Package: iptables Version: 1.8.11-1 Severity: important Dear Maintainer,
I have since downgraded to the trixie packages & dependencies to get myself back up and running. * What led up to the situation? Upgraded my system and any Docker containers that were on a bridge network (created with docker network create) no longer had network access beyond localhost * What exactly did you do (or not do) that was effective (or ineffective)? Downgraded to 1.8.10-4 from trixie * What was the outcome of this action? FORWARD rules for my created docker network were inserted after I downgraded and restarted the docker systemd service. * What outcome did you expect instead? The checks to fail. Essentially, when docker starts up, it seems to use the -C command of iptables to check whether a rule has been inserted correctly. When I run what docker runs manually (iptables -v --wait -t filter -C FORWARD -i br-e52603214070 -o br-e52603214070 -j ACCEPT) with the verbose flag, it returns this rule: -A FORWARD -i docker0 -o docker0 -j ACCEPT -- System Information: Debian Release: trixie/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 6.11.6-amd64 (SMP w/12 CPU threads; PREEMPT) Kernel taint flags: TAINT_USER Locale: LANG=C, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages iptables depends on: ii libc6 2.40-3 ii libip4tc2 1.8.10-4+b1 ii libip6tc2 1.8.10-4+b1 ii libmnl0 1.0.5-3 ii libnetfilter-conntrack3 1.1.0-1 ii libnfnetlink0 1.0.2-3 ii libnftnl11 1.2.8-1 ii libxtables12 1.8.10-4+b1 ii netbase 6.4 Versions of packages iptables recommends: ii nftables 1.1.1-1 Versions of packages iptables suggests: pn firewalld <none> ii kmod 33+20240816-2 -- no debconf information