[Bug 1777] Error: COMMAND_FAILED: 'python-nftables' failed

bugzilla-daemon at netfilter.org bugzilla-daemon at netfilter.org
Tue Nov 12 19:47:09 CET 2024


https://bugzilla.netfilter.org/show_bug.cgi?id=1777

--- Comment #19 from Pablo Neira Ayuso <pablo at netfilter.org> ---
(In reply to fs3000 from comment #16)
> So in a fresh system install,  purged nftables, other related packages
> already present and deleted nftables conf. Installed firewalld fresh, debian
> 12 packages.
> 
> Error:
> 
> Error: COMMAND_FAILED: 'python-nftables' failed: internal:0:0-0: Error:
> Could not process rule: No such file or directory
> 
> internal:0:0-0: Error: Could not process rule: No such file or directory
> 
> 
> JSON blob:
> {"nftables": [{"metainfo": {"json_schema_version": 1}}, {"add": {"chain":
> {"family": "inet", "table": "firewalld", "name": "filter_IN_internal"}}},
> {"add": {"chain": {"family": "inet", "table": "firewalld", "name":
> "filter_IN_internal_pre"}}}, {"add": {"chain": {"family": "inet", "table":
> "firewalld", "name": "filter_IN_internal_log"}}}, {"add": {"chain":
> {"family": "inet", "table": "firewalld", "name":
> "filter_IN_internal_deny"}}}, {"add": {"chain": {"family": "inet", "table":
> "firewalld", "name": "filter_IN_internal_allow"}}}, {"add": {"chain":
> {"family": "inet", "table": "firewalld", "name":
> "filter_IN_internal_post"}}}, {"add": {"rule": {"family": "inet", "table":
> "firewalld", "chain": "filter_IN_internal", "expr": [{"jump": {"target":
> "filter_INPUT_POLICIES_pre"}}]}}}, {"add": {"rule": {"family": "inet",
> "table": "firewalld", "chain": "filter_IN_internal", "expr": [{"jump":
> {"target": "filter_IN_internal_pre"}}]}}}, {"add": {"rule": {"family":
> "inet", "table": "firewalld", "chain": "filter_IN_internal", "expr":
> [{"jump": {"target": "filter_IN_internal_log"}}]}}}, {"add": {"rule":
> {"family": "inet", "table": "firewalld", "chain": "filter_IN_internal",
> "expr": [{"jump": {"target": "filter_IN_internal_deny"}}]}}}, {"add":
> {"rule": {"family": "inet", "table": "firewalld", "chain":
> "filter_IN_internal", "expr": [{"jump": {"target":
> "filter_IN_internal_allow"}}]}}}, {"add": {"rule": {"family": "inet",
> "table": "firewalld", "chain": "filter_IN_internal", "expr": [{"jump":
> {"target": "filter_IN_internal_post"}}]}}}, {"add": {"rule": {"family":
> "inet", "table": "firewalld", "chain": "filter_IN_internal", "expr":
> [{"jump": {"target": "filter_INPUT_POLICIES_post"}}]}}}, {"add": {"rule":
> {"family": "inet", "table": "firewalld", "chain": "filter_IN_internal",
> "expr": [{"reject": {"type": "icmpx", "expr": "admin-prohibited"}}]}}},
> {"add": {"rule": {"family": "inet", "table": "firewalld", "chain":
> "filter_IN_internal_allow", "expr": [{"match": {"left": {"payload":
> {"protocol": "tcp", "field": "dport"}}, "op": "==", "right": 22}},
> {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table":
> "firewalld", "chain": "filter_IN_internal_allow", "expr": [{"match":
> {"left": {"payload": {"protocol": "ip", "field": "daddr"}}, "op": "==",
> "right": "224.0.0.251"}}, {"match": {"left": {"payload": {"protocol": "udp",
> "field": "dport"}}, "op": "==", "right": 5353}}, {"accept": null}]}}},
> {"add": {"rule": {"family": "inet", "table": "firewalld", "chain":
> "filter_IN_internal_allow", "expr": [{"match": {"left": {"payload":
> {"protocol": "ip6", "field": "daddr"}}, "op": "==", "right": "ff02::fb"}},
> {"match": {"left": {"payload": {"protocol": "udp", "field": "dport"}}, "op":
> "==", "right": 5353}}, {"accept": null}]}}}, {"add": {"ct helper":
> {"family": "inet", "table": "firewalld", "name": "helper-netbios-ns-udp",
> "type": "netbios-ns", "protocol": "udp"}}}, {"add": {"rule": {"family":
> "inet", "table": "firewalld", "chain": "filter_IN_internal_allow", "expr":
> [{"match": {"left": {"payload": {"protocol": "udp", "field": "dport"}},
> "op": "==", "right": 137}}, {"ct helper": "helper-netbios-ns-udp"}]}}},
> {"add": {"rule": {"family": "inet", "table": "firewalld", "chain":
> "filter_IN_internal_allow", "expr": [{"match": {"left": {"payload":
> {"protocol": "udp", "field": "dport"}}, "op": "==", "right": 137}},
> {"accept": null}]}}}, {"add": {"rule": {"family": "inet", "table":
> "firewalld", "chain": "filter_IN_internal_allow", "expr": [{"match":
> {"left": {"payload": {"protocol": "udp", "field": "dport"}}, "op": "==",
> "right": 138}}, {"accept": null}]}}}, {"add": {"rule": {"family": "inet",
> "table": "firewalld", "chain": "filter_IN_internal_allow", "expr":
> [{"match": {"left": {"payload": {"protocol": "ip6", "field": "daddr"}},
> "op": "==", "right": {"prefix": {"addr": "fe80::", "len": 64}}}}, {"match":
> {"left": {"payload": {"protocol": "udp", "field": "dport"}}, "op": "==",
> "right": 546}}, {"accept": null}]}}}, {"add": {"chain": {"family": "inet",
> "table": "firewalld", "name": "nat_POST_internal"}}}, {"add": {"chain":
> {"family": "inet", "table": "firewalld", "name": "nat_POST_internal_pre"}}},
> {"add": {"chain": {"family": "inet", "table": "firewalld", "name":
> "nat_POST_internal_log"}}}, {"add": {"chain": {"family": "inet", "table":
> "firewalld", "name": "nat_POST_internal_deny"}}}, {"add": {"chain":
> {"family": "inet", "table": "firewalld", "name":
> "nat_POST_internal_allow"}}}, {"add": {"chain": {"family": "inet", "table":
> "firewalld", "name": "nat_POST_internal_post"}}}, {"add": {"rule":
> {"family": "inet", "table": "firewalld", "chain": "nat_POST_internal",
> "expr": [{"jump": {"target": "nat_POSTROUTING_POLICIES_pre"}}]}}}, {"add":
> {"rule": {"family": "inet", "table": "firewalld", "chain":
> "nat_POST_internal", "expr": [{"jump": {"target":
> "nat_POST_internal_pre"}}]}}}, {"add": {"rule": {"family": "inet", "table":
> "firewalld", "chain": "nat_POST_internal", "expr": [{"jump": {"target":
> "nat_POST_internal_log"}}]}}}, {"add": {"rule": {"family": "inet", "table":
> "firewalld", "chain": "nat_POST_internal", "expr": [{"jump": {"target":
> "nat_POST_internal_deny"}}]}}}, {"add": {"rule": {"family": "inet", "table":
> "firewalld", "chain": "nat_POST_internal", "expr": [{"jump": {"target":
> "nat_POST_internal_allow"}}]}}}, {"add": {"rule": {"family": "inet",
> "table": "firewalld", "chain": "nat_POST_internal", "expr": [{"jump":
> {"target": "nat_POST_internal_post"}}]}}}, {"add": {"rule": {"family":
> "inet", "table": "firewalld", "chain": "nat_POST_internal", "expr":
> [{"jump": {"target": "nat_POSTROUTING_POLICIES_post"}}]}}}, {"add":
> {"chain": {"family": "inet", "table": "firewalld", "name":
> "filter_FWD_internal"}}}, {"add": {"chain": {"family": "inet", "table":
> "firewalld", "name": "filter_FWD_internal_pre"}}}, {"add": {"chain":
> {"family": "inet", "table": "firewalld", "name":
> "filter_FWD_internal_log"}}}, {"add": {"chain": {"family": "inet", "table":
> "firewalld", "name": "filter_FWD_internal_deny"}}}, {"add": {"chain":
> {"family": "inet", "table": "firewalld", "name":
> "filter_FWD_internal_allow"}}}, {"add": {"chain": {"family": "inet",
> "table": "firewalld", "name": "filter_FWD_internal_post"}}}, {"add":
> {"rule": {"family": "inet", "table": "firewalld", "chain":
> "filter_FWD_internal", "expr": [{"jump": {"target":
> "filter_FORWARD_POLICIES_pre"}}]}}}, {"add": {"rule": {"family": "inet",
> "table": "firewalld", "chain": "filter_FWD_internal", "expr": [{"jump":
> {"target": "filter_FWD_internal_pre"}}]}}}, {"add": {"rule": {"family":
> "inet", "table": "firewalld", "chain": "filter_FWD_internal", "expr":
> [{"jump": {"target": "filter_FWD_internal_log"}}]}}}, {"add": {"rule":
> {"family": "inet", "table": "firewalld", "chain": "filter_FWD_internal",
> "expr": [{"jump": {"target": "filter_FWD_internal_deny"}}]}}}, {"add":
> {"rule": {"family": "inet", "table": "firewalld", "chain":
> "filter_FWD_internal", "expr": [{"jump": {"target":
> "filter_FWD_internal_allow"}}]}}}, {"add": {"rule": {"family": "inet",
> "table": "firewalld", "chain": "filter_FWD_internal", "expr": [{"jump":
> {"target": "filter_FWD_internal_post"}}]}}}, {"add": {"rule": {"family":
> "inet", "table": "firewalld", "chain": "filter_FWD_internal", "expr":
> [{"jump": {"target": "filter_FORWARD_POLICIES_post"}}]}}}, {"add": {"rule":
> {"family": "inet", "table": "firewalld", "chain": "filter_FWD_internal",
> "expr": [{"reject": {"type": "icmpx", "expr": "admin-prohibited"}}]}}},
> {"add": {"chain": {"family": "inet", "table": "firewalld", "name":
> "nat_PRE_internal"}}}, {"add": {"chain": {"family": "inet", "table":
> "firewalld", "name": "nat_PRE_internal_pre"}}}, {"add": {"chain": {"family":
> "inet", "table": "firewalld", "name": "nat_PRE_internal_log"}}}, {"add":
> {"chain": {"family": "inet", "table": "firewalld", "name":
> "nat_PRE_internal_deny"}}}, {"add": {"chain": {"family": "inet", "table":
> "firewalld", "name": "nat_PRE_internal_allow"}}}, {"add": {"chain":
> {"family": "inet", "table": "firewalld", "name": "nat_PRE_internal_post"}}},
> {"add": {"rule": {"family": "inet", "table": "firewalld", "chain":
> "nat_PRE_internal", "expr": [{"jump": {"target":
> "nat_PREROUTING_POLICIES_pre"}}]}}}, {"add": {"rule": {"family": "inet",
> "table": "firewalld", "chain": "nat_PRE_internal", "expr": [{"jump":
> {"target": "nat_PRE_internal_pre"}}]}}}, {"add": {"rule": {"family": "inet",
> "table": "firewalld", "chain": "nat_PRE_internal", "expr": [{"jump":
> {"target": "nat_PRE_internal_log"}}]}}}, {"add": {"rule": {"family": "inet",
> "table": "firewalld", "chain": "nat_PRE_internal", "expr": [{"jump":
> {"target": "nat_PRE_internal_deny"}}]}}}, {"add": {"rule": {"family":
> "inet", "table": "firewalld", "chain": "nat_PRE_internal", "expr": [{"jump":
> {"target": "nat_PRE_internal_allow"}}]}}}, {"add": {"rule": {"family":
> "inet", "table": "firewalld", "chain": "nat_PRE_internal", "expr": [{"jump":
> {"target": "nat_PRE_internal_post"}}]}}}, {"add": {"rule": {"family":
> "inet", "table": "firewalld", "chain": "nat_PRE_internal", "expr": [{"jump":
> {"target": "nat_PREROUTING_POLICIES_post"}}]}}}, {"add": {"chain":
> {"family": "inet", "table": "firewalld", "name": "mangle_PRE_internal"}}},
> {"add": {"chain": {"family": "inet", "table": "firewalld", "name":
> "mangle_PRE_internal_pre"}}}, {"add": {"chain": {"family": "inet", "table":
> "firewalld", "name": "mangle_PRE_internal_log"}}}, {"add": {"chain":
> {"family": "inet", "table": "firewalld", "name":
> "mangle_PRE_internal_deny"}}}, {"add": {"chain": {"family": "inet", "table":
> "firewalld", "name": "mangle_PRE_internal_allow"}}}, {"add": {"chain":
> {"family": "inet", "table": "firewalld", "name":
> "mangle_PRE_internal_post"}}}, {"add": {"rule": {"family": "inet", "table":
> "firewalld", "chain": "mangle_PRE_internal", "expr": [{"jump": {"target":
> "mangle_PREROUTING_POLICIES_pre"}}]}}}, {"add": {"rule": {"family": "inet",
> "table": "firewalld", "chain": "mangle_PRE_internal", "expr": [{"jump":
> {"target": "mangle_PRE_internal_pre"}}]}}}, {"add": {"rule": {"family":
> "inet", "table": "firewalld", "chain": "mangle_PRE_internal", "expr":
> [{"jump": {"target": "mangle_PRE_internal_log"}}]}}}, {"add": {"rule":
> {"family": "inet", "table": "firewalld", "chain": "mangle_PRE_internal",
> "expr": [{"jump": {"target": "mangle_PRE_internal_deny"}}]}}}, {"add":
> {"rule": {"family": "inet", "table": "firewalld", "chain":
> "mangle_PRE_internal", "expr": [{"jump": {"target":
> "mangle_PRE_internal_allow"}}]}}}, {"add": {"rule": {"family": "inet",
> "table": "firewalld", "chain": "mangle_PRE_internal", "expr": [{"jump":
> {"target": "mangle_PRE_internal_post"}}]}}}, {"add": {"rule": {"family":
> "inet", "table": "firewalld", "chain": "mangle_PRE_internal", "expr":
> [{"jump": {"target": "mangle_PREROUTING_POLICIES_post"}}]}}}, {"add":
> {"rule": {"family": "inet", "table": "firewalld", "chain":
> "filter_IN_internal", "index": 6, "expr": [{"match": {"left": {"meta":
> {"key": "l4proto"}}, "op": "==", "right": {"set": ["icmp", "icmpv6"]}}},
> {"accept": null}]}}}, {"insert": {"rule": {"family": "inet", "table":
> "firewalld", "chain": "filter_INPUT_ZONES", "expr": [{"match": {"left":
> {"meta": {"key": "iifname"}}, "op": "==", "right": "eth1"}}, {"goto":
> {"target": "filter_IN_internal"}}]}}}, {"insert": {"rule": {"family":
> "inet", "table": "firewalld", "chain": "nat_POSTROUTING_ZONES", "expr":
> [{"match": {"left": {"meta": {"key": "oifname"}}, "op": "==", "right":
> "eth1"}}, {"goto": {"target": "nat_POST_internal"}}]}}}, {"insert": {"rule":
> {"family": "inet", "table": "firewalld", "chain": "filter_FORWARD_ZONES",
> "expr": [{"match": {"left": {"meta": {"key": "iifname"}}, "op": "==",
> "right": "eth1"}}, {"goto": {"target": "filter_FWD_internal"}}]}}},
> {"insert": {"rule": {"family": "inet", "table": "firewalld", "chain":
> "nat_PREROUTING_ZONES", "expr": [{"match": {"left": {"meta": {"key":
> "iifname"}}, "op": "==", "right": "eth1"}}, {"goto": {"target":
> "nat_PRE_internal"}}]}}}, {"insert": {"rule": {"family": "inet", "table":
> "firewalld", "chain": "mangle_PREROUTING_ZONES", "expr": [{"match": {"left":
> {"meta": {"key": "iifname"}}, "op": "==", "right": "eth1"}}, {"goto":
> {"target": "mangle_PRE_internal"}}]}}}, {"add": {"rule": {"family": "inet",
> "table": "firewalld", "chain": "filter_FWD_internal_allow", "expr":
> [{"match": {"left": {"meta": {"key": "oifname"}}, "op": "==", "right":
> "eth1"}}, {"accept": null}]}}}]}

I still see in this JSON blob reference to chains that do not exist.

> nftables.conf that came with the package:
> 
> #!/usr/sbin/nft -f
> 
> flush ruleset
> 
> table inet filter {
>         chain input {
>                 type filter hook input priority filter;
>         }
>         chain forward {
>                 type filter hook forward priority filter;
>         }
>         chain output {
>                 type filter hook output priority filter;
>         }
> }

Is this your existing ruleset? Makes no sense to me.

-- 
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20241112/225937d3/attachment-0001.html>


More information about the netfilter-buglog mailing list