ip6table-restore failed in Debian buster/sid2019 Community Moderator Electioniptables will match the following ICMP request packet as ESTABLISHED state after the first reply packet is sentISC DHCP Server - A Client's Uplink Is Not WorkingUsing IPTables to block all connections but still be able to backup vServerDebian network disappearingWhy do some TCP reset packets show up in my iptables log?Problem with lilypond upgrade on Debian “buster/sid”Internet access in LXC container with nftablesPort forwarding in Linux for UDP doesn't workPackage libmysql++-dev is not found in Debian buster/sidiptables-restore failed in Debian buster/sid if it has --multiport option in the rules file

Why did the Mercure fail?

Is it better practice to read straight from sheet music rather than memorize it?

Is there a single word describing earning money through any means?

Energy measurement from position eigenstate

Which one is correct as adjective “protruding” or “protruded”?

Problem with TransformedDistribution

Non-trope happy ending?

How to explain what's wrong with this application of the chain rule?

It grows, but water kills it

why `nmap 192.168.1.97` returns less services than `nmap 127.0.0.1`?

How to indicate a cut out for a product window

The IT department bottlenecks progress. How should I handle this?

How do you respond to a colleague from another team when they're wrongly expecting that you'll help them?

WiFi Thermostat, No C Terminal on Furnace

Count the occurrence of each unique word in the file

What is this called? Old film camera viewer?

What if a revenant (monster) gains fire resistance?

Where does the bonus feat in the cleric starting package come from?

Creature in Shazam mid-credits scene?

Aragorn's "guise" in the Orthanc Stone

What should you do if you miss a job interview (deliberately)?

How to bake one texture for one mesh with multiple textures blender 2.8

If a character has darkvision, can they see through an area of nonmagical darkness filled with lightly obscuring gas?

Drawing ramified coverings with tikz



ip6table-restore failed in Debian buster/sid



2019 Community Moderator Electioniptables will match the following ICMP request packet as ESTABLISHED state after the first reply packet is sentISC DHCP Server - A Client's Uplink Is Not WorkingUsing IPTables to block all connections but still be able to backup vServerDebian network disappearingWhy do some TCP reset packets show up in my iptables log?Problem with lilypond upgrade on Debian “buster/sid”Internet access in LXC container with nftablesPort forwarding in Linux for UDP doesn't workPackage libmysql++-dev is not found in Debian buster/sidiptables-restore failed in Debian buster/sid if it has --multiport option in the rules file










2















I have the below iptable rule in /etc/iptables/rule.V6 and /etc/iptables/rule.V4



-4 -A INPUT -p icmp -j ACCEPT
-6 -A INPUT -p ipv6-icmp -j ACCEPT


when I tried to restart the netfilter-persistent, it internally calls the iptables-restore and ip6tables-restore.



ip6tables-restore failed because it couldn't understand the below rule



-4 -A INPUT -p icmp -j ACCEPT


Below is the error



root@rs-dal:/etc/iptables# ip6tables-restore rules.q
Error occurred at line: 15
Try `ip6tables-restore -h' or 'ip6tables-restore --help' for more information.


Ideally the rule that starts with -4 will be ignored by the ip6tables-restore, but that doesn't seems to be working in Debian Buster.



But, iptables-restore worked fine, it is only the issue with ip6tables-restore.
How to fix this issue?










share|improve this question









New contributor




Karthik is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
























    2















    I have the below iptable rule in /etc/iptables/rule.V6 and /etc/iptables/rule.V4



    -4 -A INPUT -p icmp -j ACCEPT
    -6 -A INPUT -p ipv6-icmp -j ACCEPT


    when I tried to restart the netfilter-persistent, it internally calls the iptables-restore and ip6tables-restore.



    ip6tables-restore failed because it couldn't understand the below rule



    -4 -A INPUT -p icmp -j ACCEPT


    Below is the error



    root@rs-dal:/etc/iptables# ip6tables-restore rules.q
    Error occurred at line: 15
    Try `ip6tables-restore -h' or 'ip6tables-restore --help' for more information.


    Ideally the rule that starts with -4 will be ignored by the ip6tables-restore, but that doesn't seems to be working in Debian Buster.



    But, iptables-restore worked fine, it is only the issue with ip6tables-restore.
    How to fix this issue?










    share|improve this question









    New contributor




    Karthik is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
    Check out our Code of Conduct.






















      2












      2








      2








      I have the below iptable rule in /etc/iptables/rule.V6 and /etc/iptables/rule.V4



      -4 -A INPUT -p icmp -j ACCEPT
      -6 -A INPUT -p ipv6-icmp -j ACCEPT


      when I tried to restart the netfilter-persistent, it internally calls the iptables-restore and ip6tables-restore.



      ip6tables-restore failed because it couldn't understand the below rule



      -4 -A INPUT -p icmp -j ACCEPT


      Below is the error



      root@rs-dal:/etc/iptables# ip6tables-restore rules.q
      Error occurred at line: 15
      Try `ip6tables-restore -h' or 'ip6tables-restore --help' for more information.


      Ideally the rule that starts with -4 will be ignored by the ip6tables-restore, but that doesn't seems to be working in Debian Buster.



      But, iptables-restore worked fine, it is only the issue with ip6tables-restore.
      How to fix this issue?










      share|improve this question









      New contributor




      Karthik is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.












      I have the below iptable rule in /etc/iptables/rule.V6 and /etc/iptables/rule.V4



      -4 -A INPUT -p icmp -j ACCEPT
      -6 -A INPUT -p ipv6-icmp -j ACCEPT


      when I tried to restart the netfilter-persistent, it internally calls the iptables-restore and ip6tables-restore.



      ip6tables-restore failed because it couldn't understand the below rule



      -4 -A INPUT -p icmp -j ACCEPT


      Below is the error



      root@rs-dal:/etc/iptables# ip6tables-restore rules.q
      Error occurred at line: 15
      Try `ip6tables-restore -h' or 'ip6tables-restore --help' for more information.


      Ideally the rule that starts with -4 will be ignored by the ip6tables-restore, but that doesn't seems to be working in Debian Buster.



      But, iptables-restore worked fine, it is only the issue with ip6tables-restore.
      How to fix this issue?







      debian iptables nftables ip6tables






      share|improve this question









      New contributor




      Karthik is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.











      share|improve this question









      New contributor




      Karthik is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.









      share|improve this question




      share|improve this question








      edited yesterday









      GAD3R

      27.3k1858113




      27.3k1858113






      New contributor




      Karthik is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.









      asked yesterday









      KarthikKarthik

      374




      374




      New contributor




      Karthik is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.





      New contributor





      Karthik is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.






      Karthik is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.




















          1 Answer
          1






          active

          oldest

          votes


















          2














          You are most certainly running iptables over nftables, as this is the default on Debian buster. To confirm this is the case, check for (nf_tables):



          # ip6tables-restore --version
          ip6tables-restore v1.8.2 (nf_tables)


          Now in the ip6tables manual, there always has been:




          -4, --ipv4

          This option has no effect in iptables and iptables-restore. If a rule using the -4 option is inserted with (and only with)
          ip6tables-restore, it will be silently ignored. Any other uses will
          throw an error. This option allows IPv4 and IPv6 rules in a single
          rule file for use with both iptables-restore and ip6tables-restore.




          The trouble is that you're now running ip6tables-nft-restore rather than ip6tables-legacy-restore.



          There is no mention of -4 in differences to legacy iptables, meaning there shouldn't be a difference about it, but here it is. This really looks like a bug: either the new version ip6tables-nft-restore should cope with it, or the documentation should reflect it as an additional difference to be acceptable.



          By the way the other way around (-6 with iptables-nft-restore) doesn't look better: it's accepted instead of ignored, leading to -A INPUT -p ipv6-icmp -j ACCEPT in addition to -A INPUT -p icmp -j ACCEPT in IPv4 protocol (this will never happen, except maybe with a custom test, and the IP stack will ignore it anyway).



          Possible workarounds:



          1. file a bug report, insisting on a regression which would break existing rules and documentation. This would help other people too.



          2. split rules



            split your file into two files but apply a different filter to each, something like:



            grep -v -- '^ *-4 ' < before > after.v6
            grep -v -- '^ *-6 ' < before > after.v4


          3. create a wrapper for ip6tables-restore in /usr/local/sbin/ip6tables-restore doing about the same (and also do the same for iptables-restore), allowing to keep a single rule



          4. Give up (for now) iptables over nftables and revert to legacy iptables:



            # readlink -f $(which ip6tables-restore)
            /usr/sbin/xtables-nft-multi
            # update-alternatives --config ip6tables
            There are 2 choices for the alternative ip6tables (providing /usr/sbin/ip6tables).

            Selection Path Priority Status
            ------------------------------------------------------------
            * 0 /usr/sbin/ip6tables-nft 20 auto mode
            1 /usr/sbin/ip6tables-legacy 10 manual mode
            2 /usr/sbin/ip6tables-nft 20 manual mode

            Press <enter> to keep the current choice[*], or type selection number: 1
            update-alternatives: using /usr/sbin/ip6tables-legacy to provide /usr/sbin/ip6tables (ip6tables) in manual mode
            # readlink -f $(which ip6tables-restore)
            /usr/sbin/xtables-legacy-multi


            The link of the related command also changed, fine.



            Do the same with iptables.



            Current rules are still running over nftables. You can dump them with iptables-nft-save + ip6tables-nft-save and restore them with iptables-save + ip6tables-save. This will result in rules running twice: once with kernel's iptables backend, once with kernel's nftables backend, and NAT might not always work correctly with this on kernel 4.19 (usually the first loaded module wins: here nft_nat). Better reboot, or know how to flush rules and remove relevant (nat) nftables modules.




          5. embrace the new features and use directly nft.



            There are commands available to help here (but they have the same problem as above): iptables-translate / ip6tables-translate and iptables-restore-translate / ip6tables-restore-translate, but the result usually needs reworking anyway (especially with fancy matches like u32). Nftables has a family type inet which can actually mix IPv4 and IPv6 rules (might require a newer kernel for this in nat), so it would simplify things.







          share|improve this answer























          • Thanks a lot the detailed explanation, will analyse all the workaround and update the thread about my next step.

            – Karthik
            18 hours ago











          • I have raised a bug below is the link bugs.debian.org/cgi-bin/bugreport.cgi?bug=925343

            – Karthik
            14 hours ago











          • Good. The only possible missing thing is that you should show the documentation related to the -4 option (from man iptables or man ip6tables), to insist this is a documented expected behaviour. Also understand that this report will probably be brought upstream at netfilter's team so this will take some delay anyway. Also the actual package is iptables, not iptables-persistent

            – A.B
            14 hours ago











          • The whole issue is started when I restarted netfilter-persistent. netfilter-persistent is in iptables-persistent package. the problem is actually on ip6table-restore, I should have specified the package as iptables. my bad it is my mistake. I will change it if possible

            – Karthik
            14 hours ago











          • debian.org/Bugs/server-control probably something like reassign 925343 iptables + perhaps anaffects too

            – A.B
            13 hours ago










          Your Answer








          StackExchange.ready(function()
          var channelOptions =
          tags: "".split(" "),
          id: "106"
          ;
          initTagRenderer("".split(" "), "".split(" "), channelOptions);

          StackExchange.using("externalEditor", function()
          // Have to fire editor after snippets, if snippets enabled
          if (StackExchange.settings.snippets.snippetsEnabled)
          StackExchange.using("snippets", function()
          createEditor();
          );

          else
          createEditor();

          );

          function createEditor()
          StackExchange.prepareEditor(
          heartbeatType: 'answer',
          autoActivateHeartbeat: false,
          convertImagesToLinks: false,
          noModals: true,
          showLowRepImageUploadWarning: true,
          reputationToPostImages: null,
          bindNavPrevention: true,
          postfix: "",
          imageUploader:
          brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
          contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
          allowUrls: true
          ,
          onDemand: true,
          discardSelector: ".discard-answer"
          ,immediatelyShowMarkdownHelp:true
          );



          );






          Karthik is a new contributor. Be nice, and check out our Code of Conduct.









          draft saved

          draft discarded


















          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f508019%2fip6table-restore-failed-in-debian-buster-sid%23new-answer', 'question_page');

          );

          Post as a guest















          Required, but never shown

























          1 Answer
          1






          active

          oldest

          votes








          1 Answer
          1






          active

          oldest

          votes









          active

          oldest

          votes






          active

          oldest

          votes









          2














          You are most certainly running iptables over nftables, as this is the default on Debian buster. To confirm this is the case, check for (nf_tables):



          # ip6tables-restore --version
          ip6tables-restore v1.8.2 (nf_tables)


          Now in the ip6tables manual, there always has been:




          -4, --ipv4

          This option has no effect in iptables and iptables-restore. If a rule using the -4 option is inserted with (and only with)
          ip6tables-restore, it will be silently ignored. Any other uses will
          throw an error. This option allows IPv4 and IPv6 rules in a single
          rule file for use with both iptables-restore and ip6tables-restore.




          The trouble is that you're now running ip6tables-nft-restore rather than ip6tables-legacy-restore.



          There is no mention of -4 in differences to legacy iptables, meaning there shouldn't be a difference about it, but here it is. This really looks like a bug: either the new version ip6tables-nft-restore should cope with it, or the documentation should reflect it as an additional difference to be acceptable.



          By the way the other way around (-6 with iptables-nft-restore) doesn't look better: it's accepted instead of ignored, leading to -A INPUT -p ipv6-icmp -j ACCEPT in addition to -A INPUT -p icmp -j ACCEPT in IPv4 protocol (this will never happen, except maybe with a custom test, and the IP stack will ignore it anyway).



          Possible workarounds:



          1. file a bug report, insisting on a regression which would break existing rules and documentation. This would help other people too.



          2. split rules



            split your file into two files but apply a different filter to each, something like:



            grep -v -- '^ *-4 ' < before > after.v6
            grep -v -- '^ *-6 ' < before > after.v4


          3. create a wrapper for ip6tables-restore in /usr/local/sbin/ip6tables-restore doing about the same (and also do the same for iptables-restore), allowing to keep a single rule



          4. Give up (for now) iptables over nftables and revert to legacy iptables:



            # readlink -f $(which ip6tables-restore)
            /usr/sbin/xtables-nft-multi
            # update-alternatives --config ip6tables
            There are 2 choices for the alternative ip6tables (providing /usr/sbin/ip6tables).

            Selection Path Priority Status
            ------------------------------------------------------------
            * 0 /usr/sbin/ip6tables-nft 20 auto mode
            1 /usr/sbin/ip6tables-legacy 10 manual mode
            2 /usr/sbin/ip6tables-nft 20 manual mode

            Press <enter> to keep the current choice[*], or type selection number: 1
            update-alternatives: using /usr/sbin/ip6tables-legacy to provide /usr/sbin/ip6tables (ip6tables) in manual mode
            # readlink -f $(which ip6tables-restore)
            /usr/sbin/xtables-legacy-multi


            The link of the related command also changed, fine.



            Do the same with iptables.



            Current rules are still running over nftables. You can dump them with iptables-nft-save + ip6tables-nft-save and restore them with iptables-save + ip6tables-save. This will result in rules running twice: once with kernel's iptables backend, once with kernel's nftables backend, and NAT might not always work correctly with this on kernel 4.19 (usually the first loaded module wins: here nft_nat). Better reboot, or know how to flush rules and remove relevant (nat) nftables modules.




          5. embrace the new features and use directly nft.



            There are commands available to help here (but they have the same problem as above): iptables-translate / ip6tables-translate and iptables-restore-translate / ip6tables-restore-translate, but the result usually needs reworking anyway (especially with fancy matches like u32). Nftables has a family type inet which can actually mix IPv4 and IPv6 rules (might require a newer kernel for this in nat), so it would simplify things.







          share|improve this answer























          • Thanks a lot the detailed explanation, will analyse all the workaround and update the thread about my next step.

            – Karthik
            18 hours ago











          • I have raised a bug below is the link bugs.debian.org/cgi-bin/bugreport.cgi?bug=925343

            – Karthik
            14 hours ago











          • Good. The only possible missing thing is that you should show the documentation related to the -4 option (from man iptables or man ip6tables), to insist this is a documented expected behaviour. Also understand that this report will probably be brought upstream at netfilter's team so this will take some delay anyway. Also the actual package is iptables, not iptables-persistent

            – A.B
            14 hours ago











          • The whole issue is started when I restarted netfilter-persistent. netfilter-persistent is in iptables-persistent package. the problem is actually on ip6table-restore, I should have specified the package as iptables. my bad it is my mistake. I will change it if possible

            – Karthik
            14 hours ago











          • debian.org/Bugs/server-control probably something like reassign 925343 iptables + perhaps anaffects too

            – A.B
            13 hours ago















          2














          You are most certainly running iptables over nftables, as this is the default on Debian buster. To confirm this is the case, check for (nf_tables):



          # ip6tables-restore --version
          ip6tables-restore v1.8.2 (nf_tables)


          Now in the ip6tables manual, there always has been:




          -4, --ipv4

          This option has no effect in iptables and iptables-restore. If a rule using the -4 option is inserted with (and only with)
          ip6tables-restore, it will be silently ignored. Any other uses will
          throw an error. This option allows IPv4 and IPv6 rules in a single
          rule file for use with both iptables-restore and ip6tables-restore.




          The trouble is that you're now running ip6tables-nft-restore rather than ip6tables-legacy-restore.



          There is no mention of -4 in differences to legacy iptables, meaning there shouldn't be a difference about it, but here it is. This really looks like a bug: either the new version ip6tables-nft-restore should cope with it, or the documentation should reflect it as an additional difference to be acceptable.



          By the way the other way around (-6 with iptables-nft-restore) doesn't look better: it's accepted instead of ignored, leading to -A INPUT -p ipv6-icmp -j ACCEPT in addition to -A INPUT -p icmp -j ACCEPT in IPv4 protocol (this will never happen, except maybe with a custom test, and the IP stack will ignore it anyway).



          Possible workarounds:



          1. file a bug report, insisting on a regression which would break existing rules and documentation. This would help other people too.



          2. split rules



            split your file into two files but apply a different filter to each, something like:



            grep -v -- '^ *-4 ' < before > after.v6
            grep -v -- '^ *-6 ' < before > after.v4


          3. create a wrapper for ip6tables-restore in /usr/local/sbin/ip6tables-restore doing about the same (and also do the same for iptables-restore), allowing to keep a single rule



          4. Give up (for now) iptables over nftables and revert to legacy iptables:



            # readlink -f $(which ip6tables-restore)
            /usr/sbin/xtables-nft-multi
            # update-alternatives --config ip6tables
            There are 2 choices for the alternative ip6tables (providing /usr/sbin/ip6tables).

            Selection Path Priority Status
            ------------------------------------------------------------
            * 0 /usr/sbin/ip6tables-nft 20 auto mode
            1 /usr/sbin/ip6tables-legacy 10 manual mode
            2 /usr/sbin/ip6tables-nft 20 manual mode

            Press <enter> to keep the current choice[*], or type selection number: 1
            update-alternatives: using /usr/sbin/ip6tables-legacy to provide /usr/sbin/ip6tables (ip6tables) in manual mode
            # readlink -f $(which ip6tables-restore)
            /usr/sbin/xtables-legacy-multi


            The link of the related command also changed, fine.



            Do the same with iptables.



            Current rules are still running over nftables. You can dump them with iptables-nft-save + ip6tables-nft-save and restore them with iptables-save + ip6tables-save. This will result in rules running twice: once with kernel's iptables backend, once with kernel's nftables backend, and NAT might not always work correctly with this on kernel 4.19 (usually the first loaded module wins: here nft_nat). Better reboot, or know how to flush rules and remove relevant (nat) nftables modules.




          5. embrace the new features and use directly nft.



            There are commands available to help here (but they have the same problem as above): iptables-translate / ip6tables-translate and iptables-restore-translate / ip6tables-restore-translate, but the result usually needs reworking anyway (especially with fancy matches like u32). Nftables has a family type inet which can actually mix IPv4 and IPv6 rules (might require a newer kernel for this in nat), so it would simplify things.







          share|improve this answer























          • Thanks a lot the detailed explanation, will analyse all the workaround and update the thread about my next step.

            – Karthik
            18 hours ago











          • I have raised a bug below is the link bugs.debian.org/cgi-bin/bugreport.cgi?bug=925343

            – Karthik
            14 hours ago











          • Good. The only possible missing thing is that you should show the documentation related to the -4 option (from man iptables or man ip6tables), to insist this is a documented expected behaviour. Also understand that this report will probably be brought upstream at netfilter's team so this will take some delay anyway. Also the actual package is iptables, not iptables-persistent

            – A.B
            14 hours ago











          • The whole issue is started when I restarted netfilter-persistent. netfilter-persistent is in iptables-persistent package. the problem is actually on ip6table-restore, I should have specified the package as iptables. my bad it is my mistake. I will change it if possible

            – Karthik
            14 hours ago











          • debian.org/Bugs/server-control probably something like reassign 925343 iptables + perhaps anaffects too

            – A.B
            13 hours ago













          2












          2








          2







          You are most certainly running iptables over nftables, as this is the default on Debian buster. To confirm this is the case, check for (nf_tables):



          # ip6tables-restore --version
          ip6tables-restore v1.8.2 (nf_tables)


          Now in the ip6tables manual, there always has been:




          -4, --ipv4

          This option has no effect in iptables and iptables-restore. If a rule using the -4 option is inserted with (and only with)
          ip6tables-restore, it will be silently ignored. Any other uses will
          throw an error. This option allows IPv4 and IPv6 rules in a single
          rule file for use with both iptables-restore and ip6tables-restore.




          The trouble is that you're now running ip6tables-nft-restore rather than ip6tables-legacy-restore.



          There is no mention of -4 in differences to legacy iptables, meaning there shouldn't be a difference about it, but here it is. This really looks like a bug: either the new version ip6tables-nft-restore should cope with it, or the documentation should reflect it as an additional difference to be acceptable.



          By the way the other way around (-6 with iptables-nft-restore) doesn't look better: it's accepted instead of ignored, leading to -A INPUT -p ipv6-icmp -j ACCEPT in addition to -A INPUT -p icmp -j ACCEPT in IPv4 protocol (this will never happen, except maybe with a custom test, and the IP stack will ignore it anyway).



          Possible workarounds:



          1. file a bug report, insisting on a regression which would break existing rules and documentation. This would help other people too.



          2. split rules



            split your file into two files but apply a different filter to each, something like:



            grep -v -- '^ *-4 ' < before > after.v6
            grep -v -- '^ *-6 ' < before > after.v4


          3. create a wrapper for ip6tables-restore in /usr/local/sbin/ip6tables-restore doing about the same (and also do the same for iptables-restore), allowing to keep a single rule



          4. Give up (for now) iptables over nftables and revert to legacy iptables:



            # readlink -f $(which ip6tables-restore)
            /usr/sbin/xtables-nft-multi
            # update-alternatives --config ip6tables
            There are 2 choices for the alternative ip6tables (providing /usr/sbin/ip6tables).

            Selection Path Priority Status
            ------------------------------------------------------------
            * 0 /usr/sbin/ip6tables-nft 20 auto mode
            1 /usr/sbin/ip6tables-legacy 10 manual mode
            2 /usr/sbin/ip6tables-nft 20 manual mode

            Press <enter> to keep the current choice[*], or type selection number: 1
            update-alternatives: using /usr/sbin/ip6tables-legacy to provide /usr/sbin/ip6tables (ip6tables) in manual mode
            # readlink -f $(which ip6tables-restore)
            /usr/sbin/xtables-legacy-multi


            The link of the related command also changed, fine.



            Do the same with iptables.



            Current rules are still running over nftables. You can dump them with iptables-nft-save + ip6tables-nft-save and restore them with iptables-save + ip6tables-save. This will result in rules running twice: once with kernel's iptables backend, once with kernel's nftables backend, and NAT might not always work correctly with this on kernel 4.19 (usually the first loaded module wins: here nft_nat). Better reboot, or know how to flush rules and remove relevant (nat) nftables modules.




          5. embrace the new features and use directly nft.



            There are commands available to help here (but they have the same problem as above): iptables-translate / ip6tables-translate and iptables-restore-translate / ip6tables-restore-translate, but the result usually needs reworking anyway (especially with fancy matches like u32). Nftables has a family type inet which can actually mix IPv4 and IPv6 rules (might require a newer kernel for this in nat), so it would simplify things.







          share|improve this answer













          You are most certainly running iptables over nftables, as this is the default on Debian buster. To confirm this is the case, check for (nf_tables):



          # ip6tables-restore --version
          ip6tables-restore v1.8.2 (nf_tables)


          Now in the ip6tables manual, there always has been:




          -4, --ipv4

          This option has no effect in iptables and iptables-restore. If a rule using the -4 option is inserted with (and only with)
          ip6tables-restore, it will be silently ignored. Any other uses will
          throw an error. This option allows IPv4 and IPv6 rules in a single
          rule file for use with both iptables-restore and ip6tables-restore.




          The trouble is that you're now running ip6tables-nft-restore rather than ip6tables-legacy-restore.



          There is no mention of -4 in differences to legacy iptables, meaning there shouldn't be a difference about it, but here it is. This really looks like a bug: either the new version ip6tables-nft-restore should cope with it, or the documentation should reflect it as an additional difference to be acceptable.



          By the way the other way around (-6 with iptables-nft-restore) doesn't look better: it's accepted instead of ignored, leading to -A INPUT -p ipv6-icmp -j ACCEPT in addition to -A INPUT -p icmp -j ACCEPT in IPv4 protocol (this will never happen, except maybe with a custom test, and the IP stack will ignore it anyway).



          Possible workarounds:



          1. file a bug report, insisting on a regression which would break existing rules and documentation. This would help other people too.



          2. split rules



            split your file into two files but apply a different filter to each, something like:



            grep -v -- '^ *-4 ' < before > after.v6
            grep -v -- '^ *-6 ' < before > after.v4


          3. create a wrapper for ip6tables-restore in /usr/local/sbin/ip6tables-restore doing about the same (and also do the same for iptables-restore), allowing to keep a single rule



          4. Give up (for now) iptables over nftables and revert to legacy iptables:



            # readlink -f $(which ip6tables-restore)
            /usr/sbin/xtables-nft-multi
            # update-alternatives --config ip6tables
            There are 2 choices for the alternative ip6tables (providing /usr/sbin/ip6tables).

            Selection Path Priority Status
            ------------------------------------------------------------
            * 0 /usr/sbin/ip6tables-nft 20 auto mode
            1 /usr/sbin/ip6tables-legacy 10 manual mode
            2 /usr/sbin/ip6tables-nft 20 manual mode

            Press <enter> to keep the current choice[*], or type selection number: 1
            update-alternatives: using /usr/sbin/ip6tables-legacy to provide /usr/sbin/ip6tables (ip6tables) in manual mode
            # readlink -f $(which ip6tables-restore)
            /usr/sbin/xtables-legacy-multi


            The link of the related command also changed, fine.



            Do the same with iptables.



            Current rules are still running over nftables. You can dump them with iptables-nft-save + ip6tables-nft-save and restore them with iptables-save + ip6tables-save. This will result in rules running twice: once with kernel's iptables backend, once with kernel's nftables backend, and NAT might not always work correctly with this on kernel 4.19 (usually the first loaded module wins: here nft_nat). Better reboot, or know how to flush rules and remove relevant (nat) nftables modules.




          5. embrace the new features and use directly nft.



            There are commands available to help here (but they have the same problem as above): iptables-translate / ip6tables-translate and iptables-restore-translate / ip6tables-restore-translate, but the result usually needs reworking anyway (especially with fancy matches like u32). Nftables has a family type inet which can actually mix IPv4 and IPv6 rules (might require a newer kernel for this in nat), so it would simplify things.








          share|improve this answer












          share|improve this answer



          share|improve this answer










          answered yesterday









          A.BA.B

          5,4421829




          5,4421829












          • Thanks a lot the detailed explanation, will analyse all the workaround and update the thread about my next step.

            – Karthik
            18 hours ago











          • I have raised a bug below is the link bugs.debian.org/cgi-bin/bugreport.cgi?bug=925343

            – Karthik
            14 hours ago











          • Good. The only possible missing thing is that you should show the documentation related to the -4 option (from man iptables or man ip6tables), to insist this is a documented expected behaviour. Also understand that this report will probably be brought upstream at netfilter's team so this will take some delay anyway. Also the actual package is iptables, not iptables-persistent

            – A.B
            14 hours ago











          • The whole issue is started when I restarted netfilter-persistent. netfilter-persistent is in iptables-persistent package. the problem is actually on ip6table-restore, I should have specified the package as iptables. my bad it is my mistake. I will change it if possible

            – Karthik
            14 hours ago











          • debian.org/Bugs/server-control probably something like reassign 925343 iptables + perhaps anaffects too

            – A.B
            13 hours ago

















          • Thanks a lot the detailed explanation, will analyse all the workaround and update the thread about my next step.

            – Karthik
            18 hours ago











          • I have raised a bug below is the link bugs.debian.org/cgi-bin/bugreport.cgi?bug=925343

            – Karthik
            14 hours ago











          • Good. The only possible missing thing is that you should show the documentation related to the -4 option (from man iptables or man ip6tables), to insist this is a documented expected behaviour. Also understand that this report will probably be brought upstream at netfilter's team so this will take some delay anyway. Also the actual package is iptables, not iptables-persistent

            – A.B
            14 hours ago











          • The whole issue is started when I restarted netfilter-persistent. netfilter-persistent is in iptables-persistent package. the problem is actually on ip6table-restore, I should have specified the package as iptables. my bad it is my mistake. I will change it if possible

            – Karthik
            14 hours ago











          • debian.org/Bugs/server-control probably something like reassign 925343 iptables + perhaps anaffects too

            – A.B
            13 hours ago
















          Thanks a lot the detailed explanation, will analyse all the workaround and update the thread about my next step.

          – Karthik
          18 hours ago





          Thanks a lot the detailed explanation, will analyse all the workaround and update the thread about my next step.

          – Karthik
          18 hours ago













          I have raised a bug below is the link bugs.debian.org/cgi-bin/bugreport.cgi?bug=925343

          – Karthik
          14 hours ago





          I have raised a bug below is the link bugs.debian.org/cgi-bin/bugreport.cgi?bug=925343

          – Karthik
          14 hours ago













          Good. The only possible missing thing is that you should show the documentation related to the -4 option (from man iptables or man ip6tables), to insist this is a documented expected behaviour. Also understand that this report will probably be brought upstream at netfilter's team so this will take some delay anyway. Also the actual package is iptables, not iptables-persistent

          – A.B
          14 hours ago





          Good. The only possible missing thing is that you should show the documentation related to the -4 option (from man iptables or man ip6tables), to insist this is a documented expected behaviour. Also understand that this report will probably be brought upstream at netfilter's team so this will take some delay anyway. Also the actual package is iptables, not iptables-persistent

          – A.B
          14 hours ago













          The whole issue is started when I restarted netfilter-persistent. netfilter-persistent is in iptables-persistent package. the problem is actually on ip6table-restore, I should have specified the package as iptables. my bad it is my mistake. I will change it if possible

          – Karthik
          14 hours ago





          The whole issue is started when I restarted netfilter-persistent. netfilter-persistent is in iptables-persistent package. the problem is actually on ip6table-restore, I should have specified the package as iptables. my bad it is my mistake. I will change it if possible

          – Karthik
          14 hours ago













          debian.org/Bugs/server-control probably something like reassign 925343 iptables + perhaps anaffects too

          – A.B
          13 hours ago





          debian.org/Bugs/server-control probably something like reassign 925343 iptables + perhaps anaffects too

          – A.B
          13 hours ago










          Karthik is a new contributor. Be nice, and check out our Code of Conduct.









          draft saved

          draft discarded


















          Karthik is a new contributor. Be nice, and check out our Code of Conduct.












          Karthik is a new contributor. Be nice, and check out our Code of Conduct.











          Karthik is a new contributor. Be nice, and check out our Code of Conduct.














          Thanks for contributing an answer to Unix & Linux Stack Exchange!


          • Please be sure to answer the question. Provide details and share your research!

          But avoid


          • Asking for help, clarification, or responding to other answers.

          • Making statements based on opinion; back them up with references or personal experience.

          To learn more, see our tips on writing great answers.




          draft saved


          draft discarded














          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f508019%2fip6table-restore-failed-in-debian-buster-sid%23new-answer', 'question_page');

          );

          Post as a guest















          Required, but never shown





















































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown

































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown







          Popular posts from this blog

          getting Checkpoint VPN SSL Network Extender working in the command lineHow to connect to CheckPoint VPN on Ubuntu 18.04LTS?Will the Linux ( red-hat ) Open VPNC Client connect to checkpoint or nortel VPN gateways?VPN client for linux machine + support checkpoint gatewayVPN SSL Network Extender in FirefoxLinux Checkpoint SNX tool configuration issuesCheck Point - Connect under Linux - snx + OTPSNX VPN Ububuntu 18.XXUsing Checkpoint VPN SSL Network Extender CLI with certificateVPN with network manager (nm-applet) is not workingWill the Linux ( red-hat ) Open VPNC Client connect to checkpoint or nortel VPN gateways?VPN client for linux machine + support checkpoint gatewayImport VPN config files to NetworkManager from command lineTrouble connecting to VPN using network-manager, while command line worksStart a VPN connection with PPTP protocol on command linestarting a docker service daemon breaks the vpn networkCan't connect to vpn with Network-managerVPN SSL Network Extender in FirefoxUsing Checkpoint VPN SSL Network Extender CLI with certificate

          대한민국 목차 국명 지리 역사 정치 국방 경제 사회 문화 국제 순위 관련 항목 각주 외부 링크 둘러보기 메뉴북위 37° 34′ 08″ 동경 126° 58′ 36″ / 북위 37.568889° 동경 126.976667°  / 37.568889; 126.976667ehThe Korean Repository문단을 편집문단을 편집추가해Clarkson PLC 사Report for Selected Countries and Subjects-Korea“Human Development Index and its components: P.198”“http://www.law.go.kr/%EB%B2%95%EB%A0%B9/%EB%8C%80%ED%95%9C%EB%AF%BC%EA%B5%AD%EA%B5%AD%EA%B8%B0%EB%B2%95”"한국은 국제법상 한반도 유일 합법정부 아니다" - 오마이뉴스 모바일Report for Selected Countries and Subjects: South Korea격동의 역사와 함께한 조선일보 90년 : 조선일보 인수해 혁신시킨 신석우, 임시정부 때는 '대한민국' 국호(國號) 정해《우리가 몰랐던 우리 역사: 나라 이름의 비밀을 찾아가는 역사 여행》“남북 공식호칭 ‘남한’‘북한’으로 쓴다”“Corea 대 Korea, 누가 이긴 거야?”국내기후자료 - 한국[김대중 前 대통령 서거] 과감한 구조개혁 'DJ노믹스'로 최단기간 환란극복 :: 네이버 뉴스“이라크 "韓-쿠르드 유전개발 MOU 승인 안해"(종합)”“해외 우리국민 추방사례 43%가 일본”차기전차 K2'흑표'의 세계 최고 전력 분석, 쿠키뉴스 엄기영, 2007-03-02두산인프라, 헬기잡는 장갑차 'K21'...내년부터 공급, 고뉴스 이대준, 2008-10-30과거 내용 찾기mk 뉴스 - 구매력 기준으로 보면 한국 1인당 소득 3만弗과거 내용 찾기"The N-11: More Than an Acronym"Archived조선일보 최우석, 2008-11-01Global 500 2008: Countries - South Korea“몇년째 '시한폭탄'... 가계부채, 올해는 터질까”가구당 부채 5000만원 처음 넘어서“‘빚’으로 내몰리는 사회.. 위기의 가계대출”“[경제365] 공공부문 부채 급증…800조 육박”“"소득 양극화 다소 완화...불평등은 여전"”“공정사회·공생발전 한참 멀었네”iSuppli,08年2QのDRAMシェア・ランキングを発表(08/8/11)South Korea dominates shipbuilding industry | Stock Market News & Stocks to Watch from StraightStocks한국 자동차 생산, 3년 연속 세계 5위자동차수출 '현대-삼성 웃고 기아-대우-쌍용은 울고' 과거 내용 찾기동반성장위 창립 1주년 맞아Archived"중기적합 3개업종 합의 무시한 채 선정"李대통령, 사업 무분별 확장 소상공인 생계 위협 질타삼성-LG, 서민업종인 빵·분식사업 잇따라 철수상생은 뒷전…SSM ‘몸집 불리기’ 혈안Archived“경부고속도에 '아시안하이웨이' 표지판”'철의 실크로드' 앞서 '말(言)의 실크로드'부터, 프레시안 정창현, 2008-10-01“'서울 지하철은 안전한가?'”“서울시 “올해 안에 모든 지하철역 스크린도어 설치””“부산지하철 1,2호선 승강장 안전펜스 설치 완료”“전교조, 정부 노조 통계서 처음 빠져”“[Weekly BIZ] 도요타 '제로 이사회'가 리콜 사태 불러들였다”“S Korea slams high tuition costs”““정치가 여론 양극화 부채질… 합리주의 절실””“〈"`촛불집회'는 민주주의의 질적 변화 상징"〉”““촛불집회가 민주주의 왜곡 초래””“국민 65%, "한국 노사관계 대립적"”“한국 국가경쟁력 27위‥노사관계 '꼴찌'”“제대로 형성되지 않은 대한민국 이념지형”“[신년기획-갈등의 시대] 갈등지수 OECD 4위…사회적 손실 GDP 27% 무려 300조”“2012 총선-대선의 키워드는 '국민과 소통'”“한국 삶의 질 27위, 2000년과 2008년 연속 하위권 머물러”“[해피 코리아] 행복점수 68점…해외 평가선 '낙제점'”“한국 어린이·청소년 행복지수 3년 연속 OECD ‘꼴찌’”“한국 이혼율 OECD중 8위”“[통계청] 한국 이혼율 OECD 4위”“오피니언 [이렇게 생각한다] `부부의 날` 에 돌아본 이혼율 1위 한국”“Suicide Rates by Country, Global Health Observatory Data Repository.”“1. 또 다른 차별”“오피니언 [편집자에게] '왕따'와 '패거리 정치' 심리는 닮은꼴”“[미래한국리포트] 무한경쟁에 빠진 대한민국”“대학생 98% "외모가 경쟁력이라는 말 동의"”“특급호텔 웨딩·200만원대 유모차… "남보다 더…" 호화病, 고질병 됐다”“[스트레스 공화국] ① 경쟁사회, 스트레스 쌓인다”““매일 30여명 자살 한국, 의사보다 무속인에…””“"자살 부르는 '우울증', 환자 중 85% 치료 안 받아"”“정신병원을 가다”“대한민국도 ‘묻지마 범죄’,안전지대 아니다”“유엔 "학생 '성적 지향'에 따른 차별 금지하라"”“유엔아동권리위원회 보고서 및 번역본 원문”“고졸 성공스토리 담은 '제빵왕 김탁구' 드라마 나온다”“‘빛 좋은 개살구’ 고졸 취업…실습 대신 착취”원본 문서“정신건강, 사회적 편견부터 고쳐드립니다”‘소통’과 ‘행복’에 목 마른 사회가 잠들어 있던 ‘심리학’ 깨웠다“[포토] 사유리-곽금주 교수의 유쾌한 심리상담”“"올해 한국인 평균 영화관람횟수 세계 1위"(종합)”“[게임연중기획] 게임은 문화다-여가활동 1순위 게임”“영화속 ‘영어 지상주의’ …“왠지 씁쓸한데””“2월 `신문 부수 인증기관` 지정..방송법 후속작업”“무료신문 성장동력 ‘차별성’과 ‘갈등해소’”대한민국 국회 법률지식정보시스템"Pew Research Center's Religion & Public Life Project: South Korea"“amp;vwcd=MT_ZTITLE&path=인구·가구%20>%20인구총조사%20>%20인구부문%20>%20 총조사인구(2005)%20>%20전수부문&oper_YN=Y&item=&keyword=종교별%20인구& amp;lang_mode=kor&list_id= 2005년 통계청 인구 총조사”원본 문서“한국인이 좋아하는 취미와 운동 (2004-2009)”“한국인이 좋아하는 취미와 운동 (2004-2014)”Archived“한국, `부분적 언론자유국' 강등〈프리덤하우스〉”“국경없는기자회 "한국, 인터넷감시 대상국"”“한국, 조선산업 1위 유지(S. Korea Stays Top Shipbuilding Nation) RZD-Partner Portal”원본 문서“한국, 4년 만에 ‘선박건조 1위’”“옛 마산시,인터넷속도 세계 1위”“"한국 초고속 인터넷망 세계1위"”“인터넷·휴대폰 요금, 외국보다 훨씬 비싸”“한국 관세행정 6년 연속 세계 '1위'”“한국 교통사고 사망자 수 OECD 회원국 중 2위”“결핵 후진국' 한국, 환자가 급증한 이유는”“수술은 신중해야… 자칫하면 생명 위협”대한민국분류대한민국의 지도대한민국 정부대표 다국어포털대한민국 전자정부대한민국 국회한국방송공사about korea and information korea브리태니커 백과사전(한국편)론리플래닛의 정보(한국편)CIA의 세계 정보(한국편)마리암 부디아 (Mariam Budia),『한국: 하늘이 내린 한 폭의 그림』, 서울: 트랜스라틴 19호 (2012년 3월)대한민국ehehehehehehehehehehehehehehWorldCat132441370n791268020000 0001 2308 81034078029-6026373548cb11863345f(데이터)00573706ge128495

          Cannot Extend partition with GParted The 2019 Stack Overflow Developer Survey Results Are In Announcing the arrival of Valued Associate #679: Cesar Manara Planned maintenance scheduled April 17/18, 2019 at 00:00UTC (8:00pm US/Eastern) 2019 Community Moderator Election ResultsCan't increase partition size with GParted?GParted doesn't recognize the unallocated space after my current partitionWhat is the best way to add unallocated space located before to Ubuntu 12.04 partition with GParted live?I can't figure out how to extend my Arch home partition into free spaceGparted Linux Mint 18.1 issueTrying to extend but swap partition is showing as Unknown in Gparted, shows proper from fdiskRearrange partitions in gparted to extend a partitionUnable to extend partition even though unallocated space is next to it using GPartedAllocate free space to root partitiongparted: how to merge unallocated space with a partition