') >2012-11-26 21:18:12 DEBUG1: zone.isImmutable('public') >2012-11-26 21:18:12 DEBUG1: zone.getZones() >2012-11-26 21:18:12 DEBUG1: zone.getServices('public') >2012-11-26 21:18:12 DEBUG1: zone.getPorts('public') >2012-11-26 21:18:12 DEBUG1: zone.queryMasquerade('public') >2012-11-26 21:18:12 DEBUG1: zone.getForwardPorts('public') >2012-11-26 21:18:12 DEBUG1: zone.getIcmpBlocks('public') >2012-11-26 21:18:12 DEBUG1: zone.isImmutable('public') >2012-11-26 21:18:12 DEBUG1: listServices() >2012-11-26 21:18:12 DEBUG1: listServices() >2012-11-26 21:18:12 DEBUG1: zone.getServices('public') >2012-11-26 21:18:12 DEBUG1: zone.getPorts('public') >2012-11-26 21:18:12 DEBUG1: zone.queryMasquerade('public') >2012-11-26 21:18:12 DEBUG1: zone.getForwardPorts('public') >2012-11-26 21:18:12 DEBUG1: zone.getIcmpBlocks('public') >2012-11-26 21:18:12 DEBUG1: zone.isImmutable('public') >2012-11-26 21:18:12 DEBUG1: zone.getServices('public') >2012-11-26 21:18:12 DEBUG1: zone.getPorts('public') >2012-11-26 21:18:12 DEBUG1: zone.queryMasquerade('public') >2012-11-26 21:18:12 DEBUG1: zone.getForwardPorts('public') >2012-11-26 21:18:12 DEBUG1: zone.getIcmpBlocks('public') >2012-11-26 21:18:12 DEBUG1: zone.isImmutable('public') >2012-11-26 21:28:55 DEBUG1: start() >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -F >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -X >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -Z >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -P INPUT ACCEPT >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -P OUTPUT ACCEPT >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -P FORWARD ACCEPT >2012-11-26 21:28:55 DEBUG1: Loading firewalld config file '/etc/firewalld/firewalld.conf' >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -N INPUT_direct >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -N INPUT_ZONES >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I INPUT 1 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I INPUT 2 -i lo -j ACCEPT >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I INPUT 3 -j INPUT_direct >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I INPUT 4 -j INPUT_ZONES >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I INPUT 5 -p icmp -j ACCEPT >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I INPUT 6 -j REJECT --reject-with icmp-host-prohibited >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -N FORWARD_direct >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -N FORWARD_ZONES >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I FORWARD 1 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I FORWARD 2 -i lo -j ACCEPT >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I FORWARD 3 -j FORWARD_direct >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I FORWARD 4 -j FORWARD_ZONES >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I FORWARD 5 -p icmp -j ACCEPT >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I FORWARD 6 -j REJECT --reject-with icmp-host-prohibited >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -N OUTPUT_direct >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t filter -I OUTPUT 1 -j OUTPUT_direct >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -N PREROUTING_direct >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -I PREROUTING 1 -j PREROUTING_direct >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -N PREROUTING_ZONES >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -I PREROUTING 2 -j PREROUTING_ZONES >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -N POSTROUTING_direct >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -I POSTROUTING 1 -j POSTROUTING_direct >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -N INPUT_direct >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -I INPUT 1 -j INPUT_direct >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -N OUTPUT_direct >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -I OUTPUT 1 -j OUTPUT_direct >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -N FORWARD_direct >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t mangle -I FORWARD 1 -j FORWARD_direct >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -N PREROUTING_direct >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -I PREROUTING 1 -j PREROUTING_direct >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -N PREROUTING_ZONES >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -I PREROUTING 2 -j PREROUTING_ZONES >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -N POSTROUTING_direct >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -I POSTROUTING 1 -j POSTROUTING_direct >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -N POSTROUTING_ZONES >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -I POSTROUTING 2 -j POSTROUTING_ZONES >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -N OUTPUT_direct >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -t nat -I OUTPUT 1 -j OUTPUT_direct >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -N INPUT_direct >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -N INPUT_ZONES >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I INPUT 1 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I INPUT 2 -i lo -j ACCEPT >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I INPUT 3 -j INPUT_direct >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I INPUT 4 -j INPUT_ZONES >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I INPUT 5 -p ipv6-icmp -j ACCEPT >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I INPUT 6 -j REJECT --reject-with icmp6-adm-prohibited >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -N FORWARD_direct >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -N FORWARD_ZONES >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I FORWARD 1 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I FORWARD 2 -i lo -j ACCEPT >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I FORWARD 3 -j FORWARD_direct >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I FORWARD 4 -j FORWARD_ZONES >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I FORWARD 5 -p ipv6-icmp -j ACCEPT >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I FORWARD 6 -j REJECT --reject-with icmp6-adm-prohibited >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -N OUTPUT_direct >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t filter -I OUTPUT 1 -j OUTPUT_direct >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -N PREROUTING_direct >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -I PREROUTING 1 -j PREROUTING_direct >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -N PREROUTING_ZONES >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -I PREROUTING 2 -j PREROUTING_ZONES >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -N POSTROUTING_direct >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -I POSTROUTING 1 -j POSTROUTING_direct >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -N INPUT_direct >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -I INPUT 1 -j INPUT_direct >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -N OUTPUT_direct >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -I OUTPUT 1 -j OUTPUT_direct >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -N FORWARD_direct >2012-11-26 21:28:55 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -t mangle -I FORWARD 1 -j FORWARD_direct >2012-11-26 21:28:55 DEBUG1: Loading icmptype file '/usr/lib/firewalld/icmptypes/echo-request.xml' >2012-11-26 21:28:55 DEBUG1: Loading icmptype file '/usr/lib/firewalld/icmptypes/time-exceeded.xml' >2012-11-26 21:28:55 DEBUG1: Loading icmptype file '/usr/lib/firewalld/icmptypes/source-quench.xml' >2012-11-26 21:28:55 DEBUG1: Loading icmptype file '/usr/lib/firewalld/icmptypes/router-advertisement.xml' >2012-11-26 21:28:55 DEBUG1: Loading icmptype file '/usr/lib/firewalld/icmptypes/destination-unreachable.xml' >2012-11-26 21:28:55 DEBUG1: Loading icmptype file '/usr/lib/firewalld/icmptypes/parameter-problem.xml' >2012-11-26 21:28:55 DEBUG1: Loading icmptype file '/usr/lib/firewalld/icmptypes/echo-reply.xml' >2012-11-26 21:28:55 DEBUG1: Loading icmptype file '/usr/lib/firewalld/icmptypes/router-solicitation.xml' >2012-11-26 21:28:55 DEBUG1: Loading icmptype file '/usr/lib/firewalld/icmptypes/redirect.xml' >2012-11-26 21:28:55 DEBUG1: Loading service file '/usr/lib/firewalld/services/bacula-client.xml' >2012-11-26 21:28:55 DEBUG1: Loading service file '/usr/lib/firewalld/services/libvirt.xml' >2012-11-26 21:28:55 DEBUG1: Loading service file '/usr/lib/firewalld/services/ipp.xml' >2012-11-26 21:28:55 DEBUG1: Loading service file '/usr/lib/firewalld/services/imaps.xml' >2012-11-26 21:28:55 DEBUG1: Loading service file '/usr/lib/firewalld/services/cluster-suite.xml' >2012-11-26 21:28:55 DEBUG1: Loading service file '/usr/lib/firewalld/services/http.xml' >2012-11-26 21:28:55 DEBUG1: Loading service file '/usr/lib/firewalld/services/tftp-client.xml' >2012-11-26 21:28:55 DEBUG1: Loading service file '/usr/lib/firewalld/services/mdns.xml' >2012-11-26 21:28:55 DEBUG1: Loading service file '/usr/lib/firewalld/services/nfs.xml' >2012-11-26 21:28:55 DEBUG1: Loading service file '/usr/lib/firewalld/services/dhcpv6-client.xml' >2012-11-26 21:28:55 DEBUG1: Loading service file '/usr/lib/firewalld/services/pop3s.xml' >2012-11-26 21:28:55 DEBUG1: Loading service file '/usr/lib/firewalld/services/https.xml' >2012-11-26 21:28:55 DEBUG1: Loading service file '/usr/lib/firewalld/services/dns.xml' >2012-11-26 21:28:55 DEBUG1: Loading service file '/usr/lib/firewalld/services/openvpn.xml' >2012-11-26 21:28:55 DEBUG1: Loading service file '/usr/lib/firewalld/services/ipp-client.xml' >2012-11-26 21:28:55 DEBUG1: Loading service file '/usr/lib/firewalld/services/radius.xml' >2012-11-26 21:28:55 DEBUG1: Loading service file '/usr/lib/firewalld/services/samba.xml' >2012-11-26 21:28:55 DEBUG1: Loading service file '/usr/lib/firewalld/services/libvirt-tls.xml' >2012-11-26 21:28:55 DEBUG1: Loading service file '/usr/lib/firewalld/services/samba-client.xml' >2012-11-26 21:28:55 DEBUG1: Loading service file '/usr/lib/firewalld/services/ipsec.xml' >2012-11-26 21:28:55 DEBUG1: Loading service file '/usr/lib/firewalld/services/amanda-client.xml' >2012-11-26 21:28:55 DEBUG1: Loading service file '/usr/lib/firewalld/services/ftp.xml' >2012-11-26 21:28:55 DEBUG1: Loading service file '/usr/lib/firewalld/services/tftp.xml' >2012-11-26 21:28:55 DEBUG1: Loading service file '/usr/lib/firewalld/services/telnet.xml' >2012-11-26 21:28:55 DEBUG1: Loading service file '/usr/lib/firewalld/services/bacula.xml' >2012-11-26 21:28:55 DEBUG1: Loading service file '/usr/lib/firewalld/services/smtp.xml' >2012-11-26 21:28:55 DEBUG1: Loading service file '/usr/lib/firewalld/services/ssh.xml' >2012-11-26 21:28:56 DEBUG1: Loading zone file '/usr/lib/firewalld/zones/home.xml' >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_home -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_home_deny -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_home_allow -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_home -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_home_deny -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_home_allow -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_home 1 -t filter -j IN_ZONE_home_deny >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_home 2 -t filter -j IN_ZONE_home_allow >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_home 1 -t filter -j IN_ZONE_home_deny >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_home 2 -t filter -j IN_ZONE_home_allow >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_home_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_home_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_home_allow -t filter -m udp -p udp --dport 631 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_home_allow -t filter -m udp -p udp --dport 631 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_home_allow -t filter -m udp -p udp --dport 5353 -d 224.0.0.251 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_home_allow -t filter -m udp -p udp --dport 5353 -d ff02::fb -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_home_allow -t filter -m udp -p udp --dport 137 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_home_allow -t filter -m udp -p udp --dport 138 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_home_allow -t filter -m udp -p udp --dport 137 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_home_allow -t filter -m udp -p udp --dport 138 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:28:56 DEBUG2: firewall.core.modules.modules: /sbin/modprobe nf_conntrack_netbios_ns >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_home_allow -t filter -m udp -p udp --dport 546 -d fe80::/64 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:28:56 DEBUG1: Loading zone file '/usr/lib/firewalld/zones/drop.xml' >2012-11-26 21:28:56 DEBUG1: Loading zone file '/usr/lib/firewalld/zones/work.xml' >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_work -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_work_deny -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_work_allow -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_work -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_work_deny -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_work_allow -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_work 1 -t filter -j IN_ZONE_work_deny >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_work 2 -t filter -j IN_ZONE_work_allow >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_work 1 -t filter -j IN_ZONE_work_deny >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_work 2 -t filter -j IN_ZONE_work_allow >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_work_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_work_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_work_allow -t filter -m udp -p udp --dport 5353 -d 224.0.0.251 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_work_allow -t filter -m udp -p udp --dport 5353 -d ff02::fb -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_work_allow -t filter -m udp -p udp --dport 631 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_work_allow -t filter -m udp -p udp --dport 631 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_work_allow -t filter -m udp -p udp --dport 546 -d fe80::/64 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:28:56 DEBUG1: Loading zone file '/usr/lib/firewalld/zones/external.xml' >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_external -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_external_deny -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_external_allow -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_external -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_external_deny -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_external_allow -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_external 1 -t filter -j IN_ZONE_external_deny >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_external 2 -t filter -j IN_ZONE_external_allow >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_external 1 -t filter -j IN_ZONE_external_deny >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_external 2 -t filter -j IN_ZONE_external_allow >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_external_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_external_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N POST_ZONE_external -t nat >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N POST_ZONE_external_deny -t nat >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N POST_ZONE_external_allow -t nat >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I POST_ZONE_external 1 -t nat -j POST_ZONE_external_deny >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I POST_ZONE_external 2 -t nat -j POST_ZONE_external_allow >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N FWDO_ZONE_external -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N FWDO_ZONE_external_deny -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N FWDO_ZONE_external_allow -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N FWDO_ZONE_external -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N FWDO_ZONE_external_deny -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N FWDO_ZONE_external_allow -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I FWDO_ZONE_external 1 -t filter -j FWDO_ZONE_external_deny >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I FWDO_ZONE_external 2 -t filter -j FWDO_ZONE_external_allow >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I FWDO_ZONE_external 1 -t filter -j FWDO_ZONE_external_deny >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I FWDO_ZONE_external 2 -t filter -j FWDO_ZONE_external_allow >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A POST_ZONE_external_allow -t nat -j MASQUERADE >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A FWDO_ZONE_external_allow -t filter -j ACCEPT >2012-11-26 21:28:56 DEBUG1: Loading zone file '/usr/lib/firewalld/zones/dmz.xml' >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_dmz -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_dmz_deny -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_dmz_allow -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_dmz -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_dmz_deny -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_dmz_allow -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_dmz 1 -t filter -j IN_ZONE_dmz_deny >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_dmz 2 -t filter -j IN_ZONE_dmz_allow >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_dmz 1 -t filter -j IN_ZONE_dmz_deny >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_dmz 2 -t filter -j IN_ZONE_dmz_allow >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_dmz_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_dmz_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:28:56 DEBUG1: Loading zone file '/usr/lib/firewalld/zones/internal.xml' >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_internal -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_internal_deny -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_internal_allow -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_internal -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_internal_deny -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_internal_allow -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_internal 1 -t filter -j IN_ZONE_internal_deny >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_internal 2 -t filter -j IN_ZONE_internal_allow >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_internal 1 -t filter -j IN_ZONE_internal_deny >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_internal 2 -t filter -j IN_ZONE_internal_allow >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_internal_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_internal_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_internal_allow -t filter -m udp -p udp --dport 631 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_internal_allow -t filter -m udp -p udp --dport 631 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_internal_allow -t filter -m udp -p udp --dport 5353 -d 224.0.0.251 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_internal_allow -t filter -m udp -p udp --dport 5353 -d ff02::fb -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_internal_allow -t filter -m udp -p udp --dport 137 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_internal_allow -t filter -m udp -p udp --dport 138 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_internal_allow -t filter -m udp -p udp --dport 137 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_internal_allow -t filter -m udp -p udp --dport 138 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:28:56 DEBUG2: firewall.core.modules.modules: /sbin/modprobe nf_conntrack_netbios_ns >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_internal_allow -t filter -m udp -p udp --dport 546 -d fe80::/64 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:28:56 DEBUG1: Loading zone file '/usr/lib/firewalld/zones/block.xml' >2012-11-26 21:28:56 DEBUG1: Loading zone file '/usr/lib/firewalld/zones/public.xml' >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_public -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_public_deny -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N IN_ZONE_public_allow -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_public -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_public_deny -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N IN_ZONE_public_allow -t filter >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_public 1 -t filter -j IN_ZONE_public_deny >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I IN_ZONE_public 2 -t filter -j IN_ZONE_public_allow >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_public 1 -t filter -j IN_ZONE_public_deny >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I IN_ZONE_public 2 -t filter -j IN_ZONE_public_allow >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_public_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_public_allow -t filter -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A IN_ZONE_public_allow -t filter -m udp -p udp --dport 5353 -d 224.0.0.251 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_public_allow -t filter -m udp -p udp --dport 5353 -d ff02::fb -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:28:56 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A IN_ZONE_public_allow -t filter -m udp -p udp --dport 546 -d fe80::/64 -m conntrack --ctstate NEW -j ACCEPT >2012-11-26 21:28:56 DEBUG1: Loading zone file '/usr/lib/firewalld/zones/trusted.xml' >2012-11-26 21:28:56 DEBUG1: Using default zone 'public' >2012-11-26 21:28:56 DEBUG1: config.IcmpTypeAdded('redirect') >2012-11-26 21:28:56 DEBUG1: config.IcmpTypeAdded('router-solicitation') >2012-11-26 21:28:56 DEBUG1: config.IcmpTypeAdded('parameter-problem') >2012-11-26 21:28:56 DEBUG1: config.IcmpTypeAdded('destination-unreachable') >2012-11-26 21:28:56 DEBUG1: config.IcmpTypeAdded('echo-request') >2012-11-26 21:28:56 DEBUG1: config.IcmpTypeAdded('echo-reply') >2012-11-26 21:28:56 DEBUG1: config.IcmpTypeAdded('source-quench') >2012-11-26 21:28:56 DEBUG1: config.IcmpTypeAdded('time-exceeded') >2012-11-26 21:28:56 DEBUG1: config.IcmpTypeAdded('router-advertisement') >2012-11-26 21:28:56 DEBUG1: config.ServiceAdded('cluster-suite') >2012-11-26 21:28:56 DEBUG1: config.ServiceAdded('pop3s') >2012-11-26 21:28:56 DEBUG1: config.ServiceAdded('bacula-client') >2012-11-26 21:28:56 DEBUG1: config.ServiceAdded('smtp') >2012-11-26 21:28:56 DEBUG1: config.ServiceAdded('ipp') >2012-11-26 21:28:56 DEBUG1: config.ServiceAdded('radius') >2012-11-26 21:28:56 DEBUG1: config.ServiceAdded('bacula') >2012-11-26 21:28:56 DEBUG1: config.ServiceAdded('ftp') >2012-11-26 21:28:56 DEBUG1: config.ServiceAdded('mdns') >2012-11-26 21:28:56 DEBUG1: config.ServiceAdded('samba') >2012-11-26 21:28:56 DEBUG1: config.ServiceAdded('dhcpv6-client') >2012-11-26 21:28:56 DEBUG1: config.ServiceAdded('https') >2012-11-26 21:28:56 DEBUG1: config.ServiceAdded('openvpn') >2012-11-26 21:28:56 DEBUG1: config.ServiceAdded('imaps') >2012-11-26 21:28:56 DEBUG1: config.ServiceAdded('samba-client') >2012-11-26 21:28:56 DEBUG1: config.ServiceAdded('http') >2012-11-26 21:28:56 DEBUG1: config.ServiceAdded('dns') >2012-11-26 21:28:56 DEBUG1: config.ServiceAdded('telnet') >2012-11-26 21:28:56 DEBUG1: config.ServiceAdded('libvirt') >2012-11-26 21:28:56 DEBUG1: config.ServiceAdded('ssh') >2012-11-26 21:28:56 DEBUG1: config.ServiceAdded('ipsec') >2012-11-26 21:28:56 DEBUG1: config.ServiceAdded('ipp-client') >2012-11-26 21:28:56 DEBUG1: config.ServiceAdded('amanda-client') >2012-11-26 21:28:56 DEBUG1: config.ServiceAdded('tftp-client') >2012-11-26 21:28:56 DEBUG1: config.ServiceAdded('nfs') >2012-11-26 21:28:56 DEBUG1: config.ServiceAdded('tftp') >2012-11-26 21:28:56 DEBUG1: config.ServiceAdded('libvirt-tls') >2012-11-26 21:28:56 DEBUG1: config.ZoneAdded('block') >2012-11-26 21:28:56 DEBUG1: config.ZoneAdded('drop') >2012-11-26 21:28:56 DEBUG1: config.ZoneAdded('work') >2012-11-26 21:28:56 DEBUG1: config.ZoneAdded('internal') >2012-11-26 21:28:56 DEBUG1: config.ZoneAdded('external') >2012-11-26 21:28:56 DEBUG1: config.ZoneAdded('home') >2012-11-26 21:28:56 DEBUG1: config.ZoneAdded('dmz') >2012-11-26 21:28:56 DEBUG1: config.ZoneAdded('public') >2012-11-26 21:28:56 DEBUG1: config.ZoneAdded('trusted') >2012-11-26 21:28:57 DEBUG1: zone.addInterface('', 'em1') >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N FWDO_ZONE_public -t filter >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N FWDO_ZONE_public_deny -t filter >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N FWDO_ZONE_public_allow -t filter >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N FWDO_ZONE_public -t filter >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N FWDO_ZONE_public_deny -t filter >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N FWDO_ZONE_public_allow -t filter >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I FWDO_ZONE_public 1 -t filter -j FWDO_ZONE_public_deny >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I FWDO_ZONE_public 2 -t filter -j FWDO_ZONE_public_allow >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I FWDO_ZONE_public 1 -t filter -j FWDO_ZONE_public_deny >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I FWDO_ZONE_public 2 -t filter -j FWDO_ZONE_public_allow >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N FWDI_ZONE_public -t filter >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N FWDI_ZONE_public_deny -t filter >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N FWDI_ZONE_public_allow -t filter >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N FWDI_ZONE_public -t filter >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N FWDI_ZONE_public_deny -t filter >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N FWDI_ZONE_public_allow -t filter >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I FWDI_ZONE_public 1 -t filter -j FWDI_ZONE_public_deny >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I FWDI_ZONE_public 2 -t filter -j FWDI_ZONE_public_allow >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I FWDI_ZONE_public 1 -t filter -j FWDI_ZONE_public_deny >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I FWDI_ZONE_public 2 -t filter -j FWDI_ZONE_public_allow >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N PRE_ZONE_public -t mangle >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N PRE_ZONE_public_deny -t mangle >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N PRE_ZONE_public_allow -t mangle >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N PRE_ZONE_public -t mangle >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N PRE_ZONE_public_deny -t mangle >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -N PRE_ZONE_public_allow -t mangle >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I PRE_ZONE_public 1 -t mangle -j PRE_ZONE_public_deny >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I PRE_ZONE_public 2 -t mangle -j PRE_ZONE_public_allow >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I PRE_ZONE_public 1 -t mangle -j PRE_ZONE_public_deny >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -I PRE_ZONE_public 2 -t mangle -j PRE_ZONE_public_allow >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N PRE_ZONE_public -t nat >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N PRE_ZONE_public_deny -t nat >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N PRE_ZONE_public_allow -t nat >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I PRE_ZONE_public 1 -t nat -j PRE_ZONE_public_deny >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I PRE_ZONE_public 2 -t nat -j PRE_ZONE_public_allow >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N POST_ZONE_public -t nat >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N POST_ZONE_public_deny -t nat >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -N POST_ZONE_public_allow -t nat >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I POST_ZONE_public 1 -t nat -j POST_ZONE_public_deny >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -I POST_ZONE_public 2 -t nat -j POST_ZONE_public_allow >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A INPUT_ZONES -t filter -i em1 -j IN_ZONE_public >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A INPUT_ZONES -t filter -i em1 -j IN_ZONE_public >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A FORWARD_ZONES -t filter -o em1 -j FWDO_ZONE_public >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A FORWARD_ZONES -t filter -o em1 -j FWDO_ZONE_public >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A FORWARD_ZONES -t filter -i em1 -j FWDI_ZONE_public >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -A FORWARD_ZONES -t filter -i em1 -j FWDI_ZONE_public >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A PREROUTING_ZONES -t mangle -i em1 -j PRE_ZONE_public >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A PREROUTING_ZONES -t nat -i em1 -j PRE_ZONE_public >2012-11-26 21:28:57 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -A POSTROUTING_ZONES -t nat -o em1 -j POST_ZONE_public >2012-11-26 21:28:57 DEBUG1: zone.InterfaceAdded('public', 'em1') >2012-11-26 21:29:04 DEBUG1: Get('org.fedoraproject.FirewallD1', 'state') >2012-11-26 21:29:04 DEBUG1: direct.passthrough('eb', '-t','nat','-L') >2012-11-26 21:29:04 DEBUG2: firewall.core.ebtables.ebtables: /sbin/ebtables -t nat -L >2012-11-26 21:29:04 DEBUG1: direct.passthrough('ipv4', '-n','-L','FORWARD') >2012-11-26 21:29:04 DEBUG2: firewall.core.ipXtables.ip4tables: /sbin/iptables -n -L FORWARD >2012-11-26 21:29:04 DEBUG1: direct.passthrough('ipv6', '-n','-L','FORWARD') >2012-11-26 21:29:04 DEBUG2: firewall.core.ipXtables.ip6tables: /sbin/ip6tables -n -L FORWARD >2012-11-26 21:30:25 DEBUG1: config.listZones() >2012-11-26 21:30:25 DEBUG1: getDefaultZone() >2012-11-26 21:30:25 DEBUG1: zone.getZones() >2012-11-26 21:30:25 DEBUG1: listServices() >2012-11-26 21:30:25 DEBUG1: listServices() >2012-11-26 21:30:25 DEBUG1: zone.getServices('public') >2012-11-26 21:30:25 DEBUG1: zone.getPorts('public') >2012-11-26 21:30:25 DEBUG1: zone.queryMasquerade('public') >2012-11-26 21:30:25 DEBUG1: zone.getForwardPorts('public') >2012-11-26 21:30:25 DEBUG1: zone.getIcmpBlocks('public') >2012-11-26 21:30:25 DEBUG1: zone.isImmutable('public') >2012-11-26 21:30:25 DEBUG1: zone.getZones() >2012-11-26 21:30:25 DEBUG1: zone.getServices('public') >2012-11-26 21:30:25 DEBUG1: zone.getPorts('public') >2012-11-26 21:30:25 DEBUG1: zone.queryMasquerade('public') >2012-11-26 21:30:25 DEBUG1: zone.getForwardPorts('public') >2012-11-26 21:30:25 DEBUG1: zone.getIcmpBlocks('public') >2012-11-26 21:30:25 DEBUG1: zone.isImmutable('public') >2012-11-26 21:30:25 DEBUG1: listServices() >2012-11-26 21:30:25 DEBUG1: listServices() >2012-11-26 21:30:25 DEBUG1: zone.getServices('public') >2012-11-26 21:30:25 DEBUG1: zone.getPorts('public') >2012-11-26 21:30:25 DEBUG1: zone.queryMasquerade('public') >2012-11-26 21:30:25 DEBUG1: zone.getForwardPorts('public') >2012-11-26 21:30:25 DEBUG1: zone.getIcmpBlocks('public') >2012-11-26 21:30:25 DEBUG1: zone.isImmutable('public') >2012-11-26 21:30:25 DEBUG1: zone.getServices('public') >2012-11-26 21:30:25 DEBUG1: zone.getPorts('public') >2012-11-26 21:30:25 DEBUG1: zone.queryMasquerade('public') >2012-11-26 21:30:25 DEBUG1: zone.getForwardPorts('public') >2012-11-26 21:30:25 DEBUG1: zone.getIcmpBlocks('public') >2012-11-26 21:30:25 DEBUG1: zone.isImmutable('public')
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 878214
: 652329 |
653060
|
653659
|
656347
|
657460