diff --git a/Shorewall-docs2/IPSEC-2.6.xml b/Shorewall-docs2/IPSEC-2.6.xml
index e43b3c7e7..8aa999c20 100644
--- a/Shorewall-docs2/IPSEC-2.6.xml
+++ b/Shorewall-docs2/IPSEC-2.6.xml
@@ -15,7 +15,7 @@
- 2005-02-06
+ 2005-02-08
2004
@@ -330,8 +330,11 @@ spdadd 134.28.54.2/32 206.162.148.9/32 any -P in ipsec esp/tunnel/134.28.54.2
If you are running kernel 2.6.10 or later, then you need
- ipsec-tools (and racoon) 0.5 or later and you need to add -P fwd rules -- see -P fwd rules (duplicate each -P in rule and replace the in with fwd) --
+ see http://www.ipsec-howto.org/x277.html.
diff --git a/Shorewall-docs2/Install.xml b/Shorewall-docs2/Install.xml
index 352f989ab..3997e6d40 100644
--- a/Shorewall-docs2/Install.xml
+++ b/Shorewall-docs2/Install.xml
@@ -15,7 +15,7 @@
- 2004-12-27
+ 2005-02-05
2001
@@ -26,6 +26,8 @@
2004
+ 2005
+
Thomas M. Eastep
@@ -218,9 +220,11 @@ INIT="rc.firewall"
To install my version of Shorewall on a fresh Bering disk, simply
replace the shorwall.lrp
file on the image with the file
- that you downloaded. See the two-interface
- QuickStart Guide for information about further steps
- required.
+ that you downloaded. For example, if you download
+ shorewall-lrp-2.2.0.tgz then you will rename the file
+ to shorwall.lrp and replace the file by that name on
+ the Bering disk with the new file. Then proceed to configure Shorewall as
+ described in the Bering (or Bering uClibc) documentation.
diff --git a/Shorewall-docs2/MAC_Validation.xml b/Shorewall-docs2/MAC_Validation.xml
index 1961520c2..c6c491412 100644
--- a/Shorewall-docs2/MAC_Validation.xml
+++ b/Shorewall-docs2/MAC_Validation.xml
@@ -15,10 +15,10 @@
- 2004-04-05
+ 2005-02-08
- 2001-2004
+ 2001-2005
Thomas M. Eastep
@@ -29,13 +29,15 @@
1.2 or any later version published by the Free Software Foundation; with
no Invariant Sections, with no Front-Cover, and with no Back-Cover
Texts. A copy of the license is included in the section entitled
- GNU Free Documentation License
.
+ GNU Free Documentation
+ License
.
All traffic from an interface or from a subnet on an interface can be
verified to originate from a defined set of MAC addresses. Furthermore, each
- MAC address may be optionally associated with one or more IP addresses.
+ MAC address may be optionally associated with one or more IP
+ addresses.
MAC addresses are only visible within an
@@ -49,6 +51,11 @@
(CONFIG_IP_NF_MATCH_MAC - module name ipt_mac.o).
+
+ MAC verification is only applied to new
+ incoming connection requests.
+
+
Components
@@ -57,16 +64,17 @@
The maclist interface option in
- /etc/shorewall/interfaces.
- When this option is specified, all traffic arriving on the interface
- is subjet to MAC verification.
+ /etc/shorewall/interfaces.
+ When this option is specified, all new connection requests arriving on
+ the interface are subject to MAC verification.
The maclist option in /etc/shorewall/hosts. When this
- option is specified for a subnet, all traffic from that subnet is
- subject to MAC verification.
+ option is specified for a subnet, all new connection requests from
+ that subnet are subject to MAC verification.
@@ -83,8 +91,8 @@
and determines the disposition of connection requests that fail MAC
verification. The MACLIST_LOG_LEVEL variable gives the syslogd level
at which connection requests that fail verification are to be logged.
- If set the the empty value (e.g., MACLIST_LOG_LEVEL="") then
- failing connection requests are not logged.
+ If set the the empty value (e.g., MACLIST_LOG_LEVEL="") then failing
+ connection requests are not logged.
@@ -99,7 +107,8 @@
INTERFACE
- The name of an ethernet interface on the Shorewall system.
+ The name of an ethernet interface on the Shorewall
+ system.
@@ -109,7 +118,8 @@
The MAC address of a device on the ethernet segment connected
by INTERFACE. It is not necessary to use the Shorewall MAC format in
- this column although you may use that format if you so choose.
+ this column although you may use that format if you so
+ choose.
@@ -155,11 +165,13 @@ eth3 00:0b:cd:C4:cc:97 192.168.3.8 #TIP
As shown above, I use MAC Verification on my wireless zone.
- While marketed as a wireless bridge, the WET11 behaves
- like a wireless router with DHCP relay. When forwarding DHCP traffic, it
- uses the MAC address of the host (TIPPER) but for other forwarded
- traffic it uses it's own MAC address. Consequently, I list the IP
- addresses of both devices in /etc/shorewall/maclist.
+
+ While marketed as a wireless bridge, the WET11 behaves like a
+ wireless router with DHCP relay. When forwarding DHCP traffic, it
+ uses the MAC address of the host (TIPPER) but for other forwarded
+ traffic it uses it's own MAC address. Consequently, I list the IP
+ addresses of both devices in /etc/shorewall/maclist.
+
@@ -176,9 +188,9 @@ eth3 00:0b:cd:C4:cc:97 192.168.3.8 #TIP
This entry accomodates traffic from the router itself
(192.168.3.253) and from the second wireless segment (192.168.4.0/24).
Remember that all traffic being sent to my firewall from the
- 192.168.4.0/24 segment will be forwarded by the router so that
- traffic's MAC address will be that of the router (00:06:43:45:C6:15)
- and not that of the host sending the traffic.
+ 192.168.4.0/24 segment will be forwarded by the router so that traffic's
+ MAC address will be that of the router (00:06:43:45:C6:15) and not that
+ of the host sending the traffic.
\ No newline at end of file
diff --git a/Shorewall-docs2/Shorewall_and_Aliased_Interfaces.xml b/Shorewall-docs2/Shorewall_and_Aliased_Interfaces.xml
index f8805cd95..831c36b74 100644
--- a/Shorewall-docs2/Shorewall_and_Aliased_Interfaces.xml
+++ b/Shorewall-docs2/Shorewall_and_Aliased_Interfaces.xml
@@ -15,10 +15,10 @@
- 2004-07-10
+ 2002-02-07
- 2001-2004
+ 2001-2005
Thomas M. Eastep
@@ -29,7 +29,8 @@
1.2 or any later version published by the Free Software Foundation; with
no Invariant Sections, with no Front-Cover, and with no Back-Cover
Texts. A copy of the license is included in the section entitled
- GNU Free Documentation License
.
+ GNU Free Documentation
+ License
.
@@ -67,23 +68,27 @@ eth0:0 Link encap:Ethernet HWaddr 02:00:08:3:FA:55
ip
[root@gateway root]# ip addr show dev eth0
-2: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc htb qlen 100
+2: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc htb qlen 100
link/ether 02:00:08:e3:fa:55 brd ff:ff:ff:ff:ff:ff
inet 206.124.146.176/24 brd 206.124.146.255 scope global eth0
inet 206.124.146.178/24 brd 206.124.146.255 scope global secondary eth0:0
[root@gateway root]#
- One cannot type
- ip addr show dev eth0:0
because
- eth0:0
is a label
- for a particular address rather than a device name.[root@gateway root]# ip addr show dev eth0:0
-Device "eth0:0" does not exist.
-[root@gateway root]#
+
+ One cannot type
+ ip addr show dev eth0:0
because
+ eth0:0
is a
+ label for a particular address rather than a device name.
+
+ [root@gateway root]# ip addr show dev eth0:0
+Device "eth0:0" does not exist.
+[root@gateway root]#
+
- The iptables program doesn't support virtual interfaces in
- either it's -i
or -o
command options; as
- a consequence, Shorewall does not allow them to be used in the
+ The iptables program doesn't support virtual interfaces in either
+ it's -i
or -o
command options; as a
+ consequence, Shorewall does not allow them to be used in the
/etc/shorewall/interfaces file or anywhere else except as described in the
discussion below.
@@ -92,8 +97,8 @@ Device "eth0:0" does not exist.
Adding Addresses to Interfaces
Most distributions have a facility for adding additional addresses
- to interfaces. If you have already used your distribution's capability
- to add your required addresses, you can skip this section.
+ to interfaces. If you have already used your distribution's capability to
+ add your required addresses, you can skip this section.
Shorewall provides facilities for automatically adding addresses to
interfaces as described in the following section. It is also easy to add
@@ -124,7 +129,7 @@ esac
So how do I handle more than one address on an interface?
The answer depends on what you are trying to do with the interfaces.
- In the sub-sections that follow, we'll take a look at common
+ In the sub-sections that follow, we'll take a look at common
scenarios.
@@ -150,7 +155,7 @@ ACCEPT net $FW:206.124.146.178 tcp 22
zone at 192.168.1.3. That is accomplised by a single rule in the
/etc/shorewall/rules file:
- #ACTION SOURCE DEST PROTO DEST PORT(S) SOURCE ORIGINAL
+ #ACTION SOURCE DEST PROTO DEST POR------------------T(S) SOURCE ORIGINAL
# PORT(S) DEST
DNAT net loc:192.168.1.3 tcp 80 - 206.124.146.178
@@ -159,17 +164,19 @@ DNAT net loc:192.168.1.3 tcp 80 - 20
SNAT
If you wanted to use eth0:0 as the IP address for outbound
- connections from your local zone (eth1), then in /etc/shorewall/masq:
+ connections from your local zone (eth1), then in
+ /etc/shorewall/masq:
#INTERFACE SUBNET ADDRESS
eth0 eth1 206.124.146.178
Shorewall can create the alias (additional address) for you if you
- set ADD_SNAT_ALIASES=Yes in /etc/shorewall/shorewall.conf.
- Beginning with Shorewall 1.3.14, Shorewall can actually create the
- label
(virtual interface) so that you can see the created
- address using ifconfig. In addition to setting ADD_SNAT_ALIASES=Yes, you
- specify the virtual interface name in the INTERFACE column as follows.
+ set ADD_SNAT_ALIASES=Yes in
+ /etc/shorewall/shorewall.conf. Beginning with
+ Shorewall 1.3.14, Shorewall can actually create the label
+ (virtual interface) so that you can see the created address using
+ ifconfig. In addition to setting ADD_SNAT_ALIASES=Yes, you specify the
+ virtual interface name in the INTERFACE column as follows.
/etc/shorewall/masq#INTERFACE SUBNET ADDRESS
eth0:0 eth1 206.124.146.178
@@ -195,7 +202,8 @@ eth0:2 = 206.124.146.180
If you wanted to use one-to-one NAT to link eth0:0 with local address 192.168.1.3, you
- would have the following in /etc/shorewall/nat:
+ would have the following in
+ /etc/shorewall/nat:
#EXTERNAL INTERFACE INTERNAL ALL INTERFACES LOCAL
206.124.146.178 eth0 192.168.1.3 no no
@@ -210,9 +218,10 @@ eth0:2 = 206.124.146.180
/etc/shorewall/nat#EXTERNAL INTERFACE INTERNAL ALL INTERFACES LOCAL
206.124.146.178 eth0:0 192.168.1.3 no no
- In either case, to create rules in /etc/shorewall/rules
- that pertain only to this NAT pair, you simply qualify the local zone
- with the internal IP address.
+ In either case, to create rules in
+ /etc/shorewall/rules that pertain only to this NAT
+ pair, you simply qualify the local zone with the internal IP
+ address.
You want to allow SSH from the net to 206.124.146.178 a.k.a.
@@ -230,7 +239,7 @@ ACCEPT net loc:192.168.1.3 tcp 22
multiple subnetworks configured on a LAN segment. This technique does
not provide for any security between the subnetworks if the users of the
systems have administrative privileges because in that case, the users
- can simply manipulate their system's routing table to bypass your
+ can simply manipulate their system's routing table to bypass your
firewall/router. Nevertheless, there are cases where you simply want to
consider the LAN segment itself as a zone and allow your firewall/router
to route between the two subnetworks.
diff --git a/Shorewall-docs2/images/Thumbs.db b/Shorewall-docs2/images/Thumbs.db
index 4754d426f..8bef04e8c 100644
Binary files a/Shorewall-docs2/images/Thumbs.db and b/Shorewall-docs2/images/Thumbs.db differ
diff --git a/Shorewall-docs2/myfiles.xml b/Shorewall-docs2/myfiles.xml
index cc77a92a5..42b4012a5 100644
--- a/Shorewall-docs2/myfiles.xml
+++ b/Shorewall-docs2/myfiles.xml
@@ -15,7 +15,7 @@
- 2005-02-06
+ 2005-02-08
2001-2005
@@ -250,7 +250,7 @@ loc $INT_IF detect dhcp
dmz $DMZ_IF -
- texas -
vpn tun+ -
-Wifi $WIFI_IF - maclist
+Wifi $WIFI_IF - maclist,dhcp
#LAST LINE - ADD YOUR ENTRIES ABOVE THIS ONE - DO NOT REMOVE
@@ -496,6 +496,12 @@ DROP loc:!192.168.0.0/22 net
# SQUID
#
REDIRECT loc 3128 tcp 80
+##########################################################################################################################################################################
+#####
+# Secure zone to Internet
+#
+# SQUID
+#
REDIRECT sec 3128 tcp 80
##########################################################################################################################################################################
#####
@@ -999,7 +1005,7 @@ ACCEPT net fw tcp 4000:4100
dev tun
-remote ursa.shorewall.net
+remote gateway.shorewall.net
up /etc/openvpn/home.up
tls-client
diff --git a/Shorewall-docs2/shorewall_prerequisites.xml b/Shorewall-docs2/shorewall_prerequisites.xml
index 6c10e7c33..4a81e9f68 100644
--- a/Shorewall-docs2/shorewall_prerequisites.xml
+++ b/Shorewall-docs2/shorewall_prerequisites.xml
@@ -13,10 +13,10 @@
Eastep
- 2004-05-31
+ 2005-02-07
- 2001-2004
+ 2001-2005
Thomas M Eastep
@@ -27,7 +27,8 @@
1.2 or any later version published by the Free Software Foundation; with
no Invariant Sections, with no Front-Cover, and with no Back-Cover
Texts. A copy of the license is included in the section entitled
- GNU Free Documentation License
.
+ GNU Free Documentation
+ License
.
@@ -36,25 +37,15 @@
- A kernel that supports netfilter. I've tested with 2.4.2 -
- 2.6.6. With current releases of Shorewall, Traffic Shaping/Control
+ A kernel that supports netfilter. I've tested with 2.4.2 -
+ 2.6.10. With current releases of Shorewall, Traffic Shaping/Control
requires at least 2.4.18. Check here
- for kernel configuration information. If you are looking for a
- firewall for use with 2.2 kernels, see the Seattle Firewall site.
+ for kernel configuration information.
- iptables 1.2 or later but beware version 1.2.3 -- see the Errata.
-
-
- The buggy iptables version 1.2.3 is included in RedHat 7.2 and
- you should upgrade to iptables 1.2.4 prior to installing Shorewall.
- Version 1.2.4 is available from
- RedHat and in the Shorewall Errata.
-
+ iptables 1.2 or later (but I recommend at least version
+ 1.2.9)
@@ -66,17 +57,26 @@
A Bourne shell or derivative such as bash or ash. This shell
- must have correct support for variable expansion formats ${variable%pattern},
- ${variable%%pattern}, ${variable#pattern}
- and ${variable##pattern}.
+ must have correct support for variable expansion formats
+ ${variable%pattern},
+ ${variable%%pattern},
+ ${variable#pattern} and
+ ${variable##pattern}.
Your shell must produce a sensible result when a number n (128
- <= n <= 255) is left shifted by 24 bits. You can check this at
- a shell prompt by:echo $((128 <<
- 24))The result must be either
- 2147483648 or -2147483648.
+ <= n <= 255) is left shifted by 24 bits. You can check this at a
+ shell prompt by:
+
+ echo $((128 << 24))
+
+
+
+ The result must be either 2147483648 or
+ -2147483648.
+
+