mirror of
https://gitlab.com/shorewall/code.git
synced 2025-06-12 04:37:01 +02:00
Remove some references to old release features
git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@7344 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
parent
18ea206500
commit
3310039f37
@ -97,7 +97,7 @@ ACCEPT - - tcp 135,139,445
|
|||||||
<filename class="directory">/etc/shorewall</filename> (or somewhere
|
<filename class="directory">/etc/shorewall</filename> (or somewhere
|
||||||
else on your CONFIG_PATH) and modify the copy.</para>
|
else on your CONFIG_PATH) and modify the copy.</para>
|
||||||
|
|
||||||
<para>Standard Actions have been largely replaced by <ulink
|
<para>Standard Actions were largely replaced by <ulink
|
||||||
url="Macros.html">macros</ulink> in Shorewall 3.0 and later major
|
url="Macros.html">macros</ulink> in Shorewall 3.0 and later major
|
||||||
versions.</para>
|
versions.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
@ -144,41 +144,21 @@ ACCEPT - - tcp 135,139,445
|
|||||||
AUTH protocol of client authentication<footnote>
|
AUTH protocol of client authentication<footnote>
|
||||||
<para>AUTH is actually pretty silly on today's internet but it's
|
<para>AUTH is actually pretty silly on today's internet but it's
|
||||||
amazing how many servers still employ it.</para>
|
amazing how many servers still employ it.</para>
|
||||||
</footnote>.</para>
|
</footnote></para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</orderedlist>
|
</orderedlist>
|
||||||
|
|
||||||
<para>If you are running Shorewall 3.2 or earlier, then:</para>
|
<para>Shorewall supports default actions for the ACCEPT, REJECT, DROP and
|
||||||
|
QUEUE policies. These default actions are specified in the
|
||||||
|
/etc/shorewall/shorewall.conf file using the ACCEPT_DEFAULT,
|
||||||
|
REJECT_DEFAULT, DROP_DEFAULT and QUEUE_DEFAULT options respectively.
|
||||||
|
Policies whose default is set to a value of "none" have no default
|
||||||
|
action.</para>
|
||||||
|
|
||||||
<blockquote>
|
<para>In addition, the default specified in /etc/shorewall/shorewall.conf
|
||||||
<para>Shorewall provides default actions for the REJECT and DROP
|
may be overridden by specifying a different default in the POLICY column
|
||||||
policies. The default action for REJECT is named
|
of <ulink
|
||||||
<firstterm>Reject</firstterm> and the default action for DROP is named
|
url="manpages/shorewall-policy.html">/etc/shorewall/policy</ulink>.</para>
|
||||||
<firstterm>Drop</firstterm>. These associations are made through two
|
|
||||||
entries in /usr/share/shorewall/actions.std:</para>
|
|
||||||
|
|
||||||
<programlisting>Drop:DROP #Default Action for DROP policy
|
|
||||||
Reject:REJECT #Default Action for REJECT policy</programlisting>
|
|
||||||
|
|
||||||
<para>These may be overridden by entries in your /etc/shorewall/actions
|
|
||||||
file.</para>
|
|
||||||
</blockquote>
|
|
||||||
|
|
||||||
<para>If you are running Shorewall 3.4 or later, then:</para>
|
|
||||||
|
|
||||||
<blockquote>
|
|
||||||
<para>Shorewall supports default actions for the ACCEPT, REJECT, DROP
|
|
||||||
and QUEUE policies. These default actions are specified in the
|
|
||||||
/etc/shorewall/shorewall.conf file using the ACCEPT_DEFAULT,
|
|
||||||
REJECT_DEFAULT, DROP_DEFAULT and QUEUE_DEFAULT options respectively.
|
|
||||||
Policies whose default is set to a value of "none" have no default
|
|
||||||
action.</para>
|
|
||||||
|
|
||||||
<para>In addition, the default specified in
|
|
||||||
/etc/shorewall/shorewall.conf may be overridden by specifying a
|
|
||||||
different default in the POLICY column of <ulink
|
|
||||||
url="manpages/shorewall-policy.html">/etc/shorewall/policy</ulink>.</para>
|
|
||||||
</blockquote>
|
|
||||||
|
|
||||||
<warning>
|
<warning>
|
||||||
<para>Entries in the DROP and REJECT default actions <emphasis
|
<para>Entries in the DROP and REJECT default actions <emphasis
|
||||||
@ -191,15 +171,6 @@ Reject:REJECT #Default Action for REJECT policy</programlisting>
|
|||||||
<section id="Limit">
|
<section id="Limit">
|
||||||
<title>Limiting Per-IP Connection Rate</title>
|
<title>Limiting Per-IP Connection Rate</title>
|
||||||
|
|
||||||
<important>
|
|
||||||
<para>Debian users. This feature is broken in the Debian version 3.0.7
|
|
||||||
of Shorewall (and possibly in other versions). The file
|
|
||||||
<filename>/usr/share/shorewall/Limit</filename> was inadvertently
|
|
||||||
dropped from the .deb. That file may be obtained from <ulink
|
|
||||||
url="http://shorewall.svn.sourceforge.net/viewvc/*checkout*/shorewall/tags/3.0.7/Shorewall/Limit?revision=3888">Shorewall
|
|
||||||
SVN</ulink> and installed manually.</para>
|
|
||||||
</important>
|
|
||||||
|
|
||||||
<para>Beginning with Shorewall 3.0.4, Shorewall has a 'Limit' <ulink
|
<para>Beginning with Shorewall 3.0.4, Shorewall has a 'Limit' <ulink
|
||||||
url="Actions.html">action</ulink>. Limit is invoked with a comma-separated
|
url="Actions.html">action</ulink>. Limit is invoked with a comma-separated
|
||||||
list in place of a logging tag. The list has three elements:</para>
|
list in place of a logging tag. The list has three elements:</para>
|
||||||
@ -654,11 +625,10 @@ bar:debug</programlisting>
|
|||||||
</listitem>
|
</listitem>
|
||||||
</orderedlist>
|
</orderedlist>
|
||||||
|
|
||||||
<para>The change in Shorewall 2.1.2 has an effect on extension scripts
|
<para>If you define an action 'acton' and you have an
|
||||||
used with user-defined actions. If you define an action 'acton' and you
|
<filename>/etc/shorewall/acton</filename> script then when that script is
|
||||||
have an <filename>/etc/shorewall/acton</filename> script then when that
|
invoked, the following three variables will be set for use by the
|
||||||
script is invoked, the following three variables will be set for use by
|
script:</para>
|
||||||
the script:</para>
|
|
||||||
|
|
||||||
<itemizedlist>
|
<itemizedlist>
|
||||||
<listitem>
|
<listitem>
|
||||||
@ -704,17 +674,18 @@ acton:info:test $FW net</programlisting>
|
|||||||
|
|
||||||
<itemizedlist>
|
<itemizedlist>
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>$chainref is a reference to the chain-table entry for the chain
|
<para><emphasis role="bold">$chainref</emphasis> is a reference to the
|
||||||
where your rules are to be placed.</para>
|
chain-table entry for the chain where your rules are to be
|
||||||
|
placed.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>$level is the log level. If false, no logging was
|
<para><emphasis role="bold">$level</emphasis> is the log level. If
|
||||||
specified.</para>
|
false, no logging was specified.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>$tag is the log tag.</para>
|
<para><emphasis role="bold">$tag</emphasis> is the log tag.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</itemizedlist>
|
</itemizedlist>
|
||||||
|
|
||||||
|
@ -34,6 +34,12 @@
|
|||||||
</legalnotice>
|
</legalnotice>
|
||||||
</articleinfo>
|
</articleinfo>
|
||||||
|
|
||||||
|
<caution>
|
||||||
|
<para>This article applies to Shorewall 4.0 and later. If you are running
|
||||||
|
a version of Shorewall earlier than Shorewall 4.0.0 then please see the
|
||||||
|
documentation for that release.</para>
|
||||||
|
</caution>
|
||||||
|
|
||||||
<section id="Scripts">
|
<section id="Scripts">
|
||||||
<title>Extension Scripts</title>
|
<title>Extension Scripts</title>
|
||||||
|
|
||||||
@ -116,11 +122,10 @@
|
|||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>maclog -- (Added in Shorewall version 3.2.5) invoked while mac
|
<para>maclog -- invoked while mac filtering rules are being created.
|
||||||
filtering rules are being created. It is invoked once for each
|
It is invoked once for each interface having 'maclist' specified and
|
||||||
interface having 'maclist' specified and it is invoked just before the
|
it is invoked just before the logging rule is added to the current
|
||||||
logging rule is added to the current chain (the name of that chain
|
chain (the name of that chain will be in $CHAIN).</para>
|
||||||
will be in $CHAIN).</para>
|
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
@ -157,7 +162,7 @@ esac</programlisting><caution>
|
|||||||
output on an interface is not allowed by <ulink
|
output on an interface is not allowed by <ulink
|
||||||
url="manpages/shorewall.conf.html">routestopped</ulink>(8) then
|
url="manpages/shorewall.conf.html">routestopped</ulink>(8) then
|
||||||
the isuasable script must blow it's own holes in the firewall
|
the isuasable script must blow it's own holes in the firewall
|
||||||
before probing. </para>
|
before probing.</para>
|
||||||
</caution></para>
|
</caution></para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</itemizedlist>
|
</itemizedlist>
|
||||||
@ -240,97 +245,8 @@ esac</programlisting><caution>
|
|||||||
|
|
||||||
<para></para>
|
<para></para>
|
||||||
|
|
||||||
<section id="v3.0">
|
|
||||||
<title>Shorewall versions 3.0.x and earlier</title>
|
|
||||||
|
|
||||||
<para>If you run commands other than <command>iptables</command> that
|
|
||||||
must be re-run in order to restore the firewall to its current state
|
|
||||||
then you must save the commands to the <firstterm>restore
|
|
||||||
file</firstterm>. The restore file is a temporary file in <filename
|
|
||||||
class="directory">/var/lib/shorewall</filename> that will be renamed
|
|
||||||
<filename>/var/lib/shorewall/restore-base</filename> at the successful
|
|
||||||
completion of the Shorewall command. The <command>shorewall
|
|
||||||
save</command> command combines
|
|
||||||
<filename>/var/lib/shorewall/restore-base</filename> with the output of
|
|
||||||
<command>iptables-save</command> to produce the
|
|
||||||
<filename>/var/lib/shorewall/restore</filename> script.</para>
|
|
||||||
|
|
||||||
<para>Here are three functions that are useful when running commands
|
|
||||||
other than <command>iptables</command>:</para>
|
|
||||||
|
|
||||||
<orderedlist>
|
|
||||||
<listitem>
|
|
||||||
<para><emphasis role="bold">save_command() </emphasis>-- saves the
|
|
||||||
passed command to the restore file.</para>
|
|
||||||
|
|
||||||
<para>Example: <programlisting>save_command echo Operation Complete</programlisting></para>
|
|
||||||
|
|
||||||
<para>That command would simply write "echo Operation Complete" to
|
|
||||||
the restore file.</para>
|
|
||||||
</listitem>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para><emphasis role="bold">run_and_save_command()</emphasis> --
|
|
||||||
saves the passed command to the restore file then executes it. The
|
|
||||||
return value is the exit status of the command. Example:
|
|
||||||
<programlisting>run_and_save_command "echo 1 > /proc/sys/net/ipv4/icmp_echo_ignore_all"</programlisting></para>
|
|
||||||
|
|
||||||
<para>Note that as in this example, when the command involves file
|
|
||||||
redirection then the entire command must be enclosed in quotes. This
|
|
||||||
applies to all of the functions described here.</para>
|
|
||||||
</listitem>
|
|
||||||
|
|
||||||
<listitem>
|
|
||||||
<para><emphasis role="bold">ensure_and_save_command()</emphasis> --
|
|
||||||
runs the passed command. If the command fails, the firewall is
|
|
||||||
restored to its prior saved state and the operation is terminated.
|
|
||||||
If the command succeeds, the command is written to the restore
|
|
||||||
file</para>
|
|
||||||
</listitem>
|
|
||||||
</orderedlist>
|
|
||||||
</section>
|
|
||||||
|
|
||||||
<section id="v3.2">
|
|
||||||
<title>Shorewall version 3.2.0 - 3.2.8</title>
|
|
||||||
|
|
||||||
<para>When compiling your firewall configuration, Shorewall copies most
|
|
||||||
extension scripts directly into the "compiled" program where they are
|
|
||||||
executed in-line during processing of the start, restart and restore
|
|
||||||
commands. When copying a script, Shorewall indents the script to match
|
|
||||||
the surrounding code; if you have 'awk' installed on the system where
|
|
||||||
the configuration is being compiled, Shorewall can correctly handle line
|
|
||||||
continuation in your script ("\" as the last character on a line). If
|
|
||||||
you do not have awk, you may not use line continuation in your scripts.
|
|
||||||
Also beware that quoted strings continued from one line to another will
|
|
||||||
have extra whitespace inserted as a result of indentation.</para>
|
|
||||||
|
|
||||||
<note>
|
|
||||||
<para>The <filename>/etc/shorewall/params</filename> script is
|
|
||||||
processed during compilation <emphasis role="bold">and</emphasis>
|
|
||||||
copied into the compiled script as just described. So shell variables
|
|
||||||
set during compilation may be used in Shorewall configuration files
|
|
||||||
while those set at run-time are available to your other extension
|
|
||||||
scripts. Note that if you assign dynamic values to variables, there is
|
|
||||||
no guarantee that the value calculated at compile time will be the
|
|
||||||
same as what is calculated at run time. This is particularly true if
|
|
||||||
you use the <command>shorewall compile</command> command to compile a
|
|
||||||
program then run that program at a later time.</para>
|
|
||||||
</note>
|
|
||||||
|
|
||||||
<note>
|
|
||||||
<para>Extension scripts associated with a particular chain or action
|
|
||||||
are not copied into the compiled script; they are rather processed
|
|
||||||
directly by the compiler using the Bourne shell "." command. For
|
|
||||||
example, if A is an action then if <filename
|
|
||||||
class="directory">/etc/shorewall/A</filename> exists then it will be
|
|
||||||
processed by the compiler rather than copied into the compiled
|
|
||||||
script.</para>
|
|
||||||
</note>
|
|
||||||
</section>
|
|
||||||
|
|
||||||
<section id="v3.2.9">
|
<section id="v3.2.9">
|
||||||
<title>Shorewall version 3.2.9 (3.4.0 RC2) and later
|
<title>Shorewall-shell</title>
|
||||||
(Shorewall-shell)</title>
|
|
||||||
|
|
||||||
<para>When compiling your firewall configuration, Shorewall copies most
|
<para>When compiling your firewall configuration, Shorewall copies most
|
||||||
extension scripts directly into the "compiled" program where they are
|
extension scripts directly into the "compiled" program where they are
|
||||||
@ -381,7 +297,7 @@ esac</programlisting><caution>
|
|||||||
</section>
|
</section>
|
||||||
|
|
||||||
<section id="Perl">
|
<section id="Perl">
|
||||||
<title>Shorewall-perl (Version 4.0.0 and later)</title>
|
<title>Shorewall-perl</title>
|
||||||
|
|
||||||
<para>Because the compiler is written in Perl, some of your extension
|
<para>Because the compiler is written in Perl, some of your extension
|
||||||
scripts from earlier versions will no longer work because Shorewall-perl
|
scripts from earlier versions will no longer work because Shorewall-perl
|
||||||
|
Loading…
x
Reference in New Issue
Block a user