The usefulness of the policy aside (it is configured wide open), I still can't reproduce with http://cdimage.ubuntu.com/ubuntu-server/daily/current/disco-server-amd64.iso that I just downloaded:
$ sudo ufw default allow incoming Default incoming policy changed to 'allow' (be sure to update your rules accordingly) $ sudo ufw default allow outgoing Default outgoing policy changed to 'allow' (be sure to update your rules accordingly) $ sudo ufw default allow routed Default routed policy changed to 'allow' (be sure to update your rules accordingly) $ sudo ufw allow rsync Rules updated Rules updated (v6) $ sudo ufw allow ssh Rules updated Rules updated (v6) $ sudo ufw enable Command may disrupt existing ssh connections. Proceed with operation (y|n)? y Firewall is active and enabled on system startup
$ cat /proc/version_signature Ubuntu 5.0.0-8.9-generic 5.0.1
The usefulness of the policy aside (it is configured wide open), I still can't reproduce with http:// cdimage. ubuntu. com/ubuntu- server/ daily/current/ disco-server- amd64.iso that I just downloaded:
$ sudo ufw default allow incoming
Default incoming policy changed to 'allow'
(be sure to update your rules accordingly)
$ sudo ufw default allow outgoing
Default outgoing policy changed to 'allow'
(be sure to update your rules accordingly)
$ sudo ufw default allow routed
Default routed policy changed to 'allow'
(be sure to update your rules accordingly)
$ sudo ufw allow rsync
Rules updated
Rules updated (v6)
$ sudo ufw allow ssh
Rules updated
Rules updated (v6)
$ sudo ufw enable
Command may disrupt existing ssh connections. Proceed with operation (y|n)? y
Firewall is active and enabled on system startup
$ cat /proc/version_ signature
Ubuntu 5.0.0-8.9-generic 5.0.1