loopback interface blocked by Shorewall 5.0.15.6

If Shorewall 5.0.15.6 is used as firewall and this error is triggered

$ curl http://localhost:8080
curl: (56) Recv failure: Connection reset by peer

go to /etc/shorewall/interfaces and edit it like this

#
# Shorewall - Sample Interfaces File for one-interface configuration.
# Copyright (C) 2006-2015 by the Shorewall Team
#
# This library is free software; you can redistribute it and/or
# modify it under the terms of the GNU Lesser General Public
# License as published by the Free Software Foundation; either
# version 2.1 of the License, or (at your option) any later version.
#
# See the file README.txt for further details.
#------------------------------------------------------------------------------
# For information about entries in this file, type "man shorewall-interfaces"
###############################################################################
?FORMAT 2
###############################################################################
#ZONE   INTERFACE   OPTIONS
-       lo              ignore  
net     ens192          dhcp,physical=+,routeback

The file /etc/shorewall/rules may look like this

#
# Shorewall - Sample Rules File for one-interface configuration.
# Copyright (C) 2006-2014 by the Shorewall Team
#
# This library is free software; you can redistribute it and/or
# modify it under the terms of the GNU Lesser General Public
# License as published by the Free Software Foundation; either
# version 2.1 of the License, or (at your option) any later version.
#
# See the file README.txt for further details.
#------------------------------------------------------------------------------------------------------------
# For information on entries in this file, type "man shorewall-rules"
######################################################################################################################################################################################################
#ACTION     SOURCE      DEST        PROTO   DEST    SOURCE      ORIGINAL    RATE        USER/   MARK    CONNLIMIT   TIME        HEADERS     SWITCH      HELPER
#                           PORT    PORT(S)     DEST        LIMIT       GROUP
#?SECTION ALL
#?SECTION ESTABLISHED
#?SECTION RELATED
#?SECTION INVALID
#?SECTION UNTRACKED
?SECTION NEW

# Drop packets in the INVALID state

Invalid(DROP)  net              $FW     tcp

# Drop Ping from the "bad" net zone.. and prevent your log from being flooded..

Ping(DROP)  net     $FW

# Permit all ICMP traffic FROM the firewall TO the net zone

ACCEPT      $FW     net     icmp

ACCEPT net                       $FW      tcp    22,80,8080,443