Bug 134490 - "service iptables panic" disables loopback
Summary: "service iptables panic" disables loopback
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Red Hat Enterprise Linux 3
Classification: Red Hat
Component: iptables
Version: 3.0
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Thomas Woerner
QA Contact: Ben Levenson
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2004-10-04 01:42 UTC by Ian Laurie
Modified: 2007-11-30 22:07 UTC (History)
0 users

Fixed In Version:
Doc Type: Enhancement
Doc Text:
Clone Of:
Environment:
Last Closed: 2004-10-04 11:59:27 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description Ian Laurie 2004-10-04 01:42:02 UTC
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.4.1)
Gecko/20031114

Description of problem:
The command "service iptables panic" disables the loopback interface
because the script /etc/rc.d/init.d/iptables calls the script function
"set_policy" with the argument "DROP".

It might be a good idea to modify the script so "set_policy" does a
check for the "DROP" policy and explicitly enables the loopback. 
Something along these lines:

if [ "$policy" == "DROP" ]; then
    $IPTABLES -A INPUT -i lo -j ACCEPT
    $IPTABLES -A OUTPUT -o lo -j ACCEPT
fi

Version-Release number of selected component (if applicable):
iptables-1.2.8-12.3

How reproducible:
Always

Steps to Reproduce:
1. Issue "service iptables panic"
2.
3.
    

Actual Results:  Firewall adopts a blanket DROP policy, breaking all
flow, even the loopback.

Expected Results:  It may be better if the loopback were left enabled
even when "panic" is used.

Additional info: Very low priority enhancement request.  I think all
Red Hat versions have this same issue.

Comment 1 Thomas Woerner 2004-10-04 11:59:27 UTC
Panic should and is dropping all traffic that is going through the
firewall. This includes the loopback devices. 
Panic is an emergency option.

Closing as "NOT A BUG".


Note You need to log in before you can comment on or make changes to this bug.