Package: fail2ban
Version: 0.11.2-1
Severity: serious

Hello,

Making this RC as this could cause ordering issue during boot and
firewalling rules not being properly applied, feel free to donwgrade

It seem that the deb_no_iptables_service patch removes nftables.service
from PartOf=, but recent nftables is shipping this service and the
bullseye defaults to nft as well

Shouldn't nftables.service be readded?

Kind regards,
Laurent Bigonville


-- System Information:
Debian Release: bullseye/sid
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'unstable'), (1, 
'experimental-debug'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.10.0-4-amd64 (SMP w/8 CPU threads)
Kernel taint flags: TAINT_WARN, TAINT_FIRMWARE_WORKAROUND
Locale: LANG=fr_BE.UTF-8, LC_CTYPE=fr_BE.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: SELinux: enabled - Mode: Permissive - Policy name: refpolicy

Versions of packages fail2ban depends on:
ii  lsb-base  11.1.0
ii  python3   3.9.2-2

Versions of packages fail2ban recommends:
ii  iptables           1.8.7-1
ii  nftables           0.9.8-3
pn  python3-pyinotify  <none>
pn  python3-systemd    <none>
ii  whois              5.5.8

Versions of packages fail2ban suggests:
ii  bsd-mailx [mailx]            8.1.2-0.20180807cvs-2
pn  monit                        <none>
ii  rsyslog [system-log-daemon]  8.2102.0-2
ii  sqlite3                      3.34.1-3

Reply via email to