I am making a race between me and my brother, and one part is from getting to one place to another by elytra and a rocket. His works like it should, but I just fall, even when spamming them in creative mode. My brother is an eye witness to this and we were both shocked, since our favorite way to travel is by elytra. We're both in version 1.13.1 of Minecraft and I'm hosting a LAN world for him to join. Can anyone help me, or am I just going to have to take the rockets out of our race?
Minecraft – I think I broke the elytra
minecraft-java-edition
Related Solutions
what is already generated followed the 1.1 rules for world generation, as you go past the boundaries it will begin to generate with the 1.2.4 rules. If I remember correctly, the eye will point to where they should be in the current version. if that land is already generated you're sunk, as the land will not regenerate. however if there is a fortress outside of explored land, you may be able to get one yet.
Newer Fedora versions (Fedora 18 and onwards) use Firewalld to manage iptables rules. The iptables service that loads rules out of /etc/sysconfig/iptables
is not present by default. A bunch of my answer involves manually bashing about in iptables rules. This is a bit of new ground for me, as my main experience with firewalld up to this point has been making a beeline back to traditional reading of iptables rules out of the save file. Most of the firewalld information was collected on the fly based on the iptables
rules that it implemented.
I double-checked this on a Fedora 20 VM that I've been fiddling with. When a rule is set in firewall-config
, the packet for a new connection must go through the following steps to be accepted.
- New packet hits INPUT chain. Packets in existing connections are automatically accepted.
- All prospective connections from the outside are sent to the either the INPUT_ZONES_SOURCE chain or INPUT_ZONES chain, based on whether they were picked out based on source IP or the interface the packet came in on. The logic within each is pretty much the same, other than the IP/interface note. I'll be focusing on INPUT_ZONES_SOURCE for my example.
- I added my Minecraft rule to the 'home' zone, so I had added an entry in home->sources stating that packets coming from the network address of 10.20.30.0/24 were coming from home. In INPUT_ZONES_SOURCE, there was a rule that would send all packets coming from that IP range to the IN_home chain.
- In the IN_home chain I had three chains dedicated to specific tasks: IN_home_log, IN_home_deny (this was empty, as I hadn't set anything), and IN_home_allow.
- IN_home_allow held all of the allowed services for the 'home' zone, including the 25565 rule that I had just put in. Though I didn't start up a Minecraft server or bind anything else to TCP/25565, I could see that some other default rules did record that packets were being accepted, so traffic was being evaluated against this rule.
- Any rule that does not get accepted will eventually splatter against the last rule of the INPUT chain. The final rule will reject any packet that is still on the chain.
To get to the point of my explanation, could I confirm that you've set an input interface or a IP address/range for the zone that you're allowing the port in? You've placed a rule to allow the port in a given zone, but it sounds as though the packet doesn't have a way to reach that rule and be accepted.
You can list a table using iptables -nvL
. Firewalld sets up a lot of chains, so if you want to take a look at one in particular, add the chain name as an argument: iptables -nvL <chain-name>
. If you can see numbers greater than zero in the lefthand columns, this means that packets have reached and triggered the rule. (The action the rule takes is in the third column).
To force your firewall to accept everything, and to see if something along the line is causing you grief, you could stop the firewalld service altogether temporarily.
systemctl stop firewalld
You can alternately flush the tables with iptables -F
, though I'm not sure when/if firewalld will repopulate the chains on their own without a rule change to prompt it to do so.
Hopefully this will solve your issue. But if you want/need to go to a custom iptables
layout by having the firewall load its rules out of /etc/sysconfig/iptables, you will need to install and enable the service, as well as disable firewalld.
- Install iptables service:
yum install iptables-services
- Stop Firewalld:
systemctl stop firewalld
- Disable Firewalld:
systemctl disable firewalld
- Start the iptables service (If you don't have an /etc/sysconfig/iptables at this point, this won't do anything):
systemctl start iptables
- Enable the iptables service:
systemctl enable iptables
Related Topic
- Minecraft – I can’t connect to a friend’s Minecraft server, but none of the usual culprits seem to be the problem
- Minecraft 1.8.8 fails when connecting via Direct Connect
- Minecraft – How to prevent server crash while flying with Elytra
- Minecraft – Player getting kicked from Minecraft server the moment player gets their inventory
Best Answer
This is likely either this bug (first world you join after starting the game has issues) or this bug (after teleporting a long distance, you get issues) or any of the related ones. Exiting and re-joining the world should fix it.