|
Bugzilla – Full Text Bug Listing |
| Summary: | Yast2 corrupts SuSEfirewall2 config file | ||
|---|---|---|---|
| Product: | [openSUSE] openSUSE 11.0 | Reporter: | Marc Chamberlin <marc> |
| Component: | YaST2 | Assignee: | Lukas Ocilka <locilka> |
| Status: | RESOLVED FIXED | QA Contact: | Jiri Srain <jsrain> |
| Severity: | Normal | ||
| Priority: | P5 - None | CC: | lnussel, marc, security-team |
| Version: | Final | ||
| Target Milestone: | --- | ||
| Hardware: | PC | ||
| OS: | openSUSE 11.0 | ||
| Whiteboard: | |||
| Found By: | Community User | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Marc Chamberlin
2008-09-12 17:20:43 UTC
the yast agent reading and writing the sysconfig file certainly should not change the file in a way that it suddenly has different meaning. That backslash however is not needed, a quoted string can span multiple lines just fine. So as workaround just remove the backslashes. The actual firewall rules are applied nevertheless, there will be just some error messages from iptables for the invalid rules. Fixed in yast2-2.17.24 Simple workaround is just not to use backslashes at all: FW_FORWARD_MASQ=" 0/0,192.168.2.100,tcp,80,8080,111.222.333.444 0/0,192.168.2.100,tcp,22,622,111.222.333.444 0/0,192.168.2.254,tcp,80,8083,111.222.333.444 0/0,192.168.2.15,tcp,5903,5900,111.222.333.444 0/0,192.168.2.25,tcp,5904,5900,111.222.333.444 0/0,192.168.2.30,tcp,5916,5903,111.222.333.444" |