+ set -e + '[' -s /lib/ufw/ufw-init-functions ']' + . /lib/ufw/ufw-init-functions ++ set -e ++ PATH=/sbin:/bin:/usr/sbin:/usr/bin ++ for s in '"/etc/default/ufw"' '"/etc/ufw/ufw.conf"' ++ '[' -s /etc/default/ufw ']' ++ . /etc/default/ufw +++ IPV6=yes +++ DEFAULT_INPUT_POLICY=REJECT +++ DEFAULT_OUTPUT_POLICY=ACCEPT +++ DEFAULT_FORWARD_POLICY=DROP +++ DEFAULT_APPLICATION_POLICY=SKIP +++ MANAGE_BUILTINS=no +++ IPT_SYSCTL=/etc/ufw/sysctl.conf +++ IPT_MODULES='nf_conntrack_ftp nf_nat_ftp nf_conntrack_irc nf_nat_irc' ++ for s in '"/etc/default/ufw"' '"/etc/ufw/ufw.conf"' ++ '[' -s /etc/ufw/ufw.conf ']' ++ . /etc/ufw/ufw.conf +++ ENABLED=yes +++ LOGLEVEL=low ++ RULES_PATH=/etc/ufw ++ USER_PATH=/lib/ufw + case "$1" in + ufw_stop + '[' '' '!=' --force ']' + '[' yes '!=' yes ']' + '[' no = yes ']' + error= + execs=iptables + ip6tables -L INPUT -n + execs='iptables ip6tables' + for exe in '$execs' + type= + '[' iptables = ip6tables ']' + delete_chains + chains_command -F + flag=-F + type= + exe=iptables + '[' '' = 6 ']' + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -F ufw-logging-deny + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -F ufw-logging-allow + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -F ufw-not-local + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -F ufw-user-logging-input + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -F ufw-user-limit-accept + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -F ufw-user-limit + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -F ufw-skip-to-policy-input + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -F ufw-reject-input + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -F ufw-after-logging-input + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -F ufw-after-input + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -F ufw-user-input + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -F ufw-before-input + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -F ufw-before-logging-input + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -F ufw-skip-to-policy-forward + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -F ufw-reject-forward + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -F ufw-after-logging-forward + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -F ufw-after-forward + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -F ufw-user-logging-forward + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -F ufw-user-forward + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -F ufw-before-forward + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -F ufw-before-logging-forward + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -F ufw-track-output + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -F ufw-track-input + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -F ufw-skip-to-policy-output + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -F ufw-reject-output + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -F ufw-after-logging-output + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -F ufw-after-output + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -F ufw-user-logging-output + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -F ufw-user-output + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -F ufw-before-output + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -F ufw-before-logging-output + chains_command -Z + flag=-Z + type= + exe=iptables + '[' '' = 6 ']' + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -Z ufw-logging-deny + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -Z ufw-logging-allow + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -Z ufw-not-local + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -Z ufw-user-logging-input + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -Z ufw-user-limit-accept + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -Z ufw-user-limit + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -Z ufw-skip-to-policy-input + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -Z ufw-reject-input + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -Z ufw-after-logging-input + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -Z ufw-after-input + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -Z ufw-user-input + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -Z ufw-before-input + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -Z ufw-before-logging-input + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -Z ufw-skip-to-policy-forward + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -Z ufw-reject-forward + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -Z ufw-after-logging-forward + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -Z ufw-after-forward + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -Z ufw-user-logging-forward + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -Z ufw-user-forward + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -Z ufw-before-forward + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -Z ufw-before-logging-forward + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -Z ufw-track-output + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -Z ufw-track-input + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -Z ufw-skip-to-policy-output + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -Z ufw-reject-output + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -Z ufw-after-logging-output + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -Z ufw-after-output + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -Z ufw-user-logging-output + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -Z ufw-user-output + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -Z ufw-before-output + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + iptables -Z ufw-before-logging-output + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' + '[' '' = yes ']' + iptables -X ufw-logging-deny + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' + '[' '' = yes ']' + iptables -X ufw-logging-allow + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' + '[' '' = yes ']' + iptables -X ufw-not-local + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' + '[' '' = yes ']' + iptables -X ufw-user-logging-input + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' + '[' '' = yes ']' + iptables -X ufw-user-logging-output + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' + '[' '' = yes ']' + iptables -X ufw-user-logging-forward + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' + '[' '' = yes ']' + iptables -X ufw-user-limit-accept + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' + '[' '' = yes ']' + iptables -X ufw-user-limit + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' + '[' '' = yes ']' + iptables -X ufw-user-input + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' + '[' '' = yes ']' + iptables -X ufw-user-forward + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' + '[' '' = yes ']' + iptables -X ufw-user-output + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' + '[' '' = yes ']' + iptables -X ufw-skip-to-policy-input + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' + '[' '' = yes ']' + iptables -X ufw-skip-to-policy-output + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' + '[' '' = yes ']' + iptables -X ufw-skip-to-policy-forward + true + iptables -P INPUT ACCEPT + iptables -P OUTPUT ACCEPT + iptables -P FORWARD ACCEPT + for exe in '$execs' + type= + '[' ip6tables = ip6tables ']' + type=6 + delete_chains 6 + chains_command -F 6 + flag=-F + type= + exe=iptables + '[' 6 = 6 ']' + type=6 + exe=ip6tables + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -F ufw6-logging-deny + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -F ufw6-logging-allow + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -F ufw6-not-local + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -F ufw6-user-logging-input + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -F ufw6-user-limit-accept + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -F ufw6-user-limit + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -F ufw6-skip-to-policy-input + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -F ufw6-reject-input + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -F ufw6-after-logging-input + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -F ufw6-after-input + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -F ufw6-user-input + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -F ufw6-before-input + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -F ufw6-before-logging-input + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -F ufw6-skip-to-policy-forward + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -F ufw6-reject-forward + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -F ufw6-after-logging-forward + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -F ufw6-after-forward + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -F ufw6-user-logging-forward + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -F ufw6-user-forward + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -F ufw6-before-forward + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -F ufw6-before-logging-forward + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -F ufw6-track-output + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -F ufw6-track-input + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -F ufw6-skip-to-policy-output + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -F ufw6-reject-output + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -F ufw6-after-logging-output + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -F ufw6-after-output + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -F ufw6-user-logging-output + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -F ufw6-user-output + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -F ufw6-before-output + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -F ufw6-before-logging-output + chains_command -Z 6 + flag=-Z + type= + exe=iptables + '[' 6 = 6 ']' + type=6 + exe=ip6tables + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -Z ufw6-logging-deny + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -Z ufw6-logging-allow + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -Z ufw6-not-local + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -Z ufw6-user-logging-input + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -Z ufw6-user-limit-accept + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -Z ufw6-user-limit + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -Z ufw6-skip-to-policy-input + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -Z ufw6-reject-input + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -Z ufw6-after-logging-input + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -Z ufw6-after-input + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -Z ufw6-user-input + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -Z ufw6-before-input + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -Z ufw6-before-logging-input + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -Z ufw6-skip-to-policy-forward + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -Z ufw6-reject-forward + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -Z ufw6-after-logging-forward + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -Z ufw6-after-forward + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -Z ufw6-user-logging-forward + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -Z ufw6-user-forward + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -Z ufw6-before-forward + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -Z ufw6-before-logging-forward + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -Z ufw6-track-output + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -Z ufw6-track-input + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -Z ufw6-skip-to-policy-output + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -Z ufw6-reject-output + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -Z ufw6-after-logging-output + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -Z ufw6-after-output + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -Z ufw6-user-logging-output + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -Z ufw6-user-output + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -Z ufw6-before-output + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' + '[' '' = yes ']' + ip6tables -Z ufw6-before-logging-output + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' + '[' '' = yes ']' + ip6tables -X ufw6-logging-deny + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' + '[' '' = yes ']' + ip6tables -X ufw6-logging-allow + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' + '[' '' = yes ']' + ip6tables -X ufw6-not-local + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' + '[' '' = yes ']' + ip6tables -X ufw6-user-logging-input + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' + '[' '' = yes ']' + ip6tables -X ufw6-user-logging-output + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' + '[' '' = yes ']' + ip6tables -X ufw6-user-logging-forward + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' + '[' '' = yes ']' + ip6tables -X ufw6-user-limit-accept + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' + '[' '' = yes ']' + ip6tables -X ufw6-user-limit + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' + '[' '' = yes ']' + ip6tables -X ufw6-user-input + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' + '[' '' = yes ']' + ip6tables -X ufw6-user-forward + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' + '[' '' = yes ']' + ip6tables -X ufw6-user-output + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' + '[' '' = yes ']' + ip6tables -X ufw6-skip-to-policy-input + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' + '[' '' = yes ']' + ip6tables -X ufw6-skip-to-policy-output + true + for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' + '[' '' = yes ']' + ip6tables -X ufw6-skip-to-policy-forward + true + ip6tables -P INPUT ACCEPT + ip6tables -P OUTPUT ACCEPT + ip6tables -P FORWARD ACCEPT + '[' '' = yes ']' + return 0 + set -e + '[' -s /lib/ufw/ufw-init-functions ']' + . /lib/ufw/ufw-init-functions ++ set -e ++ PATH=/sbin:/bin:/usr/sbin:/usr/bin ++ for s in '"/etc/default/ufw"' '"/etc/ufw/ufw.conf"' ++ '[' -s /etc/default/ufw ']' ++ . /etc/default/ufw +++ IPV6=yes +++ DEFAULT_INPUT_POLICY=REJECT +++ DEFAULT_OUTPUT_POLICY=ACCEPT +++ DEFAULT_FORWARD_POLICY=DROP +++ DEFAULT_APPLICATION_POLICY=SKIP +++ MANAGE_BUILTINS=no +++ IPT_SYSCTL=/etc/ufw/sysctl.conf +++ IPT_MODULES='nf_conntrack_ftp nf_nat_ftp nf_conntrack_irc nf_nat_irc' ++ for s in '"/etc/default/ufw"' '"/etc/ufw/ufw.conf"' ++ '[' -s /etc/ufw/ufw.conf ']' ++ . /etc/ufw/ufw.conf +++ ENABLED=yes +++ LOGLEVEL=low ++ RULES_PATH=/etc/ufw ++ USER_PATH=/lib/ufw + case "$1" in + ret=0 ++ ufw_start ++ out= ++ '[' yes = yes ']' ++ iptables -L ufw-user-input -n ++ for m in '$IPT_MODULES' ++ modprobe nf_conntrack_ftp ++ for m in '$IPT_MODULES' ++ modprobe nf_nat_ftp ++ for m in '$IPT_MODULES' ++ modprobe nf_conntrack_irc ++ for m in '$IPT_MODULES' ++ modprobe nf_nat_irc ++ '[' no = yes ']' ++ execs=iptables ++ '[' yes = yes ']' ++ ip6tables -L INPUT -n ++ execs='iptables ip6tables' ++ for exe in '$execs' ++ type= ++ '[' iptables = ip6tables ']' ++ BEFORE_RULES=/etc/ufw/before.rules ++ AFTER_RULES=/etc/ufw/after.rules ++ USER_RULES=/lib/ufw/user.rules ++ input_pol=REJECT ++ '[' REJECT = REJECT ']' ++ input_pol=DROP ++ output_pol=ACCEPT ++ '[' ACCEPT = REJECT ']' ++ forward_pol=DROP ++ '[' DROP = REJECT ']' ++ cat ++ iptables-restore -n ++ iptables -L ufw-before-logging-input -n ++ delete_chains ++ chains_command -F ++ flag=-F ++ type= ++ exe=iptables ++ '[' '' = 6 ']' ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -F ufw-logging-deny ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -F ufw-logging-allow ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -F ufw-not-local ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -F ufw-user-logging-input ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -F ufw-user-limit-accept ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -F ufw-user-limit ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -F ufw-skip-to-policy-input ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -F ufw-reject-input ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -F ufw-after-logging-input ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -F ufw-after-input ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -F ufw-user-input ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -F ufw-before-input ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -F ufw-before-logging-input ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -F ufw-skip-to-policy-forward ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -F ufw-reject-forward ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -F ufw-after-logging-forward ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -F ufw-after-forward ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -F ufw-user-logging-forward ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -F ufw-user-forward ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -F ufw-before-forward ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -F ufw-before-logging-forward ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -F ufw-track-output ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -F ufw-track-input ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -F ufw-skip-to-policy-output ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -F ufw-reject-output ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -F ufw-after-logging-output ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -F ufw-after-output ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -F ufw-user-logging-output ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -F ufw-user-output ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -F ufw-before-output ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -F ufw-before-logging-output ++ chains_command -Z ++ flag=-Z ++ type= ++ exe=iptables ++ '[' '' = 6 ']' ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -Z ufw-logging-deny ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -Z ufw-logging-allow ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -Z ufw-not-local ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -Z ufw-user-logging-input ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -Z ufw-user-limit-accept ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -Z ufw-user-limit ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -Z ufw-skip-to-policy-input ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -Z ufw-reject-input ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -Z ufw-after-logging-input ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -Z ufw-after-input ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -Z ufw-user-input ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -Z ufw-before-input ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -Z ufw-before-logging-input ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -Z ufw-skip-to-policy-forward ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -Z ufw-reject-forward ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -Z ufw-after-logging-forward ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -Z ufw-after-forward ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -Z ufw-user-logging-forward ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -Z ufw-user-forward ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -Z ufw-before-forward ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -Z ufw-before-logging-forward ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -Z ufw-track-output ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -Z ufw-track-input ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -Z ufw-skip-to-policy-output ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -Z ufw-reject-output ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -Z ufw-after-logging-output ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -Z ufw-after-output ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -Z ufw-user-logging-output ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -Z ufw-user-output ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -Z ufw-before-output ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ iptables -Z ufw-before-logging-output ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' ++ '[' '' = yes ']' ++ iptables -X ufw-logging-deny ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' ++ '[' '' = yes ']' ++ iptables -X ufw-logging-allow ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' ++ '[' '' = yes ']' ++ iptables -X ufw-not-local ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' ++ '[' '' = yes ']' ++ iptables -X ufw-user-logging-input ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' ++ '[' '' = yes ']' ++ iptables -X ufw-user-logging-output ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' ++ '[' '' = yes ']' ++ iptables -X ufw-user-logging-forward ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' ++ '[' '' = yes ']' ++ iptables -X ufw-user-limit-accept ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' ++ '[' '' = yes ']' ++ iptables -X ufw-user-limit ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' ++ '[' '' = yes ']' ++ iptables -X ufw-user-input ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' ++ '[' '' = yes ']' ++ iptables -X ufw-user-forward ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' ++ '[' '' = yes ']' ++ iptables -X ufw-user-output ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' ++ '[' '' = yes ']' ++ iptables -X ufw-skip-to-policy-input ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' ++ '[' '' = yes ']' ++ iptables -X ufw-skip-to-policy-output ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' ++ '[' '' = yes ']' ++ iptables -X ufw-skip-to-policy-forward ++ true ++ '[' REJECT = REJECT ']' ++ cat ++ iptables-restore -n iptables-restore: line 2 failed ++ error=yes ++ '[' ACCEPT = REJECT ']' ++ '[' DROP = REJECT ']' ++ '[' REJECT = ACCEPT ']' ++ '[' ACCEPT = ACCEPT ']' ++ cat ++ iptables-restore -n iptables-restore: line 2 failed ++ error=yes ++ iptables -L ufw-logging-deny -n ++ cat ++ iptables-restore -n ++ iptables -L ufw-skip-to-policy-input -n ++ cat ++ iptables-restore -n ++ '[' -s /etc/ufw/before.rules ']' ++ iptables-restore -n ++ '[' -s /etc/ufw/after.rules ']' ++ iptables-restore -n ++ '[' -s /lib/ufw/user.rules ']' ++ iptables -L ufw-user-input -n ++ cat ++ iptables-restore -n ++ iptables-restore -n ++ cat ++ iptables-restore -n ++ for exe in '$execs' ++ type= ++ '[' ip6tables = ip6tables ']' ++ type=6 ++ BEFORE_RULES=/etc/ufw/before6.rules ++ AFTER_RULES=/etc/ufw/after6.rules ++ USER_RULES=/lib/ufw/user6.rules ++ input_pol=REJECT ++ '[' REJECT = REJECT ']' ++ input_pol=DROP ++ output_pol=ACCEPT ++ '[' ACCEPT = REJECT ']' ++ forward_pol=DROP ++ '[' DROP = REJECT ']' ++ cat ++ ip6tables-restore -n ++ ip6tables -L ufw6-before-logging-input -n ++ delete_chains 6 ++ chains_command -F 6 ++ flag=-F ++ type= ++ exe=iptables ++ '[' 6 = 6 ']' ++ type=6 ++ exe=ip6tables ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -F ufw6-logging-deny ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -F ufw6-logging-allow ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -F ufw6-not-local ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -F ufw6-user-logging-input ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -F ufw6-user-limit-accept ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -F ufw6-user-limit ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -F ufw6-skip-to-policy-input ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -F ufw6-reject-input ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -F ufw6-after-logging-input ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -F ufw6-after-input ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -F ufw6-user-input ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -F ufw6-before-input ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -F ufw6-before-logging-input ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -F ufw6-skip-to-policy-forward ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -F ufw6-reject-forward ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -F ufw6-after-logging-forward ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -F ufw6-after-forward ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -F ufw6-user-logging-forward ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -F ufw6-user-forward ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -F ufw6-before-forward ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -F ufw6-before-logging-forward ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -F ufw6-track-output ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -F ufw6-track-input ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -F ufw6-skip-to-policy-output ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -F ufw6-reject-output ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -F ufw6-after-logging-output ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -F ufw6-after-output ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -F ufw6-user-logging-output ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -F ufw6-user-output ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -F ufw6-before-output ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -F ufw6-before-logging-output ++ chains_command -Z 6 ++ flag=-Z ++ type= ++ exe=iptables ++ '[' 6 = 6 ']' ++ type=6 ++ exe=ip6tables ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -Z ufw6-logging-deny ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -Z ufw6-logging-allow ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -Z ufw6-not-local ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -Z ufw6-user-logging-input ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -Z ufw6-user-limit-accept ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -Z ufw6-user-limit ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -Z ufw6-skip-to-policy-input ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -Z ufw6-reject-input ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -Z ufw6-after-logging-input ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -Z ufw6-after-input ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -Z ufw6-user-input ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -Z ufw6-before-input ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -Z ufw6-before-logging-input ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -Z ufw6-skip-to-policy-forward ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -Z ufw6-reject-forward ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -Z ufw6-after-logging-forward ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -Z ufw6-after-forward ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -Z ufw6-user-logging-forward ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -Z ufw6-user-forward ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -Z ufw6-before-forward ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -Z ufw6-before-logging-forward ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -Z ufw6-track-output ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -Z ufw6-track-input ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -Z ufw6-skip-to-policy-output ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -Z ufw6-reject-output ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -Z ufw6-after-logging-output ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -Z ufw6-after-output ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -Z ufw6-user-logging-output ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -Z ufw6-user-output ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -Z ufw6-before-output ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-skip-to-policy-input' 'ufw$type-reject-input' 'ufw$type-after-logging-input' 'ufw$type-after-input' 'ufw$type-user-input' 'ufw$type-before-input' 'ufw$type-before-logging-input' 'ufw$type-skip-to-policy-forward' 'ufw$type-reject-forward' 'ufw$type-after-logging-forward' 'ufw$type-after-forward' 'ufw$type-user-logging-forward' 'ufw$type-user-forward' 'ufw$type-before-forward' 'ufw$type-before-logging-forward' 'ufw$type-track-output' 'ufw$type-track-input' 'ufw$type-skip-to-policy-output' 'ufw$type-reject-output' 'ufw$type-after-logging-output' 'ufw$type-after-output' 'ufw$type-user-logging-output' 'ufw$type-user-output' 'ufw$type-before-output' 'ufw$type-before-logging-output' ++ '[' '' = yes ']' ++ ip6tables -Z ufw6-before-logging-output ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' ++ '[' '' = yes ']' ++ ip6tables -X ufw6-logging-deny ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' ++ '[' '' = yes ']' ++ ip6tables -X ufw6-logging-allow ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' ++ '[' '' = yes ']' ++ ip6tables -X ufw6-not-local ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' ++ '[' '' = yes ']' ++ ip6tables -X ufw6-user-logging-input ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' ++ '[' '' = yes ']' ++ ip6tables -X ufw6-user-logging-output ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' ++ '[' '' = yes ']' ++ ip6tables -X ufw6-user-logging-forward ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' ++ '[' '' = yes ']' ++ ip6tables -X ufw6-user-limit-accept ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' ++ '[' '' = yes ']' ++ ip6tables -X ufw6-user-limit ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' ++ '[' '' = yes ']' ++ ip6tables -X ufw6-user-input ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' ++ '[' '' = yes ']' ++ ip6tables -X ufw6-user-forward ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' ++ '[' '' = yes ']' ++ ip6tables -X ufw6-user-output ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' ++ '[' '' = yes ']' ++ ip6tables -X ufw6-skip-to-policy-input ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' ++ '[' '' = yes ']' ++ ip6tables -X ufw6-skip-to-policy-output ++ true ++ for c in 'ufw$type-logging-deny' 'ufw$type-logging-allow' 'ufw$type-not-local' 'ufw$type-user-logging-input' 'ufw$type-user-logging-output' 'ufw$type-user-logging-forward' 'ufw$type-user-limit-accept' 'ufw$type-user-limit' 'ufw$type-user-input' 'ufw$type-user-forward' 'ufw$type-user-output' 'ufw$type-skip-to-policy-input' 'ufw$type-skip-to-policy-output' 'ufw$type-skip-to-policy-forward' ++ '[' '' = yes ']' ++ ip6tables -X ufw6-skip-to-policy-forward ++ true ++ '[' REJECT = REJECT ']' ++ cat ++ ip6tables-restore -n ip6tables-restore: line 2 failed ++ error=yes ++ '[' ACCEPT = REJECT ']' ++ '[' DROP = REJECT ']' ++ '[' REJECT = ACCEPT ']' ++ '[' ACCEPT = ACCEPT ']' ++ cat ++ ip6tables-restore -n ip6tables-restore: line 2 failed ++ error=yes ++ ip6tables -L ufw6-logging-deny -n ++ cat ++ ip6tables-restore -n ++ ip6tables -L ufw6-skip-to-policy-input -n ++ cat ++ ip6tables-restore -n ++ '[' -s /etc/ufw/before6.rules ']' ++ ip6tables-restore -n ++ '[' -s /etc/ufw/after6.rules ']' ++ ip6tables-restore -n ++ '[' -s /lib/ufw/user6.rules ']' ++ ip6tables -L ufw6-user-input -n ++ cat ++ ip6tables-restore -n ++ ip6tables-restore -n ++ cat ++ ip6tables-restore -n ++ '[' '!' -z /etc/ufw/sysctl.conf ']' ++ '[' -s /etc/ufw/sysctl.conf ']' ++ sysctl -e -q -p /etc/ufw/sysctl.conf ++ '[' yes = yes ']' ++ /bin/echo -e '' ++ return 1 + output= + ret=1 + test -n '' + exit 1