Package: iptables
Version: 1.8.11-1
Severity: important

Dear Maintainer,

I have since downgraded to the trixie packages & dependencies to get myself 
back up and running.


   * What led up to the situation?
Upgraded my system and any Docker containers that were on a bridge network 
(created with docker network create) no longer had network access beyond 
localhost

   * What exactly did you do (or not do) that was effective (or
     ineffective)?
Downgraded to 1.8.10-4 from trixie
   * What was the outcome of this action?
FORWARD rules for my created docker network were inserted after I downgraded 
and restarted the docker systemd service.
   * What outcome did you expect instead?
The checks to fail.

Essentially, when docker starts up, it seems to use the -C command of iptables 
to check whether a rule has been inserted correctly. When I run what docker 
runs manually (iptables -v --wait -t filter -C FORWARD -i br-e52603214070 -o 
br-e52603214070 -j ACCEPT) with the verbose flag, it returns this rule: -A 
FORWARD -i docker0 -o docker0 -j ACCEPT


-- System Information:
Debian Release: trixie/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.11.6-amd64 (SMP w/12 CPU threads; PREEMPT)
Kernel taint flags: TAINT_USER
Locale: LANG=C, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages iptables depends on:
ii  libc6                    2.40-3
ii  libip4tc2                1.8.10-4+b1
ii  libip6tc2                1.8.10-4+b1
ii  libmnl0                  1.0.5-3
ii  libnetfilter-conntrack3  1.1.0-1
ii  libnfnetlink0            1.0.2-3
ii  libnftnl11               1.2.8-1
ii  libxtables12             1.8.10-4+b1
ii  netbase                  6.4

Versions of packages iptables recommends:
ii  nftables  1.1.1-1

Versions of packages iptables suggests:
pn  firewalld  <none>
ii  kmod       33+20240816-2

-- no debconf information

Reply via email to