2003-07-04 17:08:29 +02:00
|
|
|
This is a minor release of Shorewall.
|
2002-05-01 01:13:15 +02:00
|
|
|
|
2003-03-26 17:11:31 +01:00
|
|
|
Problems Corrected:
|
2002-12-31 02:10:28 +01:00
|
|
|
|
2003-06-18 20:26:05 +02:00
|
|
|
1) A problem seen on RH7.3 systems where Shorewall encountered start
|
|
|
|
errors when started using the "service" mechanism has been worked
|
|
|
|
around.
|
2003-06-18 02:29:04 +02:00
|
|
|
|
2003-07-04 17:08:29 +02:00
|
|
|
2) Where a list of IP addresses appears in the DEST column of a DNAT[-]
|
2003-07-01 22:29:01 +02:00
|
|
|
rule, Shorewall incorrectly created multiple DNAT rules in the nat
|
|
|
|
table (one for each element in the list). Shorewall now correctly
|
|
|
|
creates a single DNAT rule with multiple "--to-destination" clauses.
|
|
|
|
|
2003-07-06 02:06:06 +02:00
|
|
|
3) Corrected a problem in Beta 1 where DNS names containing a "-" were
|
|
|
|
mis-handled when they appeared in the DEST column of a rule.
|
|
|
|
|
2003-07-14 18:20:45 +02:00
|
|
|
4) The handling of z1!z2 in the SOURCE column of DNAT and REDIRECT
|
|
|
|
rules has been corrected.
|
|
|
|
|
2003-07-06 17:31:26 +02:00
|
|
|
Migration Issues:
|
|
|
|
|
|
|
|
1) In earlier versions, an undocumented feature allowed entries in
|
|
|
|
the host file as follows:
|
|
|
|
|
|
|
|
z eth1:192.168.1.0/24,eth2:192.168.2.0/24
|
|
|
|
|
|
|
|
This capability was never documented and has been removed in 1.4.6
|
|
|
|
to allow entries of the following format:
|
|
|
|
|
|
|
|
z eth1:192.168.1.0/24,192.168.2.0/24
|
|
|
|
|
|
|
|
2) The NAT_ENABLED, MANGLE_ENABLED and MULTIPORT options have been
|
|
|
|
removed from /etc/shorewall/shorewall.conf. These capabilities are
|
|
|
|
now automatically detected by Shorewall (see below).
|
|
|
|
|
2003-05-31 17:29:14 +02:00
|
|
|
New Features:
|
2003-05-22 22:37:24 +02:00
|
|
|
|
2003-06-18 20:37:37 +02:00
|
|
|
1) A 'newnotsyn' interface option has been added. This option may be
|
|
|
|
specified in /etc/shorewall/interfaces and overrides the setting
|
|
|
|
NEWNOTSYN=No for packets arriving on the associated interface.
|
2003-06-22 18:58:33 +02:00
|
|
|
|
|
|
|
2) The means for specifying a range of IP addresses in
|
|
|
|
/etc/shorewall/masq to use for SNAT is now
|
|
|
|
documented. ADD_SNAT_ALIASES=Yes is enabled for address ranges.
|
|
|
|
|
2003-06-23 01:10:20 +02:00
|
|
|
3) Shorewall can now add IP addresses to subnets other than the first
|
|
|
|
one on an interface.
|
2003-06-22 18:58:33 +02:00
|
|
|
|
2003-06-27 23:02:52 +02:00
|
|
|
4) DNAT[-] rules may now be used to load balance (round-robin) over a
|
2003-07-06 15:24:23 +02:00
|
|
|
set of servers. Any number of servers may be specified in a range of
|
|
|
|
addresses given as <first address>-<last address> and multiple
|
|
|
|
ranges or individual servers may be specified in a comma-separated
|
|
|
|
list.
|
2003-06-23 00:56:25 +02:00
|
|
|
|
|
|
|
Example:
|
|
|
|
|
2003-07-06 15:24:23 +02:00
|
|
|
DNAT net loc:192.168.10.2-192.168.10.5,192.168.10.44 tcp 80
|
2003-06-27 23:02:52 +02:00
|
|
|
|
2003-06-28 03:09:12 +02:00
|
|
|
5) The NAT_ENABLED, MANGLE_ENABLED and MULTIPORT configuration options
|
|
|
|
have been removed and have been replaced by code that detects
|
|
|
|
whether these capabilities are present in the current kernel. The
|
|
|
|
output of the start, restart and check commands have been enhanced
|
|
|
|
to report the outcome:
|
2003-06-27 23:02:52 +02:00
|
|
|
|
|
|
|
Shorewall has detected the following iptables/netfilter capabilities:
|
|
|
|
NAT: Available
|
|
|
|
Packet Mangling: Available
|
2003-06-28 03:09:12 +02:00
|
|
|
Multi-port Match: Available
|
2003-06-27 23:02:52 +02:00
|
|
|
Verifying Configuration...
|
|
|
|
|
|
|
|
6) Support for the Connection Tracking Match Extension has been
|
|
|
|
added. This extension is available in recent kernel/iptables
|
|
|
|
releases and allows for rules which match against elements in
|
|
|
|
netfilter's connection tracking table.
|
|
|
|
|
|
|
|
Shorewall automatically detects the availability of this extension
|
|
|
|
and reports its availability in the output of the start, restart and
|
|
|
|
check commands.
|
|
|
|
|
|
|
|
Shorewall has detected the following iptables/netfilter capabilities:
|
|
|
|
NAT: Available
|
|
|
|
Packet Mangling: Available
|
2003-06-28 03:09:12 +02:00
|
|
|
Multi-port Match: Available
|
2003-06-27 23:02:52 +02:00
|
|
|
Connection Tracking Match: Available
|
|
|
|
Verifying Configuration...
|
|
|
|
|
|
|
|
If this extension is available, the ruleset generated by Shorewall
|
|
|
|
is changed in the following ways:
|
|
|
|
|
|
|
|
a) To handle 'norfc1918' filtering, Shorewall will not create chains
|
|
|
|
in the mangle table but will rather do all 'norfc1918' filtering in
|
|
|
|
the filter table (rfc1918 chain).
|
|
|
|
|
|
|
|
b) Recall that Shorewall DNAT rules generate two netfilter rules;
|
|
|
|
one in the nat table and one in the filter table. If the Connection
|
|
|
|
Tracking Match Extension is available, the rule in the filter table
|
|
|
|
is extended to check that the original destination address was the
|
|
|
|
same as specified (or defaulted to) in the DNAT rule.
|
2003-06-28 17:22:22 +02:00
|
|
|
|
|
|
|
7) The shell used to interpret the firewall script
|
|
|
|
(/usr/share/shorewall/firewall) may now be specified using the
|
2003-06-30 16:21:42 +02:00
|
|
|
SHOREWALL_SHELL parameter in shorewall.conf.
|
2003-07-05 19:14:21 +02:00
|
|
|
|
|
|
|
8) An 'ipcalc' command has been added to /sbin/shorewall.
|
|
|
|
|
|
|
|
ipcalc [ <address> <netmask> | <address>/<vlsm> ]
|
|
|
|
|
|
|
|
Examples:
|
|
|
|
|
|
|
|
[root@wookie root]# shorewall ipcalc 192.168.1.0/24
|
|
|
|
CIDR=192.168.1.0/24
|
|
|
|
NETMASK=255.255.255.0
|
|
|
|
NETWORK=192.168.1.0
|
|
|
|
BROADCAST=192.168.1.255
|
|
|
|
[root@wookie root]#
|
|
|
|
|
|
|
|
[root@wookie root]# shorewall ipcalc 192.168.1.0 255.255.255.0
|
|
|
|
CIDR=192.168.1.0/24
|
|
|
|
NETMASK=255.255.255.0
|
|
|
|
NETWORK=192.168.1.0
|
|
|
|
BROADCAST=192.168.1.255
|
|
|
|
[root@wookie root]#
|
2003-07-05 19:41:28 +02:00
|
|
|
|
|
|
|
Warning:
|
|
|
|
|
|
|
|
If your shell only supports 32-bit signed arithmatic (ash or
|
|
|
|
dash), then the ipcalc command produces incorrect information for
|
|
|
|
IP addresses 128.0.0.0-1 and for /1 networks. Bash should produce
|
|
|
|
correct information for all valid IP addresses.
|
2003-07-06 15:24:23 +02:00
|
|
|
|
|
|
|
9) An 'iprange' command has been added to /sbin/shorewall.
|
|
|
|
|
|
|
|
iprange <address>-<address>
|
|
|
|
|
|
|
|
This command decomposes a range of IP addressses into a list of
|
|
|
|
network and host addresses. The command can be useful if you need to
|
|
|
|
construct an efficient set of rules that accept connections from a
|
|
|
|
range of network addresses.
|
|
|
|
|
2003-07-06 17:31:26 +02:00
|
|
|
Note: If your shell only supports 32-bit signed arithmetic (ash or
|
|
|
|
dash) then the range may not span 128.0.0.0.
|
|
|
|
|
2003-07-06 15:24:23 +02:00
|
|
|
Example:
|
|
|
|
|
|
|
|
[root@gateway root]# shorewall iprange 192.168.1.4-192.168.12.9
|
|
|
|
192.168.1.4/30
|
|
|
|
192.168.1.8/29
|
|
|
|
192.168.1.16/28
|
|
|
|
192.168.1.32/27
|
|
|
|
192.168.1.64/26
|
|
|
|
192.168.1.128/25
|
|
|
|
192.168.2.0/23
|
|
|
|
192.168.4.0/22
|
|
|
|
192.168.8.0/22
|
|
|
|
192.168.12.0/29
|
|
|
|
192.168.12.8/31
|
|
|
|
[root@gateway root]#
|
2003-07-06 17:31:26 +02:00
|
|
|
|
|
|
|
10) A list of host/net addresses is now allowed in an entry in
|
|
|
|
/etc/shorewall/hosts.
|
|
|
|
|
|
|
|
Example:
|
|
|
|
|
|
|
|
foo eth1:192.168.1.0/24,192.168.2.0/24
|