https://bugs.kde.org/show_bug.cgi?id=486340
Bug ID: 486340
Summary: Failure to show firewalld status
Classification: Applications
Product: systemsettings
Version: 6.0.4
Platform: Arch Linux
OS: Linux
Status: REPORTED
Severity: normal
Priority: NOR
Component: kcm_firewall
Assignee: [email protected]
Reporter: [email protected]
CC: [email protected], [email protected]
Target Milestone: ---
SUMMARY
Firewall status show as disabled when it is enabled.
STEPS TO REPRODUCE
1. `firewall-cmd --state` shows "running"
2. `systemctl status firewalld.service` shows "active"/"enabled".
3. Open the KDE settings, connection, firewall.
4. type in user password
OBSERVED RESULT
status is disabled
EXPECTED RESULT
correct status and rules shown.
SOFTWARE/OS VERSIONS
Operating System: Arch Linux
KDE Plasma Version: 6.0.4
KDE Frameworks Version: 6.1.0
Qt Version: 6.7.0
Kernel Version: 6.8.7-arch1-2 (64-bit)
Graphics Platform: Wayland
Processors: 12 × AMD Ryzen 5 PRO 6650U with Radeon Graphics
Memory: 30.7 GiB of RAM
Graphics Processor: AMD Radeon Graphics
Manufacturer: HP
Product Name: HP EliteBook 845 14 inch G9 Notebook PC
System Version: SBKPF
ADDITIONAL INFORMATION
```
● firewalld.service - firewalld - dynamic firewall daemon
Loaded: loaded (/usr/lib/systemd/system/firewalld.service; enabled;
preset: disabled)
Active: active (running) since Tue 2024-04-30 05:59:04 -03; 2h 24min ago
Docs: man:firewalld(1)
Main PID: 715 (firewalld)
Tasks: 2 (limit: 37657)
Memory: 55.8M (peak: 57.4M)
CPU: 346ms
CGroup: /system.slice/firewalld.service
└─715 /usr/bin/python /usr/bin/firewalld --nofork --nopid
Apr 30 05:59:03 systemd[1]: Starting firewalld - dynamic firewall daemon...
Apr 30 05:59:04 systemd[1]: Started firewalld - dynamic firewall daemon.
```
no other backends available
```
# systemctl status ufw.service
Unit ufw.service could not be found.
```
about screen for firewall settings panel shows:
Backend: firewalld
Version: 2.1.1
nft frontends installed on system: iptables-nft, nftables, firewalld.
$ iptables --list
Chain INPUT (policy ACCEPT)
target prot opt source destination
Chain FORWARD (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
$ firewall-cmd --get-active-zones
public (default)
interfaces: wifi
$ firewall-cmd --info-zone=public
public (default, active)
target: default
ingress-priority: 0
egress-priority: 0
icmp-block-inversion: no
interfaces: wlp1s0
sources:
services: dhcpv6-client ssh portknock exitlesstornode wg8
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
--
You are receiving this mail because:
You are watching all bug changes.