Bug 1096209 - Rich PORT/PROTOCOL rules not applied in zones with non-default targets
Summary: Rich PORT/PROTOCOL rules not applied in zones with non-default targets
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Fedora
Classification: Fedora
Component: firewalld
Version: 20
Hardware: All
OS: Linux
unspecified
medium
Target Milestone: ---
Assignee: Thomas Woerner
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2014-05-09 12:52 UTC by Jay Cornwall
Modified: 2014-06-19 22:58 UTC (History)
2 users (show)

Fixed In Version: firewalld-0.3.10-1.fc20
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2014-06-19 22:58:57 UTC
Type: Bug
Embargoed:


Attachments (Terms of Use)
[PATCH] firewalld: Apply all rich rules for non-default targets (1.59 KB, patch)
2014-05-09 12:52 UTC, Jay Cornwall
no flags Details | Diff

Description Jay Cornwall 2014-05-09 12:52:31 UTC
Created attachment 894029 [details]
[PATCH] firewalld: Apply all rich rules for non-default targets

Description of problem:

A zone with a non-default target will not have RULE or PROTOCOL rich rules applied.

Version-Release number of selected component (if applicable):

0.3.9.3-1

How reproducible:

Always

Steps to Reproduce:

<?xml version="1.0" encoding="utf-8"?>
<zone target="ACCEPT">
  <short>Public</short>
  <description>For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.</description>
  <interface name="eth0"/>
  <rule family="ipv4">
    <port protocol="tcp" port="22"/>
    <accept/>
  </rule>
</zone>

Actual results:

Rule not applied in IN_public chain.

Expected results:

Rule applied in IN_public chain.

Additional info:

Fix attached.

Comment 1 Jiri Popelka 2014-05-09 15:26:42 UTC
(In reply to Jay Cornwall from comment #0)
> Actual results:
> Rule not applied in IN_public chain.

'/sbin/iptables -t filter -A ACCEPT_allow -m tcp -p tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT' failed: iptables: No chain/target/match by that name.

Comment 3 Fedora Update System 2014-05-29 09:09:01 UTC
firewalld-0.3.10-1.fc20 has been submitted as an update for Fedora 20.
https://admin.fedoraproject.org/updates/firewalld-0.3.10-1.fc20

Comment 4 Fedora Update System 2014-05-29 23:23:47 UTC
Package firewalld-0.3.10-1.fc20:
* should fix your issue,
* was pushed to the Fedora 20 testing repository,
* should be available at your local mirror within two days.
Update it with:
# su -c 'yum update --enablerepo=updates-testing firewalld-0.3.10-1.fc20'
as soon as you are able to.
Please go to the following url:
https://admin.fedoraproject.org/updates/FEDORA-2014-6834/firewalld-0.3.10-1.fc20
then log in and leave karma (feedback).

Comment 5 Fedora Update System 2014-06-19 22:58:57 UTC
firewalld-0.3.10-1.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.