Skip to main content

BUG: system-config-firewall-tui won't start in Centos 6.6


As reported in BUG 1123919 in Red Hat Bugzilla, system-config-firewall-tui (text user interface to configure firewall in RH family) also won't start in Centos 6.6 (complaining about python module):

# system-config-firewall-tui 
Traceback (most recent call last):
  File "/usr/bin/system-config-firewall-tui", line 29, in <module>
    import fw_tui
  File "/usr/share/system-config-firewall/fw_tui.py", line 34, in <module>
    import fw_nm
ImportError: No module named fw_nm
 And, here is easy way to fix this bug:
  • Install system-config-firewall
yum -y install system-config-firewall
  • copy file started with fw_n from /usr/share/system-config-firewall to temporary location (we use our home dir)
cp /usr/share/system-config-firewall/fw_n* ~
  • Remove system-config-firewall
yum -y remove system-config-firewall
  • Move file started with  fw_n back to /usr/share/system-config-firewall
mv fw_n* /usr/share/system-config-firewall/
  • Now, open system-config-firewall-tui 
    system-config-firewall-tui 
 It's solved now.

Comments

Popular posts from this blog

Shrink LVM without data loss

assume we have 3 logical volume: lv1 40GB, lv2 8GB, lv3 200GB in volume group called data . we want to resize lv3 become 180GB. here is the steps: booting to single mode enter init 1 (type: init 1) umount logical volume that you want to resize, e.g. umount /dev/data/lv3 check the filesystem: e2fsck -f /dev/data/lv3 resize the filesystem: resize2fs -p /dev/data/lv3 180G lvreduce -L -20G /dev/data/lv3 Ref: askubuntu.com

Mikrotik Bruteforce Login Prevention

Reference: WIKI FTP Bruteforce prevention This configuration allows only 10 FTP login incorrect answer per minutes add chain=input protocol=tcp dst-port=21 src-address-list=ftp_blacklist action=drop comment="drop ftp brute forcers" add chain=output action=accept protocol=tcp content="530 Login incorrect" dst-limit=1/1m,9,dst-address/1m add chain=output action=add-dst-to-address-list protocol=tcp content="530 Login incorrect" address-list=ftp_blacklist address-list-timeout=3h SSH Bruteforce prevention This will prevent SSH bruteforcer to be banned for 10 days after repetitive attemps add chain=input protocol=tcp dst-port=22 src-address-list=ssh_blacklist action=drop comment="drop ssh brute forcers" disabled=no add chain=input protocol=tcp dst-port=22 connection-state=new src-address-list=ssh_stage3 action=add-src-to-address-list address-list=ssh_blacklist address-list-timeout=10d comment="" disabled=no add chain=input...