mirror of
https://gitlab.com/shorewall/code.git
synced 2025-06-20 09:47:51 +02:00
Shorewall 1.4.3a Changes
git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@561 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
parent
11b0cead80
commit
16de6e1b86
@ -9,3 +9,5 @@ Changes since 1.4.2
|
|||||||
|
|
||||||
4. Return more appropriate ICMP responses if the systems supports them.
|
4. Return more appropriate ICMP responses if the systems supports them.
|
||||||
|
|
||||||
|
5. Silently drop UDP 135 in common.def.
|
||||||
|
|
||||||
|
@ -16,6 +16,7 @@ run_iptables -A common -p icmp -j icmpdef
|
|||||||
############################################################################
|
############################################################################
|
||||||
# NETBIOS chatter
|
# NETBIOS chatter
|
||||||
#
|
#
|
||||||
|
run_iptables -A common -p udp --dport 135 -j reject
|
||||||
run_iptables -A common -p udp --dport 137:139 -j reject
|
run_iptables -A common -p udp --dport 137:139 -j reject
|
||||||
run_iptables -A common -p udp --dport 445 -j reject
|
run_iptables -A common -p udp --dport 445 -j reject
|
||||||
run_iptables -A common -p tcp --dport 139 -j reject
|
run_iptables -A common -p tcp --dport 139 -j reject
|
||||||
|
@ -45,12 +45,11 @@ I strongly recommend that you read the <a
|
|||||||
|
|
||||||
<blockquote> </blockquote>
|
<blockquote> </blockquote>
|
||||||
|
|
||||||
<p align="left">Static NAT can be used to make the systems with the
|
<p align="left">Static NAT can be used to make the systems with the 10.1.1.*
|
||||||
10.1.1.* addresses appear to be on the upper (130.252.100.*) subnet. If
|
addresses appear to be on the upper (130.252.100.*) subnet. If we assume
|
||||||
we assume that the interface to the upper subnet is eth0, then the following
|
that the interface to the upper subnet is eth0, then the following /etc/shorewall/NAT
|
||||||
/etc/shorewall/NAT file would make the lower left-hand system appear
|
file would make the lower left-hand system appear to have IP address
|
||||||
to have IP address 130.252.100.18 and the right-hand one to have IP address
|
130.252.100.18 and the right-hand one to have IP address 130.252.100.19.</p>
|
||||||
130.252.100.19.</p>
|
|
||||||
|
|
||||||
<table border="2" cellpadding="2" style="border-collapse: collapse;">
|
<table border="2" cellpadding="2" style="border-collapse: collapse;">
|
||||||
<tbody>
|
<tbody>
|
||||||
@ -83,18 +82,21 @@ to have IP address 130.252.100.18 and the right-hand one to have IP address
|
|||||||
example) is (are) not included in any specification in /etc/shorewall/masq
|
example) is (are) not included in any specification in /etc/shorewall/masq
|
||||||
or /etc/shorewall/proxyarp.</p>
|
or /etc/shorewall/proxyarp.</p>
|
||||||
|
|
||||||
<p><a name="AllInterFaces"></a>Note 1: The "ALL INTERFACES" column
|
<p><a name="AllInterFaces"></a>Note 1: The "ALL INTERFACES" column is used
|
||||||
is used to specify whether access to the external IP from all firewall
|
to specify whether access to the external IP from all firewall interfaces
|
||||||
interfaces should undergo NAT (Yes or yes) or if only access from the
|
should undergo NAT (Yes or yes) or if only access from the interface in
|
||||||
interface in the INTERFACE column should undergo NAT. If you leave this
|
the INTERFACE column should undergo NAT. If you leave this column empty,
|
||||||
column empty, "Yes" is assumed. The ALL INTERFACES column was added
|
"Yes" is assumed. The ALL INTERFACES column was added in version 1.1.6.</p>
|
||||||
in version 1.1.6.</p>
|
|
||||||
|
|
||||||
<p>Note 2: Shorewall will automatically add the external address to the
|
<p>Note 2: Shorewall will automatically add the external address to the
|
||||||
specified interface unless you specify <a
|
specified interface unless you specify <a
|
||||||
href="Documentation.htm#Aliases">ADD_IP_ALIASES</a>="no" (or "No") in
|
href="Documentation.htm#Aliases">ADD_IP_ALIASES</a>="no" (or "No") in
|
||||||
/etc/shorewall/shorewall.conf; If you do not set ADD_IP_ALIASES or if
|
/etc/shorewall/shorewall.conf; If you do not set ADD_IP_ALIASES or if
|
||||||
you set it to "Yes" or "yes" then you must NOT configure your own alias(es).</p>
|
you set it to "Yes" or "yes" then you must NOT configure your own alias(es).
|
||||||
|
<b>RESTRICTION: </b>Shorewall can only add external addresses to an interface
|
||||||
|
that is configured with a single subnetwork -- if your external interface
|
||||||
|
has addresses in more than one subnetwork, Shorewall can only add addresses
|
||||||
|
to the first one.</p>
|
||||||
|
|
||||||
<p><a name="LocalPackets"></a>Note 3: The contents of the "LOCAL" column
|
<p><a name="LocalPackets"></a>Note 3: The contents of the "LOCAL" column
|
||||||
determine whether packets originating on the firewall itself and destined
|
determine whether packets originating on the firewall itself and destined
|
||||||
@ -106,9 +108,10 @@ are not redirected. The LOCAL column was added in version 1.1.8.</p>
|
|||||||
|
|
||||||
<blockquote> </blockquote>
|
<blockquote> </blockquote>
|
||||||
|
|
||||||
<p><font size="2">Last updated 1/11/2003 - </font><font size="2"> <a
|
<p><font size="2">Last updated 4/11/2003 - </font><font size="2"> <a
|
||||||
href="support.htm">Tom Eastep</a></font> </p>
|
href="support.htm">Tom Eastep</a></font> </p>
|
||||||
<a href="copyright.htm"><font size="2">Copyright</font> © <font
|
<a href="copyright.htm"><font size="2">Copyright</font> © <font
|
||||||
size="2">2001, 2002, 2003 Thomas M. Eastep.</font></a><br>
|
size="2">2001, 2002, 2003 Thomas M. Eastep.</font></a><br>
|
||||||
|
<br>
|
||||||
</body>
|
</body>
|
||||||
</html>
|
</html>
|
||||||
|
File diff suppressed because it is too large
Load Diff
Binary file not shown.
@ -60,6 +60,7 @@
|
|||||||
<center>
|
<center>
|
||||||
<table border="0" cellpadding="0" cellspacing="0"
|
<table border="0" cellpadding="0" cellspacing="0"
|
||||||
style="border-collapse: collapse;" width="100%" id="AutoNumber4">
|
style="border-collapse: collapse;" width="100%" id="AutoNumber4">
|
||||||
|
|
||||||
<tbody>
|
<tbody>
|
||||||
<tr>
|
<tr>
|
||||||
|
|
||||||
@ -70,9 +71,9 @@
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
<p>The Shoreline Firewall, more commonly known as "Shorewall", is a
|
<p>The Shoreline Firewall, more commonly known as "Shorewall", is
|
||||||
<a href="http://www.netfilter.org">Netfilter</a> (iptables) based firewall
|
a <a href="http://www.netfilter.org">Netfilter</a> (iptables) based
|
||||||
that can be used on a dedicated firewall system, a multi-function
|
firewall that can be used on a dedicated firewall system, a multi-function
|
||||||
gateway/router/server or on a standalone GNU/Linux system.</p>
|
gateway/router/server or on a standalone GNU/Linux system.</p>
|
||||||
|
|
||||||
|
|
||||||
@ -80,8 +81,8 @@
|
|||||||
<p>This program is free software; you can redistribute it and/or modify
|
<p>This program is free software; you can redistribute it and/or modify
|
||||||
it
|
it
|
||||||
under the terms of <a
|
under the terms of <a
|
||||||
href="http://www.gnu.org/licenses/gpl.html">Version 2 of the GNU
|
href="http://www.gnu.org/licenses/gpl.html">Version 2 of the
|
||||||
General Public License</a> as published by the Free Software
|
GNU General Public License</a> as published by the Free Software
|
||||||
Foundation.<br>
|
Foundation.<br>
|
||||||
|
|
||||||
<br>
|
<br>
|
||||||
@ -90,8 +91,7 @@ General Public License</a> as published by the Free Software
|
|||||||
it will be useful, but WITHOUT ANY WARRANTY;
|
it will be useful, but WITHOUT ANY WARRANTY;
|
||||||
without even the implied warranty of MERCHANTABILITY
|
without even the implied warranty of MERCHANTABILITY
|
||||||
or FITNESS FOR A PARTICULAR PURPOSE.
|
or FITNESS FOR A PARTICULAR PURPOSE.
|
||||||
See the GNU General Public License for more
|
See the GNU General Public License for more details.<br>
|
||||||
details.<br>
|
|
||||||
|
|
||||||
<br>
|
<br>
|
||||||
You
|
You
|
||||||
@ -112,9 +112,9 @@ General Public License along with
|
|||||||
|
|
||||||
|
|
||||||
<h2>Running Shorewall on Mandrake with a two-interface setup?</h2>
|
<h2>Running Shorewall on Mandrake with a two-interface setup?</h2>
|
||||||
If so, almost <b>NOTHING </b>on this site will apply directly to your setup.
|
If so, almost <b>NOTHING </b>on this site will apply directly to your
|
||||||
If you want to use the documentation that you find here, it is best if you
|
setup. If you want to use the documentation that you find here, it is best
|
||||||
uninstall what you have and install a setup that matches the documentation
|
if you uninstall what you have and install a setup that matches the documentation
|
||||||
on this site. See the <a href="two-interface.htm">Two-interface QuickStart
|
on this site. See the <a href="two-interface.htm">Two-interface QuickStart
|
||||||
Guide</a> for details.<br>
|
Guide</a> for details.<br>
|
||||||
|
|
||||||
@ -128,6 +128,29 @@ General Public License along with
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
<p><b>5/20/2003 - Shorewall-1.4.3a</b><b> </b><b><img border="0"
|
||||||
|
src="images/new10.gif" width="28" height="12" alt="(New)">
|
||||||
|
</b><b> </b><br>
|
||||||
|
</p>
|
||||||
|
This version primarily corrects the documentation included in the .tgz and
|
||||||
|
in the .rpm. In addition: <br>
|
||||||
|
<ol>
|
||||||
|
<li>(This change is in 1.4.3 but is not documented) If you are running
|
||||||
|
iptables 1.2.7a and kernel 2.4.20, then Shorewall will return reject replies
|
||||||
|
as follows:<br>
|
||||||
|
a) tcp - RST<br>
|
||||||
|
b) udp - ICMP port unreachable<br>
|
||||||
|
c) icmp - ICMP host unreachable<br>
|
||||||
|
d) Otherwise - ICMP host prohibited<br>
|
||||||
|
If you are running earlier software, Shorewall will follow it's traditional
|
||||||
|
convention:<br>
|
||||||
|
a) tcp - RST<br>
|
||||||
|
b) Otherwise - ICMP port unreachable</li>
|
||||||
|
<li>UDP port 135 is now silently dropped in the common.def chain.
|
||||||
|
Remember that this chain is traversed just before a DROP or REJECT policy
|
||||||
|
is enforced.<br>
|
||||||
|
</li>
|
||||||
|
</ol>
|
||||||
<p><b>5/18/2003 - Shorewall 1.4.3 </b><b><img border="0"
|
<p><b>5/18/2003 - Shorewall 1.4.3 </b><b><img border="0"
|
||||||
src="images/new10.gif" width="28" height="12" alt="(New)">
|
src="images/new10.gif" width="28" height="12" alt="(New)">
|
||||||
</b><br>
|
</b><br>
|
||||||
@ -183,11 +206,11 @@ Note: You may not use ULOG with fireparse unless you modify fireparse. </li>
|
|||||||
|
|
||||||
|
|
||||||
<blockquote>This morning, I gave <a href="GSLUG.htm" target="_top">a
|
<blockquote>This morning, I gave <a href="GSLUG.htm" target="_top">a
|
||||||
Shorewall presentation to GSLUG</a>. The presentation is in
|
Shorewall presentation to GSLUG</a>. The presentation is
|
||||||
HTML format but was generated from Microsoft PowerPoint and is best viewed
|
in HTML format but was generated from Microsoft PowerPoint and is best
|
||||||
using Internet Explorer (although Konqueror also seems to work reasonably
|
viewed using Internet Explorer (although Konqueror also seems to work
|
||||||
well as does Opera 7.1.0). Neither Opera 6 nor Netscape work well to
|
reasonably well as does Opera 7.1.0). Neither Opera 6 nor Netscape work
|
||||||
view the presentation.<br>
|
well to view the presentation.<br>
|
||||||
</blockquote>
|
</blockquote>
|
||||||
|
|
||||||
|
|
||||||
@ -230,6 +253,7 @@ features Shorewall-1.3.14 and Kernel-2.4.20.
|
|||||||
|
|
||||||
<td width="88" bgcolor="#4b017c" valign="top" align="center">
|
<td width="88" bgcolor="#4b017c" valign="top" align="center">
|
||||||
|
|
||||||
|
|
||||||
<form method="post"
|
<form method="post"
|
||||||
action="http://lists.shorewall.net/cgi-bin/htsearch">
|
action="http://lists.shorewall.net/cgi-bin/htsearch">
|
||||||
<strong><br>
|
<strong><br>
|
||||||
@ -238,6 +262,7 @@ features Shorewall-1.3.14 and Kernel-2.4.20.
|
|||||||
Daily 0200-0330 GMT.</font><br>
|
Daily 0200-0330 GMT.</font><br>
|
||||||
<strong></strong>
|
<strong></strong>
|
||||||
|
|
||||||
|
|
||||||
<p><font color="#ffffff"><strong>Quick Search</strong></font><br>
|
<p><font color="#ffffff"><strong>Quick Search</strong></font><br>
|
||||||
<font face="Arial"
|
<font face="Arial"
|
||||||
size="-1"> <input type="text" name="words" size="15"></font><font
|
size="-1"> <input type="text" name="words" size="15"></font><font
|
||||||
@ -249,6 +274,7 @@ Daily 0200-0330 GMT.</font><br>
|
|||||||
type="hidden" name="exclude"
|
type="hidden" name="exclude"
|
||||||
value="[http://lists.shorewall.net/pipermail/*]"> </font> </form>
|
value="[http://lists.shorewall.net/pipermail/*]"> </font> </form>
|
||||||
|
|
||||||
|
|
||||||
<p><font color="#ffffff"><b><a
|
<p><font color="#ffffff"><b><a
|
||||||
href="http://lists.shorewall.net/htdig/search.html"><font
|
href="http://lists.shorewall.net/htdig/search.html"><font
|
||||||
color="#ffffff">Extended Search</font></a></b></font></p>
|
color="#ffffff">Extended Search</font></a></b></font></p>
|
||||||
@ -280,11 +306,11 @@ Daily 0200-0330 GMT.</font><br>
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
<p align="center"><font size="4" color="#ffffff">Shorewall is free but
|
<p align="center"><font size="4" color="#ffffff">Shorewall is free
|
||||||
if you try it and find it useful, please consider making a donation
|
but if you try it and find it useful, please consider making a donation
|
||||||
to
|
to
|
||||||
<a href="http://www.starlight.org"><font color="#ffffff">Starlight Children's
|
<a href="http://www.starlight.org"><font color="#ffffff">Starlight
|
||||||
Foundation.</font></a> Thanks!</font></p>
|
Children's Foundation.</font></a> Thanks!</font></p>
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
|
|
||||||
@ -292,10 +318,8 @@ if you try it and find it useful, please consider making a donation
|
|||||||
</tbody>
|
</tbody>
|
||||||
</table>
|
</table>
|
||||||
|
|
||||||
<p><font size="2">Updated 5/18/2003 - <a href="support.htm">Tom Eastep</a></font>
|
<p><font size="2">Updated 5/19/2003 - <a href="support.htm">Tom Eastep</a></font>
|
||||||
<br>
|
|
||||||
<br>
|
<br>
|
||||||
</p>
|
</p>
|
||||||
<br>
|
|
||||||
</body>
|
</body>
|
||||||
</html>
|
</html>
|
||||||
|
@ -14,6 +14,7 @@
|
|||||||
<table border="0" cellpadding="0" cellspacing="4"
|
<table border="0" cellpadding="0" cellspacing="4"
|
||||||
style="border-collapse: collapse;" width="100%" id="AutoNumber3"
|
style="border-collapse: collapse;" width="100%" id="AutoNumber3"
|
||||||
bgcolor="#4b017c">
|
bgcolor="#4b017c">
|
||||||
|
|
||||||
<tbody>
|
<tbody>
|
||||||
<tr>
|
<tr>
|
||||||
|
|
||||||
@ -66,22 +67,22 @@ a dedicated firewall system, a multi-function gateway/r
|
|||||||
<p>This program is free software; you can redistribute it and/or modify
|
<p>This program is free software; you can redistribute it and/or modify
|
||||||
it
|
it
|
||||||
under the terms of <a
|
under the terms of <a
|
||||||
href="http://www.gnu.org/licenses/gpl.html">Version 2 of the GNU
|
href="http://www.gnu.org/licenses/gpl.html">Version 2 of the
|
||||||
General Public License</a> as published by the Free Software
|
GNU General Public License</a> as published by the Free Software
|
||||||
Foundation.<br>
|
Foundation.<br>
|
||||||
|
|
||||||
<br>
|
<br>
|
||||||
This
|
|
||||||
program is distributed in the hope that
|
This program is distributed in the hope
|
||||||
it will be useful, but WITHOUT ANY WARRANTY;
|
that it will be useful, but WITHOUT ANY
|
||||||
without even the implied warranty of MERCHANTABILITY
|
WARRANTY; without even the implied warranty
|
||||||
or FITNESS FOR A PARTICULAR PURPOSE.
|
of MERCHANTABILITY or FITNESS FOR A PARTICULAR
|
||||||
See the GNU General Public License for more
|
PURPOSE. See the GNU General Public License
|
||||||
details.<br>
|
for more details.<br>
|
||||||
|
|
||||||
<br>
|
<br>
|
||||||
You
|
|
||||||
should have received a copy of the GNU
|
You should have received a copy of the GNU
|
||||||
General Public License along with
|
General Public License along with
|
||||||
this program; if not, write to the Free Software
|
this program; if not, write to the Free Software
|
||||||
Foundation, Inc., 675 Mass Ave, Cambridge,
|
Foundation, Inc., 675 Mass Ave, Cambridge,
|
||||||
@ -95,9 +96,9 @@ details.<br>
|
|||||||
|
|
||||||
|
|
||||||
<h2>Running Shorewall on Mandrake with a two-interface setup?</h2>
|
<h2>Running Shorewall on Mandrake with a two-interface setup?</h2>
|
||||||
If so, almost <b>NOTHING </b>on this site will apply directly to your setup.
|
If so, almost <b>NOTHING </b>on this site will apply directly to your
|
||||||
If you want to use the documentation that you find here, it is best if you
|
setup. If you want to use the documentation that you find here, it is best
|
||||||
uninstall what you have and install a setup that matches the documentation
|
if you uninstall what you have and install a setup that matches the documentation
|
||||||
on this site. See the <a href="two-interface.htm">Two-interface QuickStart
|
on this site. See the <a href="two-interface.htm">Two-interface QuickStart
|
||||||
Guide</a> for details.<br>
|
Guide</a> for details.<br>
|
||||||
|
|
||||||
@ -110,6 +111,30 @@ details.<br>
|
|||||||
<b> </b>
|
<b> </b>
|
||||||
|
|
||||||
|
|
||||||
|
<p><b>5/20/2003 - Shorewall-1.4.3a</b><b> </b><b><img border="0"
|
||||||
|
src="images/new10.gif" width="28" height="12" alt="(New)">
|
||||||
|
</b><b> </b><br>
|
||||||
|
</p>
|
||||||
|
This version primarily corrects the documentation included in the .tgz and
|
||||||
|
in the .rpm. In addition: <br>
|
||||||
|
|
||||||
|
<ol>
|
||||||
|
<li>(This change is in 1.4.3 but is not documented) If you are running
|
||||||
|
iptables 1.2.7a and kernel 2.4.20, then Shorewall will return reject replies
|
||||||
|
as follows:<br>
|
||||||
|
a) tcp - RST<br>
|
||||||
|
b) udp - ICMP port unreachable<br>
|
||||||
|
c) icmp - ICMP host unreachable<br>
|
||||||
|
d) Otherwise - ICMP host prohibited<br>
|
||||||
|
If you are running earlier software, Shorewall will follow it's traditional
|
||||||
|
convention:<br>
|
||||||
|
a) tcp - RST<br>
|
||||||
|
b) Otherwise - ICMP port unreachable</li>
|
||||||
|
<li>UDP port 135 is now silently dropped in the common.def chain.
|
||||||
|
Remember that this chain is traversed just before a DROP or REJECT policy
|
||||||
|
is enforced.<br>
|
||||||
|
</li>
|
||||||
|
</ol>
|
||||||
<p><b>5/18/2003 - Shorewall 1.4.3 </b><b><img border="0"
|
<p><b>5/18/2003 - Shorewall 1.4.3 </b><b><img border="0"
|
||||||
src="images/new10.gif" width="28" height="12" alt="(New)">
|
src="images/new10.gif" width="28" height="12" alt="(New)">
|
||||||
</b><br>
|
</b><br>
|
||||||
@ -148,9 +173,11 @@ Note: You may not use ULOG with fireparse unless you modify fireparse. </li>
|
|||||||
|
|
||||||
<p><b>4/26/2003 - lists.shorewall.net Downtime</b><b> </b></p>
|
<p><b>4/26/2003 - lists.shorewall.net Downtime</b><b> </b></p>
|
||||||
|
|
||||||
|
|
||||||
<p>The list server will be down this morning for upgrade to RH9.0.<br>
|
<p>The list server will be down this morning for upgrade to RH9.0.<br>
|
||||||
</p>
|
</p>
|
||||||
|
|
||||||
|
|
||||||
<p><b>4/21/2003 - Samples updated for Shorewall version 1.4.2</b><b>
|
<p><b>4/21/2003 - Samples updated for Shorewall version 1.4.2</b><b>
|
||||||
</b></p>
|
</b></p>
|
||||||
|
|
||||||
@ -165,9 +192,9 @@ Note: You may not use ULOG with fireparse unless you modify fireparse. </li>
|
|||||||
|
|
||||||
<blockquote> This morning, I gave <a href="GSLUG.htm"
|
<blockquote> This morning, I gave <a href="GSLUG.htm"
|
||||||
target="_top">a Shorewall presentation to GSLUG</a>. The presentation
|
target="_top">a Shorewall presentation to GSLUG</a>. The presentation
|
||||||
is in HTML format but was generated from Microsoft PowerPoint and is
|
is in HTML format but was generated from Microsoft PowerPoint and
|
||||||
best viewed using Internet Explorer (although Konqueror also seems to
|
is best viewed using Internet Explorer (although Konqueror also seems
|
||||||
work reasonably well as does Opera 7.1.0). Neither Opera 6 nor Netscape
|
to work reasonably well as does Opera 7.1.0). Neither Opera 6 nor Netscape
|
||||||
work well to view the presentation.</blockquote>
|
work well to view the presentation.</blockquote>
|
||||||
|
|
||||||
|
|
||||||
@ -203,9 +230,9 @@ Note: You may not use ULOG with fireparse unless you modify fireparse. </li>
|
|||||||
a LEAF (router/firewall/gateway on a floppy,
|
a LEAF (router/firewall/gateway on a floppy,
|
||||||
CD or compact flash) distribution called
|
CD or compact flash) distribution called
|
||||||
<i>Bering</i> that features Shorewall-1.3.14
|
<i>Bering</i> that features Shorewall-1.3.14
|
||||||
and Kernel-2.4.20. You can find their
|
and Kernel-2.4.20. You can find their work
|
||||||
work at: <a
|
at: <a href="http://leaf.sourceforge.net/devel/jnilo">
|
||||||
href="http://leaf.sourceforge.net/devel/jnilo"> http://leaf.sourceforge.net/devel/jnilo</a></p>
|
http://leaf.sourceforge.net/devel/jnilo</a></p>
|
||||||
|
|
||||||
<b>Congratulations to Jacques and Eric on
|
<b>Congratulations to Jacques and Eric on
|
||||||
the recent release of Bering 1.2!!! </b><br>
|
the recent release of Bering 1.2!!! </b><br>
|
||||||
@ -232,6 +259,7 @@ work at: <a
|
|||||||
|
|
||||||
<td width="88" bgcolor="#4b017c" valign="top"
|
<td width="88" bgcolor="#4b017c" valign="top"
|
||||||
align="center">
|
align="center">
|
||||||
|
|
||||||
<form method="post"
|
<form method="post"
|
||||||
action="http://lists.shorewall.net/cgi-bin/htsearch">
|
action="http://lists.shorewall.net/cgi-bin/htsearch">
|
||||||
|
|
||||||
@ -241,6 +269,7 @@ work at: <a
|
|||||||
GMT.</font><br>
|
GMT.</font><br>
|
||||||
</p>
|
</p>
|
||||||
|
|
||||||
|
|
||||||
<p><font color="#ffffff"><strong>Quick Search</strong></font><br>
|
<p><font color="#ffffff"><strong>Quick Search</strong></font><br>
|
||||||
<font face="Arial" size="-1"> <input
|
<font face="Arial" size="-1"> <input
|
||||||
type="text" name="words" size="15"></font><font size="-1"> </font><font
|
type="text" name="words" size="15"></font><font size="-1"> </font><font
|
||||||
@ -278,6 +307,7 @@ GMT.</font><br>
|
|||||||
<td width="100%" style="margin-top: 1px;">
|
<td width="100%" style="margin-top: 1px;">
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
<p align="center"><a href="http://www.starlight.org"> <img
|
<p align="center"><a href="http://www.starlight.org"> <img
|
||||||
border="4" src="images/newlog.gif" width="57" height="100" align="left"
|
border="4" src="images/newlog.gif" width="57" height="100" align="left"
|
||||||
hspace="10">
|
hspace="10">
|
||||||
@ -286,8 +316,8 @@ GMT.</font><br>
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
<p align="center"><font size="4" color="#ffffff">Shorewall is free but
|
<p align="center"><font size="4" color="#ffffff">Shorewall is free
|
||||||
if you try it and find it useful, please consider making a donation
|
but if you try it and find it useful, please consider making a donation
|
||||||
to
|
to
|
||||||
<a href="http://www.starlight.org"><font color="#ffffff">Starlight
|
<a href="http://www.starlight.org"><font color="#ffffff">Starlight
|
||||||
Children's Foundation.</font></a> Thanks!</font></p>
|
Children's Foundation.</font></a> Thanks!</font></p>
|
||||||
@ -299,10 +329,8 @@ Children's Foundation.</font></a> Thanks!</font></p>
|
|||||||
</tbody>
|
</tbody>
|
||||||
</table>
|
</table>
|
||||||
|
|
||||||
<p><font size="2">Updated 5/18/2003 - <a href="support.htm">Tom Eastep</a></font>
|
<p><font size="2">Updated 5/19/2003 - <a href="support.htm">Tom Eastep</a></font>
|
||||||
<br>
|
<br>
|
||||||
</p>
|
</p>
|
||||||
<br>
|
|
||||||
<br>
|
|
||||||
</body>
|
</body>
|
||||||
</html>
|
</html>
|
||||||
|
@ -28,7 +28,7 @@
|
|||||||
# shown below. Simply run this script to revert to your prior version of
|
# shown below. Simply run this script to revert to your prior version of
|
||||||
# Shoreline Firewall.
|
# Shoreline Firewall.
|
||||||
|
|
||||||
VERSION=1.4.3
|
VERSION=1.4.3a
|
||||||
|
|
||||||
usage() # $1 = exit status
|
usage() # $1 = exit status
|
||||||
{
|
{
|
||||||
|
@ -95,7 +95,11 @@ error_message() # $* = Error Message
|
|||||||
fatal_error() # $* = Error Message
|
fatal_error() # $* = Error Message
|
||||||
{
|
{
|
||||||
echo " Error: $@" >&2
|
echo " Error: $@" >&2
|
||||||
[ $command = check ] || stop_firewall
|
if [ $command = check ]; then
|
||||||
|
[ -n "$TMP_DIR" ] && rm -rf $TMP_DIR
|
||||||
|
else
|
||||||
|
stop_firewall
|
||||||
|
fi
|
||||||
exit 2
|
exit 2
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -1130,6 +1134,9 @@ setup_tunnels() # $1 = name of tunnels file
|
|||||||
gre|GRE)
|
gre|GRE)
|
||||||
setup_one_other GRE $gateway 47
|
setup_one_other GRE $gateway 47
|
||||||
;;
|
;;
|
||||||
|
6to4|6TO4)
|
||||||
|
setup_one_other 6to4 $gateway 41
|
||||||
|
;;
|
||||||
pptpclient|PPTPCLIENT)
|
pptpclient|PPTPCLIENT)
|
||||||
setup_pptp_client $gateway
|
setup_pptp_client $gateway
|
||||||
;;
|
;;
|
||||||
@ -1316,7 +1323,7 @@ setup_mac_lists() {
|
|||||||
done
|
done
|
||||||
|
|
||||||
[ -n "$logpart" ] && \
|
[ -n "$logpart" ] && \
|
||||||
run_iptables -A $chain $logpart "Shorewall:$chain:$MACLIST_DISPOSITION:"
|
run_iptables -A $chain $logpart "${LOGMARKER}$chain:$MACLIST_DISPOSITION:"
|
||||||
|
|
||||||
run_iptables -A $chain -j $maclist_target
|
run_iptables -A $chain -j $maclist_target
|
||||||
done
|
done
|
||||||
@ -2015,11 +2022,11 @@ add_a_rule()
|
|||||||
if [ "$loglevel" = ULOG ]; then
|
if [ "$loglevel" = ULOG ]; then
|
||||||
run_iptables2 -A $chain $proto $multiport \
|
run_iptables2 -A $chain $proto $multiport \
|
||||||
$state $cli $sports $serv $dports -j ULOG $LOGPARMS \
|
$state $cli $sports $serv $dports -j ULOG $LOGPARMS \
|
||||||
--ulog-prefix "Shorewall:$chain:$logtarget:"
|
--ulog-prefix "${LOGMARKER}$chain:$logtarget:"
|
||||||
else
|
else
|
||||||
run_iptables2 -A $chain $proto $multiport \
|
run_iptables2 -A $chain $proto $multiport \
|
||||||
$state $cli $sports $serv $dports -j LOG $LOGPARMS \
|
$state $cli $sports $serv $dports -j LOG $LOGPARMS \
|
||||||
--log-prefix "Shorewall:$chain:$logtarget:" \
|
--log-prefix "${LOGMARKER}$chain:$logtarget:" \
|
||||||
--log-level $loglevel
|
--log-level $loglevel
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
@ -2042,11 +2049,11 @@ add_a_rule()
|
|||||||
if [ "$loglevel" = ULOG ]; then
|
if [ "$loglevel" = ULOG ]; then
|
||||||
run_iptables2 -A $chain $proto $multiport \
|
run_iptables2 -A $chain $proto $multiport \
|
||||||
$dest_interface $state $cli $sports $dports -j ULOG \
|
$dest_interface $state $cli $sports $dports -j ULOG \
|
||||||
$LOGPARMS --ulog-prefix "Shorewall:$chain:$logtarget:"
|
$LOGPARMS --ulog-prefix "${LOGMARKER}$chain:$logtarget:"
|
||||||
else
|
else
|
||||||
run_iptables2 -A $chain $proto $multiport \
|
run_iptables2 -A $chain $proto $multiport \
|
||||||
$dest_interface $state $cli $sports $dports -j LOG \
|
$dest_interface $state $cli $sports $dports -j LOG \
|
||||||
$LOGPARMS --log-prefix "Shorewall:$chain:$logtarget:" \
|
$LOGPARMS --log-prefix "${LOGMARKER}$chain:$logtarget:" \
|
||||||
--log-level $loglevel
|
--log-level $loglevel
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
@ -2551,10 +2558,10 @@ policy_rules() # $1 = chain to add rules to
|
|||||||
if [ $# -eq 3 -a "x${3}" != "x-" ]; then
|
if [ $# -eq 3 -a "x${3}" != "x-" ]; then
|
||||||
if [ "$3" = ULOG ]; then
|
if [ "$3" = ULOG ]; then
|
||||||
run_iptables -A $1 -j ULOG $LOGPARMS \
|
run_iptables -A $1 -j ULOG $LOGPARMS \
|
||||||
--ulog-prefix "Shorewall:${1}:${2}:"
|
--ulog-prefix "${LOGMARKER}${1}:${2}:"
|
||||||
else
|
else
|
||||||
run_iptables -A $1 -j LOG $LOGPARMS \
|
run_iptables -A $1 -j LOG $LOGPARMS \
|
||||||
--log-prefix "Shorewall:${1}:${2}:" --log-level $3
|
--log-prefix "${LOGMARKER}${1}:${2}:" --log-level $3
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
|
|
||||||
@ -2878,11 +2885,11 @@ add_blacklist_rule() {
|
|||||||
if [ "$BLACKLIST_LOGLEVEL" = ULOG ]; then
|
if [ "$BLACKLIST_LOGLEVEL" = ULOG ]; then
|
||||||
run_iptables2 -A blacklst $source $proto $dport -j \
|
run_iptables2 -A blacklst $source $proto $dport -j \
|
||||||
ULOG $LOGPARMS --ulog-prefix \
|
ULOG $LOGPARMS --ulog-prefix \
|
||||||
"Shorewall:blacklst:$BLACKLIST_DISPOSITION:"
|
"${LOGMARKER}blacklst:$BLACKLIST_DISPOSITION:"
|
||||||
else
|
else
|
||||||
run_iptables2 -A blacklst $source $proto $dport -j \
|
run_iptables2 -A blacklst $source $proto $dport -j \
|
||||||
LOG $LOGPARMS --log-prefix \
|
LOG $LOGPARMS --log-prefix \
|
||||||
"Shorewall:blacklst:$BLACKLIST_DISPOSITION:" \
|
"${LOGMARKER}blacklst:$BLACKLIST_DISPOSITION:" \
|
||||||
--log-level $BLACKLIST_LOGLEVEL
|
--log-level $BLACKLIST_LOGLEVEL
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
@ -3198,6 +3205,7 @@ initialize_netfilter () {
|
|||||||
|
|
||||||
#
|
#
|
||||||
# Enable the Loopback interface
|
# Enable the Loopback interface
|
||||||
|
#
|
||||||
run_iptables -A INPUT -i lo -j ACCEPT
|
run_iptables -A INPUT -i lo -j ACCEPT
|
||||||
run_iptables -A OUTPUT -o lo -j ACCEPT
|
run_iptables -A OUTPUT -o lo -j ACCEPT
|
||||||
|
|
||||||
@ -3221,10 +3229,10 @@ initialize_netfilter () {
|
|||||||
if [ -n "$LOGNEWNOTSYN" ]; then
|
if [ -n "$LOGNEWNOTSYN" ]; then
|
||||||
if [ "$LOGNEWNOTSYN" = ULOG ]; then
|
if [ "$LOGNEWNOTSYN" = ULOG ]; then
|
||||||
run_iptables -A newnotsyn -j ULOG $LOGPARMS \
|
run_iptables -A newnotsyn -j ULOG $LOGPARMS \
|
||||||
--ulog-prefix "Shorewall:newnotsyn:DROP:"
|
--ulog-prefix "${LOGMARKER}newnotsyn:DROP:"
|
||||||
else
|
else
|
||||||
run_iptables -A newnotsyn -j LOG $LOGPARMS \
|
run_iptables -A newnotsyn -j LOG $LOGPARMS \
|
||||||
--log-prefix "Shorewall:newnotsyn:DROP:" --log-level $LOGNEWNOTSYN
|
--log-prefix "${LOGMARKER}newnotsyn:DROP:" --log-level $LOGNEWNOTSYN
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
|
|
||||||
@ -3299,16 +3307,26 @@ add_common_rules() {
|
|||||||
logdisp() # $1 = Chain Name
|
logdisp() # $1 = Chain Name
|
||||||
{
|
{
|
||||||
if [ "$RFC1918_LOG_LEVEL" = ULOG ]; then
|
if [ "$RFC1918_LOG_LEVEL" = ULOG ]; then
|
||||||
echo "ULOG $LOGPARMS --ulog-prefix Shorewall:${1}:DROP:"
|
echo "ULOG $LOGPARMS --ulog-prefix ${LOGMARKER}${1}:DROP:"
|
||||||
else
|
else
|
||||||
echo "LOG $LOGPARMS --log-prefix Shorewall:${1}:DROP: --log-level $RFC1918_LOG_LEVEL"
|
echo "LOG $LOGPARMS --log-prefix ${LOGMARKER}${1}:DROP: --log-level $RFC1918_LOG_LEVEL"
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
#
|
#
|
||||||
# Reject Rules
|
# Reject Rules
|
||||||
#
|
#
|
||||||
run_iptables -A reject -p tcp -j REJECT --reject-with tcp-reset
|
run_iptables -A reject -p tcp -j REJECT --reject-with tcp-reset
|
||||||
|
run_iptables -A reject -p udp -j REJECT
|
||||||
|
#
|
||||||
|
# Not all versions of iptables support these so don't complain if they don't work
|
||||||
|
#
|
||||||
|
qt iptables -A reject -p icmp -j REJECT --reject-with icmp-host-unreachable
|
||||||
|
if ! qt iptables -A reject -j REJECT --reject-with icmp-host-prohibited; then
|
||||||
|
#
|
||||||
|
# In case the above doesn't work
|
||||||
|
#
|
||||||
run_iptables -A reject -j REJECT
|
run_iptables -A reject -j REJECT
|
||||||
|
fi
|
||||||
#
|
#
|
||||||
# dropunclean rules
|
# dropunclean rules
|
||||||
#
|
#
|
||||||
@ -3319,10 +3337,10 @@ add_common_rules() {
|
|||||||
|
|
||||||
if [ -n "$LOGUNCLEAN" ]; then
|
if [ -n "$LOGUNCLEAN" ]; then
|
||||||
if [ "$LOGUNCLEAN" = ULOG ]; then
|
if [ "$LOGUNCLEAN" = ULOG ]; then
|
||||||
logoptions="-j ULOG $LOGPARMS --ulog-prefix Shorewall:badpkt:DROP:"
|
logoptions="-j ULOG $LOGPARMS --ulog-prefix ${LOGMARKER}badpkt:DROP:"
|
||||||
logoptions="$logoptions --log-ip-options"
|
logoptions="$logoptions --log-ip-options"
|
||||||
else
|
else
|
||||||
logoptions="-j LOG $LOGPARMS --log-prefix Shorewall:badpkt:DROP:"
|
logoptions="-j LOG $LOGPARMS --log-prefix ${LOGMARKER}badpkt:DROP:"
|
||||||
logoptions="$logoptions --log-level $LOGUNCLEAN --log-ip-options"
|
logoptions="$logoptions --log-level $LOGUNCLEAN --log-ip-options"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
@ -3351,10 +3369,10 @@ add_common_rules() {
|
|||||||
[ -z"$LOGUNCLEAN" ] && LOGUNCLEAN=info
|
[ -z"$LOGUNCLEAN" ] && LOGUNCLEAN=info
|
||||||
|
|
||||||
if [ "$LOGUNCLEAN" = ULOG ]; then
|
if [ "$LOGUNCLEAN" = ULOG ]; then
|
||||||
logoptions="-j ULOG $LOGPARMS --ulog-prefix Shorewall:logpkt:LOG:"
|
logoptions="-j ULOG $LOGPARMS --ulog-prefix ${LOGMARKER}logpkt:LOG:"
|
||||||
logoptions="$logoptions --log-ip-options"
|
logoptions="$logoptions --log-ip-options"
|
||||||
else
|
else
|
||||||
logoptions="-j LOG $LOGPARMS --log-prefix Shorewall:logpkt:LOG:"
|
logoptions="-j LOG $LOGPARMS --log-prefix ${LOGMARKER}logpkt:LOG:"
|
||||||
logoptions="$logoptions --log-level $LOGUNCLEAN --log-ip-options"
|
logoptions="$logoptions --log-level $LOGUNCLEAN --log-ip-options"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
@ -3455,12 +3473,12 @@ add_common_rules() {
|
|||||||
|
|
||||||
if [ "$TCP_FLAGS_LOG_LEVEL" = ULOG ]; then
|
if [ "$TCP_FLAGS_LOG_LEVEL" = ULOG ]; then
|
||||||
run_iptables -A logflags -j ULOG $LOGPARMS \
|
run_iptables -A logflags -j ULOG $LOGPARMS \
|
||||||
--ulog-prefix "Shorewall:logflags:$TCP_FLAGS_DISPOSITION:" \
|
--ulog-prefix "${LOGMARKER}logflags:$TCP_FLAGS_DISPOSITION:" \
|
||||||
--log-tcp-options --log-ip-options
|
--log-tcp-options --log-ip-options
|
||||||
else
|
else
|
||||||
run_iptables -A logflags -j LOG $LOGPARMS \
|
run_iptables -A logflags -j LOG $LOGPARMS \
|
||||||
--log-level $TCP_FLAGS_LOG_LEVEL \
|
--log-level $TCP_FLAGS_LOG_LEVEL \
|
||||||
--log-prefix "Shorewall:logflags:$TCP_FLAGS_DISPOSITION:" \
|
--log-prefix "${LOGMARKER}logflags:$TCP_FLAGS_DISPOSITION:" \
|
||||||
--log-tcp-options --log-ip-options
|
--log-tcp-options --log-ip-options
|
||||||
fi
|
fi
|
||||||
case $TCP_FLAGS_DISPOSITION in
|
case $TCP_FLAGS_DISPOSITION in
|
||||||
@ -4326,6 +4344,7 @@ do_initialize() {
|
|||||||
SHARED_DIR=/usr/share/shorewall
|
SHARED_DIR=/usr/share/shorewall
|
||||||
FUNCTIONS=
|
FUNCTIONS=
|
||||||
VERSION_FILE=
|
VERSION_FILE=
|
||||||
|
LOGMARKER=
|
||||||
|
|
||||||
stopping=
|
stopping=
|
||||||
have_mutex=
|
have_mutex=
|
||||||
@ -4452,6 +4471,8 @@ do_initialize() {
|
|||||||
CLEAR_TC=
|
CLEAR_TC=
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
[ -n "$LOGMARKER" ] || LOGMARKER="Shorewall:"
|
||||||
|
|
||||||
#
|
#
|
||||||
# Strip the files that we use often
|
# Strip the files that we use often
|
||||||
#
|
#
|
||||||
|
@ -54,7 +54,7 @@
|
|||||||
# /etc/rc.d/rc.local file is modified to start the firewall.
|
# /etc/rc.d/rc.local file is modified to start the firewall.
|
||||||
#
|
#
|
||||||
|
|
||||||
VERSION=1.4.3
|
VERSION=1.4.3a
|
||||||
|
|
||||||
usage() # $1 = exit status
|
usage() # $1 = exit status
|
||||||
{
|
{
|
||||||
|
@ -19,3 +19,19 @@ New Features:
|
|||||||
(http://www.fireparse.com) by setting LOGMARKER="fp=" in
|
(http://www.fireparse.com) by setting LOGMARKER="fp=" in
|
||||||
/etc/shorewall/shorewall.conf. Note: You may not use ULOG
|
/etc/shorewall/shorewall.conf. Note: You may not use ULOG
|
||||||
with fireparse unless you modify fireparse.
|
with fireparse unless you modify fireparse.
|
||||||
|
|
||||||
|
3) If you are running iptables 1.2.7a and kernel 2.4.20, then
|
||||||
|
Shorewall will return reject replies as follows:
|
||||||
|
|
||||||
|
a) tcp - RST
|
||||||
|
b) udp - ICMP port unreachable
|
||||||
|
c) icmp - ICMP host unreachable
|
||||||
|
d) Otherwise - ICMP host prohibited
|
||||||
|
|
||||||
|
If you are running earlier software, Shorewall will follow it's
|
||||||
|
traditional convention:
|
||||||
|
|
||||||
|
a) tcp - RST
|
||||||
|
b) Otherwise - ICMP port unreachable
|
||||||
|
|
||||||
|
4) UDP Port 135 is now silently dropped in the common.def chain.
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
%define name shorewall
|
%define name shorewall
|
||||||
%define version 1.4.3
|
%define version 1.4.3a
|
||||||
%define release 1
|
%define release 1
|
||||||
%define prefix /usr
|
%define prefix /usr
|
||||||
|
|
||||||
@ -105,6 +105,8 @@ fi
|
|||||||
%doc COPYING INSTALL changelog.txt releasenotes.txt tunnel
|
%doc COPYING INSTALL changelog.txt releasenotes.txt tunnel
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Mon May 19 2003 Tom Eastep <tom@shorewall.net>
|
||||||
|
- Changed version to 1.4.3a-1
|
||||||
* Sun May 18 2003 Tom Eastep <tom@shorewall.net>
|
* Sun May 18 2003 Tom Eastep <tom@shorewall.net>
|
||||||
- Changed version to 1.4.3-1
|
- Changed version to 1.4.3-1
|
||||||
* Mon Apr 07 2003 Tom Eastep <tom@shorewall.net>
|
* Mon Apr 07 2003 Tom Eastep <tom@shorewall.net>
|
||||||
|
@ -26,7 +26,7 @@
|
|||||||
# You may only use this script to uninstall the version
|
# You may only use this script to uninstall the version
|
||||||
# shown below. Simply run this script to remove Seattle Firewall
|
# shown below. Simply run this script to remove Seattle Firewall
|
||||||
|
|
||||||
VERSION=1.4.3
|
VERSION=1.4.3a
|
||||||
|
|
||||||
usage() # $1 = exit status
|
usage() # $1 = exit status
|
||||||
{
|
{
|
||||||
|
Loading…
x
Reference in New Issue
Block a user