<html>
<head>
<base href="https://bugzilla.netfilter.org/">
</head>
<body>
<p>
<div>
<b><a class="bz_bug_link
bz_status_REOPENED "
title="REOPENED - Error: COMMAND_FAILED: 'python-nftables' failed"
href="https://bugzilla.netfilter.org/show_bug.cgi?id=1777#c16">Comment # 16</a>
on <a class="bz_bug_link
bz_status_REOPENED "
title="REOPENED - Error: COMMAND_FAILED: 'python-nftables' failed"
href="https://bugzilla.netfilter.org/show_bug.cgi?id=1777">bug 1777</a>
from <span class="vcard"><a class="email" href="mailto:fs3000@proton.me" title="fs3000@proton.me">fs3000@proton.me</a>
</span></b>
<pre>So in a fresh system install, purged nftables, other related packages already
present and deleted nftables conf. Installed firewalld fresh, debian 12
packages.
Error:
Error: COMMAND_FAILED: 'python-nftables' failed: internal:0:0-0: Error: Could
not process rule: No such file or directory
internal:0:0-0: Error: Could not process rule: No such file or directory
JSON blob:
{"nftables": [{"metainfo": {"json_schema_version": 1}}, {"add": {"chain":
{"family": "inet", "table": "firewalld", "name": "filter_IN_internal"}}},
{"add": {"chain": {"family": "inet", "table": "firewalld", "name":
"filter_IN_internal_pre"}}}, {"add": {"chain": {"family": "inet", "table":
"firewalld", "name": "filter_IN_internal_log"}}}, {"add": {"chain": {"family":
"inet", "table": "firewalld", "name": "filter_IN_internal_deny"}}}, {"add":
{"chain": {"family": "inet", "table": "firewalld", "name":
"filter_IN_internal_allow"}}}, {"add": {"chain": {"family": "inet", "table":
"firewalld", "name": "filter_IN_internal_post"}}}, {"add": {"rule": {"family":
"inet", "table": "firewalld", "chain": "filter_IN_internal", "expr": [{"jump":
{"target": "filter_INPUT_POLICIES_pre"}}]}}}, {"add": {"rule": {"family":
"inet", "table": "firewalld", "chain": "filter_IN_internal", "expr": [{"jump":
{"target": "filter_IN_internal_pre"}}]}}}, {"add": {"rule": {"family": "inet",
"table": "firewalld", "chain": "filter_IN_internal", "expr": [{"jump":
{"target": "filter_IN_internal_log"}}]}}}, {"add": {"rule": {"family": "inet",
"table": "firewalld", "chain": "filter_IN_internal", "expr": [{"jump":
{"target": "filter_IN_internal_deny"}}]}}}, {"add": {"rule": {"family": "inet",
"table": "firewalld", "chain": "filter_IN_internal", "expr": [{"jump":
{"target": "filter_IN_internal_allow"}}]}}}, {"add": {"rule": {"family":
"inet", "table": "firewalld", "chain": "filter_IN_internal", "expr": [{"jump":
{"target": "filter_IN_internal_post"}}]}}}, {"add": {"rule": {"family": "inet",
"table": "firewalld", "chain": "filter_IN_internal", "expr": [{"jump":
{"target": "filter_INPUT_POLICIES_post"}}]}}}, {"add": {"rule": {"family":
"inet", "table": "firewalld", "chain": "filter_IN_internal", "expr":
[{"reject": {"type": "icmpx", "expr": "admin-prohibited"}}]}}}, {"add":
{"rule": {"family": "inet", "table": "firewalld", "chain":
"filter_IN_internal_allow", "expr": [{"match": {"left": {"payload":
{"protocol": "tcp", "field": "dport"}}, "op": "==", "right": 22}}, {"accept":
null}]}}}, {"add": {"rule": {"family": "inet", "table": "firewalld", "chain":
"filter_IN_internal_allow", "expr": [{"match": {"left": {"payload":
{"protocol": "ip", "field": "daddr"}}, "op": "==", "right": "224.0.0.251"}},
{"match": {"left": {"payload": {"protocol": "udp", "field": "dport"}}, "op":
"==", "right": 5353}}, {"accept": null}]}}}, {"add": {"rule": {"family":
"inet", "table": "firewalld", "chain": "filter_IN_internal_allow", "expr":
[{"match": {"left": {"payload": {"protocol": "ip6", "field": "daddr"}}, "op":
"==", "right": "ff02::fb"}}, {"match": {"left": {"payload": {"protocol": "udp",
"field": "dport"}}, "op": "==", "right": 5353}}, {"accept": null}]}}}, {"add":
{"ct helper": {"family": "inet", "table": "firewalld", "name":
"helper-netbios-ns-udp", "type": "netbios-ns", "protocol": "udp"}}}, {"add":
{"rule": {"family": "inet", "table": "firewalld", "chain":
"filter_IN_internal_allow", "expr": [{"match": {"left": {"payload":
{"protocol": "udp", "field": "dport"}}, "op": "==", "right": 137}}, {"ct
helper": "helper-netbios-ns-udp"}]}}}, {"add": {"rule": {"family": "inet",
"table": "firewalld", "chain": "filter_IN_internal_allow", "expr": [{"match":
{"left": {"payload": {"protocol": "udp", "field": "dport"}}, "op": "==",
"right": 137}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet",
"table": "firewalld", "chain": "filter_IN_internal_allow", "expr": [{"match":
{"left": {"payload": {"protocol": "udp", "field": "dport"}}, "op": "==",
"right": 138}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet",
"table": "firewalld", "chain": "filter_IN_internal_allow", "expr": [{"match":
{"left": {"payload": {"protocol": "ip6", "field": "daddr"}}, "op": "==",
"right": {"prefix": {"addr": "fe80::", "len": 64}}}}, {"match": {"left":
{"payload": {"protocol": "udp", "field": "dport"}}, "op": "==", "right": 546}},
{"accept": null}]}}}, {"add": {"chain": {"family": "inet", "table":
"firewalld", "name": "nat_POST_internal"}}}, {"add": {"chain": {"family":
"inet", "table": "firewalld", "name": "nat_POST_internal_pre"}}}, {"add":
{"chain": {"family": "inet", "table": "firewalld", "name":
"nat_POST_internal_log"}}}, {"add": {"chain": {"family": "inet", "table":
"firewalld", "name": "nat_POST_internal_deny"}}}, {"add": {"chain": {"family":
"inet", "table": "firewalld", "name": "nat_POST_internal_allow"}}}, {"add":
{"chain": {"family": "inet", "table": "firewalld", "name":
"nat_POST_internal_post"}}}, {"add": {"rule": {"family": "inet", "table":
"firewalld", "chain": "nat_POST_internal", "expr": [{"jump": {"target":
"nat_POSTROUTING_POLICIES_pre"}}]}}}, {"add": {"rule": {"family": "inet",
"table": "firewalld", "chain": "nat_POST_internal", "expr": [{"jump":
{"target": "nat_POST_internal_pre"}}]}}}, {"add": {"rule": {"family": "inet",
"table": "firewalld", "chain": "nat_POST_internal", "expr": [{"jump":
{"target": "nat_POST_internal_log"}}]}}}, {"add": {"rule": {"family": "inet",
"table": "firewalld", "chain": "nat_POST_internal", "expr": [{"jump":
{"target": "nat_POST_internal_deny"}}]}}}, {"add": {"rule": {"family": "inet",
"table": "firewalld", "chain": "nat_POST_internal", "expr": [{"jump":
{"target": "nat_POST_internal_allow"}}]}}}, {"add": {"rule": {"family": "inet",
"table": "firewalld", "chain": "nat_POST_internal", "expr": [{"jump":
{"target": "nat_POST_internal_post"}}]}}}, {"add": {"rule": {"family": "inet",
"table": "firewalld", "chain": "nat_POST_internal", "expr": [{"jump":
{"target": "nat_POSTROUTING_POLICIES_post"}}]}}}, {"add": {"chain": {"family":
"inet", "table": "firewalld", "name": "filter_FWD_internal"}}}, {"add":
{"chain": {"family": "inet", "table": "firewalld", "name":
"filter_FWD_internal_pre"}}}, {"add": {"chain": {"family": "inet", "table":
"firewalld", "name": "filter_FWD_internal_log"}}}, {"add": {"chain": {"family":
"inet", "table": "firewalld", "name": "filter_FWD_internal_deny"}}}, {"add":
{"chain": {"family": "inet", "table": "firewalld", "name":
"filter_FWD_internal_allow"}}}, {"add": {"chain": {"family": "inet", "table":
"firewalld", "name": "filter_FWD_internal_post"}}}, {"add": {"rule": {"family":
"inet", "table": "firewalld", "chain": "filter_FWD_internal", "expr": [{"jump":
{"target": "filter_FORWARD_POLICIES_pre"}}]}}}, {"add": {"rule": {"family":
"inet", "table": "firewalld", "chain": "filter_FWD_internal", "expr": [{"jump":
{"target": "filter_FWD_internal_pre"}}]}}}, {"add": {"rule": {"family": "inet",
"table": "firewalld", "chain": "filter_FWD_internal", "expr": [{"jump":
{"target": "filter_FWD_internal_log"}}]}}}, {"add": {"rule": {"family": "inet",
"table": "firewalld", "chain": "filter_FWD_internal", "expr": [{"jump":
{"target": "filter_FWD_internal_deny"}}]}}}, {"add": {"rule": {"family":
"inet", "table": "firewalld", "chain": "filter_FWD_internal", "expr": [{"jump":
{"target": "filter_FWD_internal_allow"}}]}}}, {"add": {"rule": {"family":
"inet", "table": "firewalld", "chain": "filter_FWD_internal", "expr": [{"jump":
{"target": "filter_FWD_internal_post"}}]}}}, {"add": {"rule": {"family":
"inet", "table": "firewalld", "chain": "filter_FWD_internal", "expr": [{"jump":
{"target": "filter_FORWARD_POLICIES_post"}}]}}}, {"add": {"rule": {"family":
"inet", "table": "firewalld", "chain": "filter_FWD_internal", "expr":
[{"reject": {"type": "icmpx", "expr": "admin-prohibited"}}]}}}, {"add":
{"chain": {"family": "inet", "table": "firewalld", "name":
"nat_PRE_internal"}}}, {"add": {"chain": {"family": "inet", "table":
"firewalld", "name": "nat_PRE_internal_pre"}}}, {"add": {"chain": {"family":
"inet", "table": "firewalld", "name": "nat_PRE_internal_log"}}}, {"add":
{"chain": {"family": "inet", "table": "firewalld", "name":
"nat_PRE_internal_deny"}}}, {"add": {"chain": {"family": "inet", "table":
"firewalld", "name": "nat_PRE_internal_allow"}}}, {"add": {"chain": {"family":
"inet", "table": "firewalld", "name": "nat_PRE_internal_post"}}}, {"add":
{"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_internal",
"expr": [{"jump": {"target": "nat_PREROUTING_POLICIES_pre"}}]}}}, {"add":
{"rule": {"family": "inet", "table": "firewalld", "chain": "nat_PRE_internal",
"expr": [{"jump": {"target": "nat_PRE_internal_pre"}}]}}}, {"add": {"rule":
{"family": "inet", "table": "firewalld", "chain": "nat_PRE_internal", "expr":
[{"jump": {"target": "nat_PRE_internal_log"}}]}}}, {"add": {"rule": {"family":
"inet", "table": "firewalld", "chain": "nat_PRE_internal", "expr": [{"jump":
{"target": "nat_PRE_internal_deny"}}]}}}, {"add": {"rule": {"family": "inet",
"table": "firewalld", "chain": "nat_PRE_internal", "expr": [{"jump": {"target":
"nat_PRE_internal_allow"}}]}}}, {"add": {"rule": {"family": "inet", "table":
"firewalld", "chain": "nat_PRE_internal", "expr": [{"jump": {"target":
"nat_PRE_internal_post"}}]}}}, {"add": {"rule": {"family": "inet", "table":
"firewalld", "chain": "nat_PRE_internal", "expr": [{"jump": {"target":
"nat_PREROUTING_POLICIES_post"}}]}}}, {"add": {"chain": {"family": "inet",
"table": "firewalld", "name": "mangle_PRE_internal"}}}, {"add": {"chain":
{"family": "inet", "table": "firewalld", "name": "mangle_PRE_internal_pre"}}},
{"add": {"chain": {"family": "inet", "table": "firewalld", "name":
"mangle_PRE_internal_log"}}}, {"add": {"chain": {"family": "inet", "table":
"firewalld", "name": "mangle_PRE_internal_deny"}}}, {"add": {"chain":
{"family": "inet", "table": "firewalld", "name":
"mangle_PRE_internal_allow"}}}, {"add": {"chain": {"family": "inet", "table":
"firewalld", "name": "mangle_PRE_internal_post"}}}, {"add": {"rule": {"family":
"inet", "table": "firewalld", "chain": "mangle_PRE_internal", "expr": [{"jump":
{"target": "mangle_PREROUTING_POLICIES_pre"}}]}}}, {"add": {"rule": {"family":
"inet", "table": "firewalld", "chain": "mangle_PRE_internal", "expr": [{"jump":
{"target": "mangle_PRE_internal_pre"}}]}}}, {"add": {"rule": {"family": "inet",
"table": "firewalld", "chain": "mangle_PRE_internal", "expr": [{"jump":
{"target": "mangle_PRE_internal_log"}}]}}}, {"add": {"rule": {"family": "inet",
"table": "firewalld", "chain": "mangle_PRE_internal", "expr": [{"jump":
{"target": "mangle_PRE_internal_deny"}}]}}}, {"add": {"rule": {"family":
"inet", "table": "firewalld", "chain": "mangle_PRE_internal", "expr": [{"jump":
{"target": "mangle_PRE_internal_allow"}}]}}}, {"add": {"rule": {"family":
"inet", "table": "firewalld", "chain": "mangle_PRE_internal", "expr": [{"jump":
{"target": "mangle_PRE_internal_post"}}]}}}, {"add": {"rule": {"family":
"inet", "table": "firewalld", "chain": "mangle_PRE_internal", "expr": [{"jump":
{"target": "mangle_PREROUTING_POLICIES_post"}}]}}}, {"add": {"rule": {"family":
"inet", "table": "firewalld", "chain": "filter_IN_internal", "index": 6,
"expr": [{"match": {"left": {"meta": {"key": "l4proto"}}, "op": "==", "right":
{"set": ["icmp", "icmpv6"]}}}, {"accept": null}]}}}, {"insert": {"rule":
{"family": "inet", "table": "firewalld", "chain": "filter_INPUT_ZONES", "expr":
[{"match": {"left": {"meta": {"key": "iifname"}}, "op": "==", "right":
"eth1"}}, {"goto": {"target": "filter_IN_internal"}}]}}}, {"insert": {"rule":
{"family": "inet", "table": "firewalld", "chain": "nat_POSTROUTING_ZONES",
"expr": [{"match": {"left": {"meta": {"key": "oifname"}}, "op": "==", "right":
"eth1"}}, {"goto": {"target": "nat_POST_internal"}}]}}}, {"insert": {"rule":
{"family": "inet", "table": "firewalld", "chain": "filter_FORWARD_ZONES",
"expr": [{"match": {"left": {"meta": {"key": "iifname"}}, "op": "==", "right":
"eth1"}}, {"goto": {"target": "filter_FWD_internal"}}]}}}, {"insert": {"rule":
{"family": "inet", "table": "firewalld", "chain": "nat_PREROUTING_ZONES",
"expr": [{"match": {"left": {"meta": {"key": "iifname"}}, "op": "==", "right":
"eth1"}}, {"goto": {"target": "nat_PRE_internal"}}]}}}, {"insert": {"rule":
{"family": "inet", "table": "firewalld", "chain": "mangle_PREROUTING_ZONES",
"expr": [{"match": {"left": {"meta": {"key": "iifname"}}, "op": "==", "right":
"eth1"}}, {"goto": {"target": "mangle_PRE_internal"}}]}}}, {"add": {"rule":
{"family": "inet", "table": "firewalld", "chain": "filter_FWD_internal_allow",
"expr": [{"match": {"left": {"meta": {"key": "oifname"}}, "op": "==", "right":
"eth1"}}, {"accept": null}]}}}]}
nftables.conf that came with the package:
#!/usr/sbin/nft -f
flush ruleset
table inet filter {
chain input {
type filter hook input priority filter;
}
chain forward {
type filter hook forward priority filter;
}
chain output {
type filter hook output priority filter;
}
}</pre>
</div>
</p>
<hr>
<span>You are receiving this mail because:</span>
<ul>
<li>You are watching all bug changes.</li>
</ul>
</body>
</html>