<?xml version="1.0" encoding="UTF-8" ?>

<bugzilla version="5.2"
          urlbase="https://bugzilla.altlinux.org/"
          
          maintainer="jenya@basealt.ru"
>

    <bug>
          <bug_id>21798</bug_id>
          
          <creation_ts>2009-10-01 01:46:32 +0400</creation_ts>
          <short_desc>Rule replacing sets mask /0</short_desc>
          <delta_ts>2010-06-27 10:42:12 +0400</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>4</classification_id>
          <classification>Development</classification>
          <product>Sisyphus</product>
          <component>iptables</component>
          <version>unstable</version>
          <rep_platform>all</rep_platform>
          <op_sys>Linux</op_sys>
          <bug_status>CLOSED</bug_status>
          <resolution>FIXED</resolution>
          
          
          <bug_file_loc></bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords></keywords>
          <priority>P3</priority>
          <bug_severity>critical</bug_severity>
          <target_milestone>---</target_milestone>
          
          
          <everconfirmed>1</everconfirmed>
          <reporter name="Nikolay A. Fetisov">naf</reporter>
          <assigned_to name="placeholder@altlinux.org">placeholder</assigned_to>
          <cc>glebfm</cc>
    
    <cc>ldv</cc>
    
    <cc>placeholder</cc>
    
    <cc>vt</cc>
          
          <qa_contact>qa-sisyphus</qa_contact>

      

      

      

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>100545</commentid>
    <comment_count>0</comment_count>
    <who name="Nikolay A. Fetisov">naf</who>
    <bug_when>2009-10-01 01:46:32 +0400</bug_when>
    <thetext>Для iptables 1.4.5-alt1 при перезаписи правил в адресах маска заменяется на /0.

Пример:

Чистая таблица:
# iptables -S
-P INPUT ACCEPT
-P FORWARD ACCEPT
-P OUTPUT ACCEPT

Добавляем пару правил:
# iptables -A INPUT -d 1.2.3.4/32 -p tcp --dport 22 -j ACCEPT
# iptables -A INPUT -d 2.3.4.0/24 -p tcp --dport 22 -j ACCEPT
# iptables -S
-P INPUT ACCEPT
-P FORWARD ACCEPT
-P OUTPUT ACCEPT
-A INPUT -d 1.2.3.4/32 -p tcp -m tcp --dport 22 -j ACCEPT
-A INPUT -d 2.3.4.0/24 -p tcp -m tcp --dport 22 -j ACCEPT

Перезаписываем на то же самое:
# iptables -R INPUT 1 -d 1.2.3.4/32 -p tcp --dport 22 -j ACCEPT
# iptables -R INPUT 2 -d 2.3.4.0/24 -p tcp --dport 22 -j ACCEPT

Получаем:
# iptables -S
-P INPUT ACCEPT
-P FORWARD ACCEPT
-P OUTPUT ACCEPT
-A INPUT -d 1.2.3.4/0 -p tcp -m tcp --dport 22 -j ACCEPT
-A INPUT -d 2.3.4.0/0 -p tcp -m tcp --dport 22 -j ACCEPT</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>110139</commentid>
    <comment_count>1</comment_count>
    <who name="Nikolay A. Fetisov">naf</who>
    <bug_when>2010-06-27 10:41:54 +0400</bug_when>
    <thetext>Исправлено в upstream начиная с 1.4.6, текущие 1.4.8-alt1 в Sisyphus и 1.4.7-alt1 в M51 данной ошибки не содержат.</thetext>
  </long_desc>
      
      

    </bug>

</bugzilla>