mirror of
https://gitlab.com/shorewall/code.git
synced 2024-11-23 16:13:18 +01:00
Update web site for 4.0.5
git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@7504 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
parent
60beb2f1d2
commit
0105dd9d4f
199
web/News.htm
199
web/News.htm
@ -24,9 +24,202 @@ href="GnuCopyright.htm" target="_self">GNU Free Documentation
|
|||||||
License</a></span>”.<br>
|
License</a></span>”.<br>
|
||||||
</p>
|
</p>
|
||||||
|
|
||||||
<p>October 02, 2007</p>
|
<p>October 22, 2007</p>
|
||||||
<hr style="width: 100%; height: 2px;">
|
<hr style="width: 100%; height: 2px;">
|
||||||
|
|
||||||
|
<p><strong>2007-10-22 Shorewall 4.0.5</strong></p>
|
||||||
|
<pre>Problems corrected in Shorewall 4.0.5.
|
||||||
|
|
||||||
|
1) Previously, Shorewall-perl misprocessed $FW::<port> in the DEST
|
||||||
|
column of a REDIRECT rule, generating an error. '$FW::<port>' now
|
||||||
|
produces the same effect as '<port>'.
|
||||||
|
|
||||||
|
2) If the PROTOCOL (PROTO) column contained 'TCP' or 'UDP' and SOURCE
|
||||||
|
PORT(S) or DEST PORT(S) were given, then Shorewall-perl rejected
|
||||||
|
the entry with the error:
|
||||||
|
|
||||||
|
ERROR: SOURCE/DEST PORT(S) not allowed with PROTO TCP : /etc/shorewall/rules
|
||||||
|
|
||||||
|
The rule was accepted if 'tcp' or 'udp' was used instead.
|
||||||
|
|
||||||
|
3) Shorewall-shell now removes any default bindings of ipsets before
|
||||||
|
attempting to reload them. Previously, default bindings were not
|
||||||
|
removed with the result that the ipsets could not be destroyed.
|
||||||
|
|
||||||
|
Other changes in Shorewall 4.0.5.
|
||||||
|
|
||||||
|
1) Two new options have been added to /etc/shorewall/hosts
|
||||||
|
(Shorewall-perl only).
|
||||||
|
|
||||||
|
broadcast: Permits limited broadcast (destination 255.255.255.255)
|
||||||
|
to the zone.
|
||||||
|
|
||||||
|
destonly: Normally used with the Multi-cast range. Specifies that
|
||||||
|
traffic will be sent to the specified net(s) but that
|
||||||
|
no traffic will be received from the net(s).
|
||||||
|
|
||||||
|
Example:
|
||||||
|
|
||||||
|
wifi eth1:192.168.3.0/24 broadcast
|
||||||
|
wifi eth1:224.0.0.0/4 destonly
|
||||||
|
|
||||||
|
In that example, limited broadcasts from the firewall with a source
|
||||||
|
IP in the 192.168.3.0/24 range will be acccepted as will multicasts
|
||||||
|
(with any source address).
|
||||||
|
|
||||||
|
2) A MULTICAST option has been added to shorewall.conf. This option
|
||||||
|
will normally be set to 'No' (the default). It should be set to
|
||||||
|
'Yes' under the following circumstances:
|
||||||
|
|
||||||
|
a) You have an interface that has parallel zones defined via
|
||||||
|
/etc/shorewall/hosts.
|
||||||
|
b) You want to forward multicast packets to two or more of those
|
||||||
|
parallel zones.
|
||||||
|
|
||||||
|
In such cases, you will configure a 'destonly' network on each
|
||||||
|
zone receiving multicasts.
|
||||||
|
|
||||||
|
The MULTICAST option is only recognized by Shorewall-perl and is
|
||||||
|
ignored by Shorewall-shell.
|
||||||
|
|
||||||
|
3) As announced in the Shorewall 4.0.4 release notes, Shorewall-perl
|
||||||
|
no longer supports the 'detectnets' option. Specifying that option
|
||||||
|
now results in the following message:
|
||||||
|
|
||||||
|
WARNING: Support for the 'detectnets' option has been removed
|
||||||
|
|
||||||
|
It is suggested that 'detectnets' be replaced by
|
||||||
|
'routefilter,logmartians'. That will produce the same filtering
|
||||||
|
effect as 'detectnets' while eliminating 1-2 rules per connection.
|
||||||
|
|
||||||
|
One user has asked how to retain the output of 'shorewall show
|
||||||
|
zones' if the 'detectnets' option is removed. While I don't advise
|
||||||
|
doing so, you can reproduce the current 'shorewall show' behavior
|
||||||
|
as follows.
|
||||||
|
|
||||||
|
Suppose that you have a zone named 'wifi' that produces the
|
||||||
|
following output with 'detectnets':
|
||||||
|
|
||||||
|
wifi (ipv4)
|
||||||
|
eth1:192.168.3.0/24
|
||||||
|
|
||||||
|
You can reproduce this behavior as follows:
|
||||||
|
|
||||||
|
/etc/shorewall/interfaces:
|
||||||
|
|
||||||
|
- eth1 detect ...
|
||||||
|
|
||||||
|
/etc/shorewall/hosts:
|
||||||
|
|
||||||
|
wifi eth1:192.168.3.0/24 broadcast
|
||||||
|
|
||||||
|
If you send multicast to the 'wifi' zone, you also need this entry
|
||||||
|
in your hosts file:
|
||||||
|
|
||||||
|
wifi eth1:224.0.0.0/4 destonly
|
||||||
|
|
||||||
|
4) (Shorewall-perl only) The server port in a DNAT or REDIRECT rule
|
||||||
|
may now be specified as a service name from
|
||||||
|
/etc/services. Additionally:
|
||||||
|
|
||||||
|
a) A port-range may be specified as the service port expressed in
|
||||||
|
the format <low port>-<high port>. Connections are assigned to
|
||||||
|
server ports in round-robin fashion.
|
||||||
|
|
||||||
|
b) The compiler only permits a server port to be specified if the
|
||||||
|
protocol is tcp or udp.
|
||||||
|
|
||||||
|
c) The compiler ensures that the server IP address is valid (note
|
||||||
|
that it is still not permitted to specify the server address as a
|
||||||
|
DNS name).
|
||||||
|
|
||||||
|
5) (Shorewall-perl only) Users are complaining that when they migrate
|
||||||
|
to Shorewall-perl, they have to restrict their port lists to 15
|
||||||
|
ports. In this release, we relax that restriction on destination
|
||||||
|
port lists. Since the SOURCE PORT(s) column in the configuration
|
||||||
|
files is rarely used, we have no plans to relax the restriction in
|
||||||
|
that column.
|
||||||
|
|
||||||
|
6) There have been several cases where iptables-restore has failed
|
||||||
|
while executing a COMMIT command in the .iptables_restore_input
|
||||||
|
file. This gives neither the user nor Shorewall support much to go
|
||||||
|
on when analyzing the problem. As a new debugging aid, the meaning
|
||||||
|
of 'trace' and 'debug' have been changed.
|
||||||
|
|
||||||
|
Traditionally, /sbin/shorewall and /sbin/shorewall-lite have
|
||||||
|
allowed either 'trace' or 'debug' as the first run-line
|
||||||
|
parameter. Prior to 4.0.5, the two words produced the same effect.
|
||||||
|
|
||||||
|
Beginning with Shorewall 4.0.5, the two words have different
|
||||||
|
effects when Shorewall-perl is used.
|
||||||
|
|
||||||
|
trace - Like the previous behavior.
|
||||||
|
|
||||||
|
In the Shorewall-perl compiler, generate a stack trace
|
||||||
|
on WARNING and ERROR messages.
|
||||||
|
|
||||||
|
In the generated script, sets the shell's -x option to
|
||||||
|
trace execution of the script.
|
||||||
|
|
||||||
|
debug - Ignored by the Shorewall-perl compiler.
|
||||||
|
|
||||||
|
In the generated script, causes the commands in
|
||||||
|
.iptables_restore_input to be executed as discrete iptables
|
||||||
|
commands. The failing command can thus be identified and a
|
||||||
|
diagnosis of the cause can be made.
|
||||||
|
|
||||||
|
Users of Shorewall-lite will see the following change when using a
|
||||||
|
script that was compiled with Shorewall-perl 4.0.5 or later.
|
||||||
|
|
||||||
|
trace - In the generated script, sets the shell's -x option to
|
||||||
|
trace execution of the script.
|
||||||
|
|
||||||
|
debug - In the generated script, causes the commands in
|
||||||
|
.iptables_restore_input to be executed as discrete iptables
|
||||||
|
commands. The failing command can thus be identified and a
|
||||||
|
diagnosis of the cause can be made.
|
||||||
|
|
||||||
|
In all other cases, 'debug' and 'trace' remain synonymous. In
|
||||||
|
particular, users of Shorewall-shell will see no change in
|
||||||
|
behavior.
|
||||||
|
|
||||||
|
WARNING: The 'debug' feature in Shorewall-perl is strictly for
|
||||||
|
problem analysis. When 'debug' is used:
|
||||||
|
|
||||||
|
a) The firewall is made 'wide open' before the rules are applied.
|
||||||
|
b) The routestopped file is not consulted and the rules are applied
|
||||||
|
in the canonical iptables-restore order (ASCIIbetical by chain).
|
||||||
|
So if you need critical hosts to be always available during
|
||||||
|
start/restart, you may not be able to use 'debug'.
|
||||||
|
|
||||||
|
7) /usr/share/shorewall-perl/buildports.pl,
|
||||||
|
/usr/share/shorewall-perl/FallbackPorts.pm and
|
||||||
|
/usr/share/shorewall-perl/Shorewall/Ports.pm have been removed.
|
||||||
|
|
||||||
|
Shorewall now resolves protocol and port names as using Perl's
|
||||||
|
interface to the the standard C library APIs getprotobyname() and
|
||||||
|
getservbyname().
|
||||||
|
|
||||||
|
Note 1:
|
||||||
|
|
||||||
|
The protocol names 'tcp', 'TCP', 'udp', 'UDP', 'all', 'ALL',
|
||||||
|
'icmp' and 'ICMP' are still resolved by Shorewall-perl
|
||||||
|
itself.
|
||||||
|
|
||||||
|
Note 2:
|
||||||
|
|
||||||
|
Those of you running Shorewall-perl under Cygwin may wish to
|
||||||
|
install "real" /etc/protocols and /etc/services files
|
||||||
|
in place of the symbolic links installed by Cygwin.
|
||||||
|
|
||||||
|
8) The contents of the Shorewall::*::$VERSION variables are now a
|
||||||
|
only of interest for Perl programs that are using the modules and
|
||||||
|
specifying a minimum version (e.g., "use Shorewall::Config
|
||||||
|
4.0.5;"). Each module continues to carry a separate version which
|
||||||
|
indicates the release of Shorewall-perl when the module was last
|
||||||
|
modified</pre>
|
||||||
|
<hr>
|
||||||
|
|
||||||
<p><strong>2007-10-02 Shorewall 3.4.7</strong></p>
|
<p><strong>2007-10-02 Shorewall 3.4.7</strong></p>
|
||||||
<pre>Problems Corrected in Shorewall 3.4.7
|
<pre>Problems Corrected in Shorewall 3.4.7
|
||||||
|
|
||||||
@ -49,9 +242,9 @@ License</a></span>”.<br>
|
|||||||
This problem occurred with both compilers.
|
This problem occurred with both compilers.
|
||||||
|
|
||||||
3) When using Shorewall-shell, provider numbers were not recognized in
|
3) When using Shorewall-shell, provider numbers were not recognized in
|
||||||
the PROVIDER column of /etc/shorewall/route_rules.
|
the PROVIDER column of /etc/shorewall/route_rules.</pre>
|
||||||
</pre>
|
|
||||||
<hr>
|
<hr>
|
||||||
|
|
||||||
<p><strong>2007-09-28 Shorewall 4.0.4</strong></p>
|
<p><strong>2007-09-28 Shorewall 4.0.4</strong></p>
|
||||||
<pre>Problems Corrected in Shorewall 4.0.4
|
<pre>Problems Corrected in Shorewall 4.0.4
|
||||||
|
|
||||||
|
@ -21,7 +21,7 @@ Sections, with no Front-Cover, and with no Back-Cover Texts. A copy of the
|
|||||||
license is included in the section entitled “<a href="GnuCopyright.htm"
|
license is included in the section entitled “<a href="GnuCopyright.htm"
|
||||||
target="_self">GNU Free Documentation License</a>”.</p>
|
target="_self">GNU Free Documentation License</a>”.</p>
|
||||||
|
|
||||||
<p>2007-10-06</p>
|
<p>2007-10-22</p>
|
||||||
<hr style="width: 100%; height: 2px;">
|
<hr style="width: 100%; height: 2px;">
|
||||||
|
|
||||||
<h2>Table of Contents</h2>
|
<h2>Table of Contents</h2>
|
||||||
@ -105,17 +105,17 @@ Features page</a>.<br>
|
|||||||
<h3><a name="Releases"></a>Current Shorewall Releases</h3>
|
<h3><a name="Releases"></a>Current Shorewall Releases</h3>
|
||||||
|
|
||||||
<p style="margin-left: 40px;">The <span style="font-weight: bold;">current
|
<p style="margin-left: 40px;">The <span style="font-weight: bold;">current
|
||||||
Stable Release</span> version is 4.0.4<br>
|
Stable Release</span> version is 4.0.5<br>
|
||||||
</p>
|
</p>
|
||||||
<ul style="margin-left: 40px;">
|
<ul style="margin-left: 40px;">
|
||||||
<li>Here are the <a
|
<li>Here are the <a
|
||||||
href="http://www1.shorewall.net/pub/shorewall/4.0/shorewall-4.0.4/releasenotes.txt">release
|
href="http://www1.shorewall.net/pub/shorewall/4.0/shorewall-4.0.5/releasenotes.txt">release
|
||||||
notes</a> <br>
|
notes</a> <br>
|
||||||
</li>
|
</li>
|
||||||
<li>Here are the <a
|
<li>Here are the <a
|
||||||
href="http://www1.shorewall.net/pub/shorewall/4.0/shorewall-4.0.4/known_problems.txt">known
|
href="http://www1.shorewall.net/pub/shorewall/4.0/shorewall-4.0.5/known_problems.txt">known
|
||||||
problems</a> and <a
|
problems</a> and <a
|
||||||
href="http://www1.shorewall.net/pub/shorewall/4.0/shorewall-4.0.4/errata/">updates</a>.
|
href="http://www1.shorewall.net/pub/shorewall/4.0/shorewall-4.0.5/errata/">updates</a>.
|
||||||
<p>Read more about the <a href="Shorewall-4.html">Release here</a>.<br>
|
<p>Read more about the <a href="Shorewall-4.html">Release here</a>.<br>
|
||||||
</p>
|
</p>
|
||||||
</li>
|
</li>
|
||||||
@ -215,8 +215,8 @@ root@wookie:/usr/share/shorewall#</pre>
|
|||||||
<p><font color="#000080"><a href="http://leaf.sourceforge.net/"
|
<p><font color="#000080"><a href="http://leaf.sourceforge.net/"
|
||||||
target="_top"><font color="#000080"><img src="images/leaflogo.gif"
|
target="_top"><font color="#000080"><img src="images/leaflogo.gif"
|
||||||
name="Graphic1" alt="(Leaf Logo)" align="bottom" border="1" height="39"
|
name="Graphic1" alt="(Leaf Logo)" align="bottom" border="1" height="39"
|
||||||
width="52" /></font></a></font> LEAF is an open source project which provides
|
width="52"></font></a></font> LEAF is an open source project which provides a
|
||||||
a Firewall/router on a floppy, CD or CF. Several LEAF distributions including
|
Firewall/router on a floppy, CD or CF. Several LEAF distributions including
|
||||||
Bering and Bering-uClibc use Shorewall as their Netfilter configuration
|
Bering and Bering-uClibc use Shorewall as their Netfilter configuration
|
||||||
tool.</p>
|
tool.</p>
|
||||||
<hr>
|
<hr>
|
||||||
@ -226,7 +226,7 @@ tool.</p>
|
|||||||
<p style="margin-bottom: 0in;"><font color="#000000"><a
|
<p style="margin-bottom: 0in;"><font color="#000000"><a
|
||||||
href="http://openwrt.org/"><font color="#000080"><img
|
href="http://openwrt.org/"><font color="#000080"><img
|
||||||
src="images/openwrt.png" name="graphics1" alt="(OpenWRT Logo)" align="bottom"
|
src="images/openwrt.png" name="graphics1" alt="(OpenWRT Logo)" align="bottom"
|
||||||
border="1" height="34" hspace="4" width="91" /></font></a></font>OpenWRT is a
|
border="1" height="34" hspace="4" width="91"></font></a></font>OpenWRT is a
|
||||||
project which provides open source firmware for Linksys WRT54G wireless
|
project which provides open source firmware for Linksys WRT54G wireless
|
||||||
routers. Two different Shorewall packages are available for OpenWRT.</p>
|
routers. Two different Shorewall packages are available for OpenWRT.</p>
|
||||||
<hr>
|
<hr>
|
||||||
@ -236,10 +236,10 @@ routers. Two different Shorewall packages are available for OpenWRT.</p>
|
|||||||
<p><a href="http://www.alz.org/" target="_top"><font color="#000080"><img
|
<p><a href="http://www.alz.org/" target="_top"><font color="#000080"><img
|
||||||
src="images/alz_logo2.gif" name="Graphic2"
|
src="images/alz_logo2.gif" name="Graphic2"
|
||||||
alt="(Alzheimer's Association Logo)" align="right" border="1" height="66"
|
alt="(Alzheimer's Association Logo)" align="right" border="1" height="66"
|
||||||
width="306" /></font></a><a href="http://www.starlight.org/"
|
width="306"></font></a><a href="http://www.starlight.org/"
|
||||||
target="_top"><font color="#000080"><img src="images/newlog.gif"
|
target="_top"><font color="#000080"><img src="images/newlog.gif"
|
||||||
name="Graphic3" alt="(Starlight Foundation Logo)" align="right" border="1"
|
name="Graphic3" alt="(Starlight Foundation Logo)" align="right" border="1"
|
||||||
height="108" width="65" /></font></a>Shorewall is free but if you try it and
|
height="108" width="65"></font></a>Shorewall is free but if you try it and
|
||||||
find it useful, please consider making a donation to the <a
|
find it useful, please consider making a donation to the <a
|
||||||
href="http://www.alz.org/" target="_top">Alzheimer's Association</a> or to
|
href="http://www.alz.org/" target="_top">Alzheimer's Association</a> or to
|
||||||
the <a href="http://www.starlight.org/" target="_top">Starlight Children's
|
the <a href="http://www.starlight.org/" target="_top">Starlight Children's
|
||||||
|
Loading…
Reference in New Issue
Block a user