Package: fail2ban Version: 0.11.2-1 Severity: serious Hello,
Making this RC as this could cause ordering issue during boot and firewalling rules not being properly applied, feel free to donwgrade It seem that the deb_no_iptables_service patch removes nftables.service from PartOf=, but recent nftables is shipping this service and the bullseye defaults to nft as well Shouldn't nftables.service be readded? Kind regards, Laurent Bigonville -- System Information: Debian Release: bullseye/sid APT prefers unstable-debug APT policy: (500, 'unstable-debug'), (500, 'unstable'), (1, 'experimental-debug'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 5.10.0-4-amd64 (SMP w/8 CPU threads) Kernel taint flags: TAINT_WARN, TAINT_FIRMWARE_WORKAROUND Locale: LANG=fr_BE.UTF-8, LC_CTYPE=fr_BE.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: SELinux: enabled - Mode: Permissive - Policy name: refpolicy Versions of packages fail2ban depends on: ii lsb-base 11.1.0 ii python3 3.9.2-2 Versions of packages fail2ban recommends: ii iptables 1.8.7-1 ii nftables 0.9.8-3 pn python3-pyinotify <none> pn python3-systemd <none> ii whois 5.5.8 Versions of packages fail2ban suggests: ii bsd-mailx [mailx] 8.1.2-0.20180807cvs-2 pn monit <none> ii rsyslog [system-log-daemon] 8.2102.0-2 ii sqlite3 3.34.1-3