mirror of
https://gitlab.com/shorewall/code.git
synced 2025-06-15 22:26:58 +02:00
Updates for 1.3.14 RC1
git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@431 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
parent
5b9a57d49e
commit
50b692b6be
@ -2,13 +2,17 @@
|
|||||||
<html>
|
<html>
|
||||||
<head>
|
<head>
|
||||||
|
|
||||||
|
|
||||||
<meta http-equiv="Content-Language" content="en-us">
|
<meta http-equiv="Content-Language" content="en-us">
|
||||||
|
|
||||||
|
|
||||||
<meta http-equiv="Content-Type"
|
<meta http-equiv="Content-Type"
|
||||||
content="text/html; charset=windows-1252">
|
content="text/html; charset=windows-1252">
|
||||||
|
|
||||||
|
|
||||||
<meta name="GENERATOR" content="Microsoft FrontPage 5.0">
|
<meta name="GENERATOR" content="Microsoft FrontPage 5.0">
|
||||||
|
|
||||||
|
|
||||||
<meta name="ProgId" content="FrontPage.Editor.Document">
|
<meta name="ProgId" content="FrontPage.Editor.Document">
|
||||||
<title>Shorewall Mailing Lists</title>
|
<title>Shorewall Mailing Lists</title>
|
||||||
|
|
||||||
@ -50,8 +54,8 @@
|
|||||||
</a><br>
|
</a><br>
|
||||||
|
|
||||||
<div align="left"><a href="http://www.spamassassin.org"><img
|
<div align="left"><a href="http://www.spamassassin.org"><img
|
||||||
src="file:///J:/Shorewall-docs/images/ninjalogo.png" alt="" width="110"
|
src="images/ninjalogo.png" alt="" width="110" height="42" align="right"
|
||||||
height="42" align="right" border="0">
|
border="0">
|
||||||
</a> </div>
|
</a> </div>
|
||||||
<br>
|
<br>
|
||||||
|
|
||||||
@ -62,6 +66,7 @@
|
|||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
|
|
||||||
|
|
||||||
</tbody>
|
</tbody>
|
||||||
</table>
|
</table>
|
||||||
|
|
||||||
@ -93,15 +98,15 @@
|
|||||||
<li>to verify that the sender's domain has an A or MX record
|
<li>to verify that the sender's domain has an A or MX record
|
||||||
in DNS.</li>
|
in DNS.</li>
|
||||||
<li>to ensure that the host name in the HELO/EHLO command
|
<li>to ensure that the host name in the HELO/EHLO command
|
||||||
is a valid fully-qualified DNS name that resolves.</li>
|
is a valid fully-qualified DNS name that resolves.</li>
|
||||||
|
|
||||||
</ol>
|
</ol>
|
||||||
|
|
||||||
<h2>Please post in plain text</h2>
|
<h2>Please post in plain text</h2>
|
||||||
A growing number of MTAs serving list subscribers are rejecting all
|
A growing number of MTAs serving list subscribers are rejecting
|
||||||
HTML traffic. At least one MTA has gone so far as to blacklist shorewall.net
|
all HTML traffic. At least one MTA has gone so far as to blacklist shorewall.net
|
||||||
"for continuous abuse" because it has been my policy to allow HTML in list
|
"for continuous abuse" because it has been my policy to allow HTML in
|
||||||
posts!!<br>
|
list posts!!<br>
|
||||||
<br>
|
<br>
|
||||||
I think that blocking all HTML is a Draconian way to control spam
|
I think that blocking all HTML is a Draconian way to control spam
|
||||||
and that the ultimate losers here are not the spammers but the list subscribers
|
and that the ultimate losers here are not the spammers but the list subscribers
|
||||||
@ -110,17 +115,17 @@ is a valid fully-qualified DNS name that resolves.</li>
|
|||||||
deleted)</i> life instead of trying to rid the planet of HTML based e-mail".
|
deleted)</i> life instead of trying to rid the planet of HTML based e-mail".
|
||||||
Nevertheless, to allow subscribers to receive list posts as must as possible,
|
Nevertheless, to allow subscribers to receive list posts as must as possible,
|
||||||
I have now configured the list server at shorewall.net to strip all HTML
|
I have now configured the list server at shorewall.net to strip all HTML
|
||||||
from outgoing posts. This means that HTML-only posts will be bounced by
|
from outgoing posts. This means that HTML-only posts will be bounced by the
|
||||||
the list server.<br>
|
list server.<br>
|
||||||
|
|
||||||
<p align="left"> <b>Note: </b>The list server limits posts to 120kb.<br>
|
<p align="left"> <b>Note: </b>The list server limits posts to 120kb.<br>
|
||||||
</p>
|
</p>
|
||||||
|
|
||||||
<h2>Other Mail Delivery Problems</h2>
|
<h2>Other Mail Delivery Problems</h2>
|
||||||
If you find that you are missing an occasional list post, your e-mail
|
If you find that you are missing an occasional list post, your e-mail
|
||||||
admin may be blocking mail whose <i>Received:</i> headers contain the names
|
admin may be blocking mail whose <i>Received:</i> headers contain the
|
||||||
of certain ISPs. Again, I believe that such policies hurt more than they
|
names of certain ISPs. Again, I believe that such policies hurt more than
|
||||||
help but I'm not prepared to go so far as to start stripping <i>Received:</i>
|
they help but I'm not prepared to go so far as to start stripping <i>Received:</i>
|
||||||
headers to circumvent those policies.<br>
|
headers to circumvent those policies.<br>
|
||||||
|
|
||||||
<h2 align="left">Mailing Lists Archive Search</h2>
|
<h2 align="left">Mailing Lists Archive Search</h2>
|
||||||
@ -158,26 +163,26 @@ help but I'm not prepared to go so far as to start stripping <i>Received:</i>
|
|||||||
value=""> <input type="submit" value="Search"> </p>
|
value=""> <input type="submit" value="Search"> </p>
|
||||||
</form>
|
</form>
|
||||||
|
|
||||||
<h2 align="left"><font color="#ff0000">Please do not try to download the entire
|
<h2 align="left"><font color="#ff0000">Please do not try to download the
|
||||||
Archive -- it is 75MB (and growing daily) and my slow DSL line simply won't
|
entire Archive -- it is 75MB (and growing daily) and my slow DSL line simply
|
||||||
stand the traffic. If I catch you, you will be blacklisted.<br>
|
won't stand the traffic. If I catch you, you will be blacklisted.<br>
|
||||||
</font></h2>
|
</font></h2>
|
||||||
|
|
||||||
<h2 align="left">Shorewall CA Certificate</h2>
|
<h2 align="left">Shorewall CA Certificate</h2>
|
||||||
If you want to trust X.509 certificates issued by Shoreline
|
If you want to trust X.509 certificates issued by Shoreline
|
||||||
Firewall (such as the one used on my web site), you may <a
|
Firewall (such as the one used on my web site), you may <a
|
||||||
href="Shorewall_CA_html.html">download and install my CA certificate</a>
|
href="Shorewall_CA_html.html">download and install my CA certificate</a>
|
||||||
in your browser. If you don't wish to trust my certificates then
|
in your browser. If you don't wish to trust my certificates then you
|
||||||
you can either use unencrypted access when subscribing to Shorewall
|
can either use unencrypted access when subscribing to Shorewall mailing
|
||||||
mailing lists or you can use secure access (SSL) and accept the server's
|
lists or you can use secure access (SSL) and accept the server's certificate
|
||||||
certificate when prompted by your browser.<br>
|
when prompted by your browser.<br>
|
||||||
|
|
||||||
<h2 align="left">Shorewall Users Mailing List</h2>
|
<h2 align="left">Shorewall Users Mailing List</h2>
|
||||||
|
|
||||||
<p align="left">The Shorewall Users Mailing list provides a way for users
|
<p align="left">The Shorewall Users Mailing list provides a way for users
|
||||||
to get answers to questions and to report problems. Information
|
to get answers to questions and to report problems. Information of
|
||||||
of general interest to the Shorewall user community is also posted
|
general interest to the Shorewall user community is also posted to
|
||||||
to this list.</p>
|
this list.</p>
|
||||||
|
|
||||||
<p align="left"><b>Before posting a problem report to this list, please see
|
<p align="left"><b>Before posting a problem report to this list, please see
|
||||||
the <a href="http://www.shorewall.net/support.htm">problem reporting
|
the <a href="http://www.shorewall.net/support.htm">problem reporting
|
||||||
@ -201,9 +206,9 @@ guidelines</a>.</b></p>
|
|||||||
<p align="left">The list archives are at <a
|
<p align="left">The list archives are at <a
|
||||||
href="http://lists.shorewall.net/pipermail/shorewall-users/index.html">http://lists.shorewall.net/pipermail/shorewall-users</a>.</p>
|
href="http://lists.shorewall.net/pipermail/shorewall-users/index.html">http://lists.shorewall.net/pipermail/shorewall-users</a>.</p>
|
||||||
|
|
||||||
<p align="left">Note that prior to 1/1/2002, the mailing list was hosted
|
<p align="left">Note that prior to 1/1/2002, the mailing list was hosted at
|
||||||
at <a href="http://sourceforge.net">Sourceforge</a>. The archives from that
|
<a href="http://sourceforge.net">Sourceforge</a>. The archives from that list
|
||||||
list may be found at <a
|
may be found at <a
|
||||||
href="http://www.geocrawler.com/lists/3/Sourceforge/9327/0/">www.geocrawler.com/lists/3/Sourceforge/9327/0/</a>.</p>
|
href="http://www.geocrawler.com/lists/3/Sourceforge/9327/0/">www.geocrawler.com/lists/3/Sourceforge/9327/0/</a>.</p>
|
||||||
|
|
||||||
<h2 align="left">Shorewall Announce Mailing List</h2>
|
<h2 align="left">Shorewall Announce Mailing List</h2>
|
||||||
@ -290,17 +295,8 @@ list may be found at <a
|
|||||||
<p align="left"><font size="2">Last updated 2/3/2003 - <a
|
<p align="left"><font size="2">Last updated 2/3/2003 - <a
|
||||||
href="support.htm">Tom Eastep</a></font></p>
|
href="support.htm">Tom Eastep</a></font></p>
|
||||||
|
|
||||||
<p align="left"><a href="copyright.htm"> <font size="2">Copyright</font> ©
|
<p align="left"><a href="copyright.htm"> <font size="2">Copyright</font>
|
||||||
<font size="2">2001, 2002, 2003 Thomas M. Eastep.</font></a><br>
|
© <font size="2">2001, 2002, 2003 Thomas M. Eastep.</font></a><br>
|
||||||
</p>
|
</p>
|
||||||
<br>
|
|
||||||
<br>
|
|
||||||
<br>
|
|
||||||
<br>
|
|
||||||
<br>
|
|
||||||
<br>
|
|
||||||
<br>
|
|
||||||
<br>
|
|
||||||
<br>
|
|
||||||
</body>
|
</body>
|
||||||
</html>
|
</html>
|
||||||
|
@ -37,14 +37,15 @@
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
<h1 align="center"> <font size="4"><i> <a
|
<h1 align="center"> <font size="4"><i> <a
|
||||||
href="http://www.cityofshoreline.com"> <img vspace="4" hspace="4"
|
href="http://www.cityofshoreline.com"> <img vspace="4" hspace="4"
|
||||||
alt="Shorwall Logo" height="70" width="85" align="left"
|
alt="Shorwall Logo" height="70" width="85" align="left"
|
||||||
src="images/washington.jpg" border="0">
|
src="images/washington.jpg" border="0">
|
||||||
|
|
||||||
</a></i></font><font color="#ffffff">Shorewall
|
</a></i></font><font color="#ffffff">Shorewall
|
||||||
1.3 - <font size="4">"<i>iptables made
|
1.3 - <font size="4">"<i>iptables
|
||||||
easy"</i></font></font></h1>
|
made easy"</i></font></font></h1>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@ -129,18 +130,18 @@ Public License</a> as published by the Free Software Foundation.<br>
|
|||||||
|
|
||||||
<br>
|
<br>
|
||||||
|
|
||||||
This program is distributed in the hope
|
This program is distributed in the
|
||||||
that it will be useful, but WITHOUT ANY WARRANTY;
|
hope that it will be useful, but WITHOUT ANY
|
||||||
without even the implied warranty of MERCHANTABILITY
|
WARRANTY; without even the implied warranty of MERCHANTABILITY
|
||||||
or FITNESS FOR A PARTICULAR PURPOSE. See the
|
or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
GNU General Public License for more details.<br>
|
GNU General Public License for more details.<br>
|
||||||
|
|
||||||
<br>
|
<br>
|
||||||
|
|
||||||
You should have received a copy of the
|
You should have received a copy of
|
||||||
GNU General Public License along with
|
the GNU General Public License along with
|
||||||
this program; if not, write to the Free Software
|
this program; if not, write to the Free Software
|
||||||
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139,
|
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139,
|
||||||
USA</p>
|
USA</p>
|
||||||
|
|
||||||
|
|
||||||
@ -163,6 +164,7 @@ Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139,
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
<p> <a href="http://leaf.sourceforge.net" target="_top"><img
|
<p> <a href="http://leaf.sourceforge.net" target="_top"><img
|
||||||
border="0" src="images/leaflogo.gif" width="49" height="36">
|
border="0" src="images/leaflogo.gif" width="49" height="36">
|
||||||
|
|
||||||
@ -224,11 +226,12 @@ Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139,
|
|||||||
|
|
||||||
<p>Includes the Beta 2 content plus support for OpenVPN tunnels.</p>
|
<p>Includes the Beta 2 content plus support for OpenVPN tunnels.</p>
|
||||||
|
|
||||||
<p> The beta may be downloaded from:<br>
|
<p> The release candidate may be downloaded from:<br>
|
||||||
</p>
|
</p>
|
||||||
|
|
||||||
<blockquote><a href="http://www.shorewall.net/pub/shorewall/Beta">http://www.shorewall.net/pub/shorewall/Beta</a><br>
|
<blockquote><a href="http://www.shorewall.net/pub/shorewall/Beta">http://www.shorewall.net/pub/shorewall/Beta</a><br>
|
||||||
<a href="ftp://ftp.shorewall.net/pub/shorewall/Beta">ftp://ftp.shorewall.net/pub/shorewall/Beta</a><br>
|
<a href="ftp://ftp.shorewall.net/pub/shorewall/Beta"
|
||||||
|
target="_top">ftp://ftp.shorewall.net/pub/shorewall/Beta</a><br>
|
||||||
</blockquote>
|
</blockquote>
|
||||||
|
|
||||||
<p><b>1/28/2003 - Shorewall 1.3.14-Beta2 </b><b><img border="0"
|
<p><b>1/28/2003 - Shorewall 1.3.14-Beta2 </b><b><img border="0"
|
||||||
@ -258,30 +261,30 @@ Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139,
|
|||||||
When set to Yes, Shorewall ping handling is as it has always been (see http://www.shorewall.net/ping.html).<br>
|
When set to Yes, Shorewall ping handling is as it has always been (see http://www.shorewall.net/ping.html).<br>
|
||||||
<br>
|
<br>
|
||||||
When OLD_PING_HANDLING=No, icmp echo (ping) is handled via rules and
|
When OLD_PING_HANDLING=No, icmp echo (ping) is handled via rules and
|
||||||
policies just like any other connection request. The FORWARDPING=Yes option
|
policies just like any other connection request. The FORWARDPING=Yes option
|
||||||
in shorewall.conf and the 'noping' and 'filterping' options in /etc/shorewall/interfaces
|
in shorewall.conf and the 'noping' and 'filterping' options in /etc/shorewall/interfaces
|
||||||
will all generate an error.<br>
|
will all generate an error.<br>
|
||||||
<br>
|
<br>
|
||||||
</li>
|
</li>
|
||||||
<li>It is now possible to direct Shorewall to create a "label"
|
<li>It is now possible to direct Shorewall to create a "label"
|
||||||
such as "eth0:0" for IP addresses that it creates under ADD_IP_ALIASES=Yes
|
such as "eth0:0" for IP addresses that it creates under ADD_IP_ALIASES=Yes
|
||||||
and ADD_SNAT_ALIASES=Yes. This is done by specifying the label instead of
|
and ADD_SNAT_ALIASES=Yes. This is done by specifying the label instead of
|
||||||
just the interface name:<br>
|
just the interface name:<br>
|
||||||
<br>
|
<br>
|
||||||
a) In the INTERFACE column of /etc/shorewall/masq<br>
|
a) In the INTERFACE column of /etc/shorewall/masq<br>
|
||||||
b) In the INTERFACE column of /etc/shorewall/nat<br>
|
b) In the INTERFACE column of /etc/shorewall/nat<br>
|
||||||
</li>
|
</li>
|
||||||
<li>When an interface name is entered in the SUBNET column of
|
<li>When an interface name is entered in the SUBNET column of
|
||||||
the /etc/shorewall/masq file, Shorewall previously masqueraded traffic from
|
the /etc/shorewall/masq file, Shorewall previously masqueraded traffic
|
||||||
only the first subnet defined on that interface. It did not masquerade traffic
|
from only the first subnet defined on that interface. It did not masquerade
|
||||||
from:<br>
|
traffic from:<br>
|
||||||
<br>
|
<br>
|
||||||
a) The subnets associated with other addresses on the interface.<br>
|
a) The subnets associated with other addresses on the interface.<br>
|
||||||
b) Subnets accessed through local routers.<br>
|
b) Subnets accessed through local routers.<br>
|
||||||
<br>
|
<br>
|
||||||
Beginning with Shorewall 1.3.14, if you enter an interface name in the
|
Beginning with Shorewall 1.3.14, if you enter an interface name in
|
||||||
SUBNET column, shorewall will use the firewall's routing table to construct
|
the SUBNET column, shorewall will use the firewall's routing table to
|
||||||
the masquerading/SNAT rules.<br>
|
construct the masquerading/SNAT rules.<br>
|
||||||
<br>
|
<br>
|
||||||
Example 1 -- This is how it works in 1.3.14.<br>
|
Example 1 -- This is how it works in 1.3.14.<br>
|
||||||
<br>
|
<br>
|
||||||
@ -305,7 +308,7 @@ to occur on subnetworks that you don't wish to masquerade.<br>
|
|||||||
|
|
||||||
<pre> [root@gateway test]# ip route show dev eth2<br> 192.168.1.0/24 scope link<br> 192.168.10.0/24 proto kernel scope link src 192.168.10.254<br> [root@gateway test]#<br></pre>
|
<pre> [root@gateway test]# ip route show dev eth2<br> 192.168.1.0/24 scope link<br> 192.168.10.0/24 proto kernel scope link src 192.168.10.254<br> [root@gateway test]#<br></pre>
|
||||||
In this case, the second entry in /etc/shorewall/masq is no longer
|
In this case, the second entry in /etc/shorewall/masq is no longer
|
||||||
required.<br>
|
required.<br>
|
||||||
<br>
|
<br>
|
||||||
Example 3 -- What if your current configuration is like this?<br>
|
Example 3 -- What if your current configuration is like this?<br>
|
||||||
|
|
||||||
@ -353,13 +356,13 @@ big thanks to Alex for making this happen.<br>
|
|||||||
|
|
||||||
<ol>
|
<ol>
|
||||||
<li>A new 'DNAT-' action has been added for entries in the
|
<li>A new 'DNAT-' action has been added for entries in the
|
||||||
/etc/shorewall/rules file. DNAT- is intended for advanced users who wish
|
/etc/shorewall/rules file. DNAT- is intended for advanced users who wish
|
||||||
to minimize the number of rules that connection requests must traverse.<br>
|
to minimize the number of rules that connection requests must traverse.<br>
|
||||||
<br>
|
<br>
|
||||||
A Shorewall DNAT rule actually generates two iptables rules: a header
|
A Shorewall DNAT rule actually generates two iptables rules: a
|
||||||
rewriting rule in the 'nat' table and an ACCEPT rule in the 'filter' table.
|
header rewriting rule in the 'nat' table and an ACCEPT rule in the 'filter'
|
||||||
A DNAT- rule only generates the first of these rules. This is handy when
|
table. A DNAT- rule only generates the first of these rules. This is handy
|
||||||
you have several DNAT rules that would generate the same ACCEPT rule.<br>
|
when you have several DNAT rules that would generate the same ACCEPT rule.<br>
|
||||||
<br>
|
<br>
|
||||||
Here are three rules from my previous rules file:<br>
|
Here are three rules from my previous rules file:<br>
|
||||||
<br>
|
<br>
|
||||||
@ -372,7 +375,7 @@ to minimize the number of rules that connection requests must traverse.<br>
|
|||||||
ACCEPT net dmz:206.124.146.177 tcp smtp<br>
|
ACCEPT net dmz:206.124.146.177 tcp smtp<br>
|
||||||
<br>
|
<br>
|
||||||
By writing the rules this way, I end up with only one copy of
|
By writing the rules this way, I end up with only one copy of
|
||||||
the ACCEPT rule.<br>
|
the ACCEPT rule.<br>
|
||||||
<br>
|
<br>
|
||||||
DNAT- net dmz:206.124.146.177 tcp smtp - 206.124.146.178<br>
|
DNAT- net dmz:206.124.146.177 tcp smtp - 206.124.146.178<br>
|
||||||
DNAT- net dmz:206.124.146.177 tcp smtp - 206.124.146.179<br>
|
DNAT- net dmz:206.124.146.177 tcp smtp - 206.124.146.179<br>
|
||||||
@ -384,17 +387,18 @@ the ACCEPT rule.<br>
|
|||||||
<br>
|
<br>
|
||||||
</li>
|
</li>
|
||||||
<li>A new CLEAR_TC option has been added to shorewall.conf.
|
<li>A new CLEAR_TC option has been added to shorewall.conf.
|
||||||
If this option is set to 'No' then Shorewall won't clear the current traffic
|
If this option is set to 'No' then Shorewall won't clear the current
|
||||||
control rules during [re]start. This setting is intended for use by people
|
traffic control rules during [re]start. This setting is intended for
|
||||||
that prefer to configure traffic shaping when the network interfaces come
|
use by people that prefer to configure traffic shaping when the network
|
||||||
up rather than when the firewall is started. If that is what you want to
|
interfaces come up rather than when the firewall is started. If that
|
||||||
do, set TC_ENABLED=Yes and CLEAR_TC=No and do not supply an /etc/shorewall/tcstart
|
is what you want to do, set TC_ENABLED=Yes and CLEAR_TC=No and do not
|
||||||
file. That way, your traffic shaping rules can still use the 'fwmark' classifier
|
supply an /etc/shorewall/tcstart file. That way, your traffic shaping
|
||||||
based on packet marking defined in /etc/shorewall/tcrules.<br>
|
rules can still use the 'fwmark' classifier based on packet marking defined
|
||||||
|
in /etc/shorewall/tcrules.<br>
|
||||||
<br>
|
<br>
|
||||||
</li>
|
</li>
|
||||||
<li>A new SHARED_DIR variable has been added that allows distribution
|
<li>A new SHARED_DIR variable has been added that allows
|
||||||
packagers to easily move the shared directory (default /usr/lib/shorewall).
|
distribution packagers to easily move the shared directory (default /usr/lib/shorewall).
|
||||||
Users should never have a need to change the value of this shorewall.conf
|
Users should never have a need to change the value of this shorewall.conf
|
||||||
setting.<br>
|
setting.<br>
|
||||||
</li>
|
</li>
|
||||||
@ -417,10 +421,12 @@ the ACCEPT rule.<br>
|
|||||||
</b></p>
|
</b></p>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
<p>Juraj Ontkanin has produced a PDF containing the Shorewall 1.3.12
|
<p>Juraj Ontkanin has produced a PDF containing the Shorewall 1.3.12
|
||||||
documenation. the PDF may be downloaded from</p>
|
documenation. the PDF may be downloaded from</p>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
<p> <a
|
<p> <a
|
||||||
href="ftp://slovakia.shorewall.net/mirror/shorewall/pdf/"
|
href="ftp://slovakia.shorewall.net/mirror/shorewall/pdf/"
|
||||||
target="_self">ftp://slovakia.shorewall.net/mirror/shorewall/pdf/</a><br>
|
target="_self">ftp://slovakia.shorewall.net/mirror/shorewall/pdf/</a><br>
|
||||||
@ -429,6 +435,7 @@ the ACCEPT rule.<br>
|
|||||||
</p>
|
</p>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
<p><b>12/27/2002 - Shorewall 1.3.12 Released</b><b>
|
<p><b>12/27/2002 - Shorewall 1.3.12 Released</b><b>
|
||||||
</b></p>
|
</b></p>
|
||||||
|
|
||||||
@ -438,39 +445,39 @@ the ACCEPT rule.<br>
|
|||||||
|
|
||||||
|
|
||||||
<ol>
|
<ol>
|
||||||
<li>"shorewall refresh" now reloads the traffic shaping
|
<li>"shorewall refresh" now reloads the traffic
|
||||||
rules (tcrules and tcstart).</li>
|
shaping rules (tcrules and tcstart).</li>
|
||||||
<li>"shorewall debug [re]start" now turns off debugging
|
<li>"shorewall debug [re]start" now turns off debugging
|
||||||
after an error occurs. This places the point of the failure near
|
after an error occurs. This places the point of the failure near
|
||||||
the end of the trace rather than up in the middle of it.</li>
|
the end of the trace rather than up in the middle of it.</li>
|
||||||
<li>"shorewall [re]start" has been speeded up by more
|
<li>"shorewall [re]start" has been speeded up by
|
||||||
than 40% with my configuration. Your milage may vary.</li>
|
more than 40% with my configuration. Your milage may vary.</li>
|
||||||
<li>A "shorewall show classifiers" command has been
|
<li>A "shorewall show classifiers" command has been
|
||||||
added which shows the current packet classification filters. The
|
added which shows the current packet classification filters. The
|
||||||
output from this command is also added as a separate page in "shorewall
|
output from this command is also added as a separate page in "shorewall
|
||||||
monitor"</li>
|
monitor"</li>
|
||||||
<li>ULOG (must be all caps) is now accepted as a valid
|
<li>ULOG (must be all caps) is now accepted as a
|
||||||
syslog level and causes the subject packets to be logged using the
|
valid syslog level and causes the subject packets to be logged using
|
||||||
ULOG target rather than the LOG target. This allows you to run ulogd
|
the ULOG target rather than the LOG target. This allows you to run
|
||||||
(available from <a
|
ulogd (available from <a
|
||||||
href="http://www.gnumonks.org/projects/ulogd">http://www.gnumonks.org/projects/ulogd</a>)
|
href="http://www.gnumonks.org/projects/ulogd">http://www.gnumonks.org/projects/ulogd</a>)
|
||||||
and log all Shorewall messages <a
|
and log all Shorewall messages <a
|
||||||
href="shorewall_logging.html">to a separate log file</a>.</li>
|
href="shorewall_logging.html">to a separate log file</a>.</li>
|
||||||
<li>If you are running a kernel that has a FORWARD
|
<li>If you are running a kernel that has a FORWARD
|
||||||
chain in the mangle table ("shorewall show mangle" will show you
|
chain in the mangle table ("shorewall show mangle" will show you
|
||||||
the chains in the mangle table), you can set MARK_IN_FORWARD_CHAIN=Yes
|
the chains in the mangle table), you can set MARK_IN_FORWARD_CHAIN=Yes
|
||||||
in <a href="Documentation.htm#Conf">shorewall.conf</a>. This allows for marking
|
in <a href="Documentation.htm#Conf">shorewall.conf</a>. This allows for
|
||||||
input packets based on their destination even when you are using
|
marking input packets based on their destination even when you are
|
||||||
Masquerading or SNAT.</li>
|
using Masquerading or SNAT.</li>
|
||||||
<li>I have cluttered up the /etc/shorewall directory
|
<li>I have cluttered up the /etc/shorewall directory
|
||||||
with empty 'init', 'start', 'stop' and 'stopped' files. If you already
|
with empty 'init', 'start', 'stop' and 'stopped' files. If you already
|
||||||
have a file with one of these names, don't worry -- the upgrade process
|
have a file with one of these names, don't worry -- the upgrade process
|
||||||
won't overwrite your file.</li>
|
won't overwrite your file.</li>
|
||||||
<li>I have added a new RFC1918_LOG_LEVEL variable
|
<li>I have added a new RFC1918_LOG_LEVEL variable
|
||||||
to <a href="Documentation.htm#Conf">shorewall.conf</a>. This variable
|
to <a href="Documentation.htm#Conf">shorewall.conf</a>. This
|
||||||
specifies the syslog level at which packets are logged as a result
|
variable specifies the syslog level at which packets are logged as
|
||||||
of entries in the /etc/shorewall/rfc1918 file. Previously, these packets
|
a result of entries in the /etc/shorewall/rfc1918 file. Previously,
|
||||||
were always logged at the 'info' level.<br>
|
these packets were always logged at the 'info' level.<br>
|
||||||
</li>
|
</li>
|
||||||
|
|
||||||
|
|
||||||
@ -479,9 +486,9 @@ of entries in the /etc/shorewall/rfc1918 file. Previously, these packets
|
|||||||
|
|
||||||
<p><b>12/20/2002 - Shorewall 1.3.12 Beta 3</b><br>
|
<p><b>12/20/2002 - Shorewall 1.3.12 Beta 3</b><br>
|
||||||
</p>
|
</p>
|
||||||
This version corrects a problem with Blacklist logging. In
|
This version corrects a problem with Blacklist logging.
|
||||||
Beta 2, if BLACKLIST_LOG_LEVEL was set to anything but ULOG, the firewall
|
In Beta 2, if BLACKLIST_LOG_LEVEL was set to anything but ULOG, the
|
||||||
would fail to start and "shorewall refresh" would also fail.<br>
|
firewall would fail to start and "shorewall refresh" would also fail.<br>
|
||||||
|
|
||||||
|
|
||||||
<p> You may download the Beta from:<br>
|
<p> You may download the Beta from:<br>
|
||||||
@ -498,7 +505,7 @@ of entries in the /etc/shorewall/rfc1918 file. Previously, these packets
|
|||||||
<p><b>12/20/2002 - Shorewall 1.3.12 Beta 2</b><b>
|
<p><b>12/20/2002 - Shorewall 1.3.12 Beta 2</b><b>
|
||||||
</b></p>
|
</b></p>
|
||||||
The first public Beta version of Shorewall 1.3.12 is
|
The first public Beta version of Shorewall 1.3.12 is
|
||||||
now available (Beta 1 was made available to a limited audience).
|
now available (Beta 1 was made available to a limited audience).
|
||||||
<br>
|
<br>
|
||||||
<br>
|
<br>
|
||||||
Features include:<br>
|
Features include:<br>
|
||||||
@ -510,30 +517,30 @@ now available (Beta 1 was made available to a limited audience).
|
|||||||
<li>"shorewall refresh" now reloads the traffic
|
<li>"shorewall refresh" now reloads the traffic
|
||||||
shaping rules (tcrules and tcstart).</li>
|
shaping rules (tcrules and tcstart).</li>
|
||||||
<li>"shorewall debug [re]start" now turns off
|
<li>"shorewall debug [re]start" now turns off
|
||||||
debugging after an error occurs. This places the point of the failure
|
debugging after an error occurs. This places the point of the failure
|
||||||
near the end of the trace rather than up in the middle of it.</li>
|
near the end of the trace rather than up in the middle of it.</li>
|
||||||
<li>"shorewall [re]start" has been speeded up
|
<li>"shorewall [re]start" has been speeded
|
||||||
by more than 40% with my configuration. Your milage may vary.</li>
|
up by more than 40% with my configuration. Your milage may vary.</li>
|
||||||
<li>A "shorewall show classifiers" command has
|
<li>A "shorewall show classifiers" command
|
||||||
been added which shows the current packet classification filters.
|
has been added which shows the current packet classification filters.
|
||||||
The output from this command is also added as a separate page in
|
The output from this command is also added as a separate page in
|
||||||
"shorewall monitor"</li>
|
"shorewall monitor"</li>
|
||||||
<li>ULOG (must be all caps) is now accepted as
|
<li>ULOG (must be all caps) is now accepted
|
||||||
a valid syslog level and causes the subject packets to be logged
|
as a valid syslog level and causes the subject packets to be logged
|
||||||
using the ULOG target rather than the LOG target. This allows you to
|
using the ULOG target rather than the LOG target. This allows you to
|
||||||
run ulogd (available from <a
|
run ulogd (available from <a
|
||||||
href="http://www.gnumonks.org/projects/ulogd">http://www.gnumonks.org/projects/ulogd</a>)
|
href="http://www.gnumonks.org/projects/ulogd">http://www.gnumonks.org/projects/ulogd</a>)
|
||||||
and log all Shorewall messages <a
|
and log all Shorewall messages <a
|
||||||
href="shorewall_logging.html">to a separate log file</a>.</li>
|
href="shorewall_logging.html">to a separate log file</a>.</li>
|
||||||
<li>If you are running a kernel that has a FORWARD
|
<li>If you are running a kernel that has a
|
||||||
chain in the mangle table ("shorewall show mangle" will show you
|
FORWARD chain in the mangle table ("shorewall show mangle" will
|
||||||
the chains in the mangle table), you can set MARK_IN_FORWARD_CHAIN=Yes
|
show you the chains in the mangle table), you can set MARK_IN_FORWARD_CHAIN=Yes
|
||||||
in shorewall.conf. This allows for marking input packets based on
|
in shorewall.conf. This allows for marking input packets based on
|
||||||
their destination even when you are using Masquerading or SNAT.</li>
|
their destination even when you are using Masquerading or SNAT.</li>
|
||||||
<li>I have cluttered up the /etc/shorewall directory
|
<li>I have cluttered up the /etc/shorewall
|
||||||
with empty 'init', 'start', 'stop' and 'stopped' files. If you already
|
directory with empty 'init', 'start', 'stop' and 'stopped' files.
|
||||||
have a file with one of these names, don't worry -- the upgrade process
|
If you already have a file with one of these names, don't worry
|
||||||
won't overwrite your file.</li>
|
-- the upgrade process won't overwrite your file.</li>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@ -569,7 +576,7 @@ their destination even when you are using Masquerading or SNAT.</li>
|
|||||||
|
|
||||||
<p>Two months and 3 days after I pre-ordered Mandrake 9.0, it was finally
|
<p>Two months and 3 days after I pre-ordered Mandrake 9.0, it was finally
|
||||||
delivered. I have installed 9.0 on one of my systems and I am
|
delivered. I have installed 9.0 on one of my systems and I am
|
||||||
now in a position to support Shorewall users who run Mandrake 9.0.</p>
|
now in a position to support Shorewall users who run Mandrake 9.0.</p>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@ -590,12 +597,14 @@ now in a position to support Shorewall users who run Mandrake 9.0.</p>
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
<p>This is a bug-fix roll up which includes Roger Aich's fix for DNAT
|
<p>This is a bug-fix roll up which includes Roger Aich's fix for DNAT
|
||||||
with excluded subnets (e.g., "DNAT foo!bar ..."). Current 1.3.11
|
with excluded subnets (e.g., "DNAT foo!bar ..."). Current 1.3.11
|
||||||
users who don't need rules of this type need not upgrade to 1.3.11.</p>
|
users who don't need rules of this type need not upgrade to 1.3.11.</p>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
<p><b>11/25/2002 - Shorewall 1.3.11 Documentation in PDF Format</b><b>
|
<p><b>11/25/2002 - Shorewall 1.3.11 Documentation in PDF Format</b><b>
|
||||||
</b></p>
|
</b></p>
|
||||||
|
|
||||||
@ -629,25 +638,26 @@ now in a position to support Shorewall users who run Mandrake 9.0.</p>
|
|||||||
|
|
||||||
|
|
||||||
<ul>
|
<ul>
|
||||||
<li>A 'tcpflags' option has been added
|
<li>A 'tcpflags' option has been
|
||||||
to entries in <a href="Documentation.htm#Interfaces">/etc/shorewall/interfaces</a>.
|
added to entries in <a
|
||||||
|
href="Documentation.htm#Interfaces">/etc/shorewall/interfaces</a>.
|
||||||
This option causes Shorewall to make a set of sanity check on TCP
|
This option causes Shorewall to make a set of sanity check on TCP
|
||||||
packet header flags.</li>
|
packet header flags.</li>
|
||||||
<li>It is now allowed to use 'all'
|
<li>It is now allowed to use 'all'
|
||||||
in the SOURCE or DEST column in a <a
|
in the SOURCE or DEST column in a <a
|
||||||
href="Documentation.htm#Rules">rule</a>. When used, 'all' must appear
|
href="Documentation.htm#Rules">rule</a>. When used, 'all' must appear
|
||||||
by itself (in may not be qualified) and it does not enable intra-zone
|
by itself (in may not be qualified) and it does not enable intra-zone
|
||||||
traffic. For example, the rule <br>
|
traffic. For example, the rule <br>
|
||||||
<br>
|
<br>
|
||||||
ACCEPT loc all tcp 80<br>
|
ACCEPT loc all tcp 80<br>
|
||||||
<br>
|
<br>
|
||||||
does not enable http traffic from 'loc' to
|
does not enable http traffic from 'loc'
|
||||||
'loc'.</li>
|
to 'loc'.</li>
|
||||||
<li>Shorewall's use of the 'echo' command
|
<li>Shorewall's use of the 'echo'
|
||||||
is now compatible with bash clones such as ash and dash.</li>
|
command is now compatible with bash clones such as ash and dash.</li>
|
||||||
<li>fw->fw policies now generate
|
<li>fw->fw policies now generate
|
||||||
a startup error. fw->fw rules generate a warning and are
|
a startup error. fw->fw rules generate a warning and are
|
||||||
ignored</li>
|
ignored</li>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@ -670,6 +680,7 @@ ignored</li>
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
<h2><a name="Donations"></a>Donations</h2>
|
<h2><a name="Donations"></a>Donations</h2>
|
||||||
|
|
||||||
</td>
|
</td>
|
||||||
@ -711,11 +722,12 @@ ignored</li>
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
<p align="center"><a href="http://www.starlight.org"> <img
|
<p align="center"><a href="http://www.starlight.org"> <img
|
||||||
border="4" src="images/newlog.gif" width="57" height="100" align="left"
|
border="4" src="images/newlog.gif" width="57" height="100" align="left"
|
||||||
hspace="10">
|
hspace="10">
|
||||||
|
|
||||||
</a></p>
|
</a></p>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@ -752,5 +764,7 @@ Foundation.</font></a> Thanks!</font></p>
|
|||||||
</p>
|
</p>
|
||||||
<br>
|
<br>
|
||||||
<br>
|
<br>
|
||||||
|
<br>
|
||||||
|
<br>
|
||||||
</body>
|
</body>
|
||||||
</html>
|
</html>
|
||||||
|
@ -47,7 +47,8 @@
|
|||||||
|
|
||||||
</a></i></font><font color="#ffffff">Shorewall
|
</a></i></font><font color="#ffffff">Shorewall
|
||||||
1.3 - <font size="4">"<i>iptables
|
1.3 - <font size="4">"<i>iptables
|
||||||
made easy"</i></font></font><a href="http://www.sf.net"> </a></h1>
|
made easy"</i></font></font><a href="http://www.sf.net">
|
||||||
|
</a></h1>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@ -94,6 +95,7 @@
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
<h2 align="left">What is it?</h2>
|
<h2 align="left">What is it?</h2>
|
||||||
|
|
||||||
|
|
||||||
@ -130,7 +132,7 @@ the GNU General Public License</a> as published by the Free Software
|
|||||||
<br>
|
<br>
|
||||||
|
|
||||||
This program is distributed in
|
This program is distributed in
|
||||||
the hope that it will be useful, but WITHOUT
|
the hope that it will be useful, but WITHOUT
|
||||||
ANY WARRANTY; without even the implied warranty
|
ANY WARRANTY; without even the implied warranty
|
||||||
of MERCHANTABILITY or FITNESS FOR A PARTICULAR
|
of MERCHANTABILITY or FITNESS FOR A PARTICULAR
|
||||||
PURPOSE. See the GNU General Public License for
|
PURPOSE. See the GNU General Public License for
|
||||||
@ -141,8 +143,8 @@ the hope that it will be useful, but WITHOUT
|
|||||||
You should have received a copy
|
You should have received a copy
|
||||||
of the GNU General Public License along
|
of the GNU General Public License along
|
||||||
with this program; if not, write to the Free Software
|
with this program; if not, write to the Free Software
|
||||||
Foundation, Inc., 675 Mass Ave, Cambridge, MA
|
Foundation, Inc., 675 Mass Ave, Cambridge,
|
||||||
02139, USA</p>
|
MA 02139, USA</p>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@ -175,8 +177,8 @@ the hope that it will be useful, but WITHOUT
|
|||||||
that features Shorewall-1.3.10 and Kernel-2.4.18.
|
that features Shorewall-1.3.10 and Kernel-2.4.18.
|
||||||
You can find their work at: <a
|
You can find their work at: <a
|
||||||
href="http://leaf.sourceforge.net/devel/jnilo"> http://leaf.sourceforge.net/devel/jnilo</a></p>
|
href="http://leaf.sourceforge.net/devel/jnilo"> http://leaf.sourceforge.net/devel/jnilo</a></p>
|
||||||
<b>Congratulations to Jacques and Eric
|
<b>Congratulations to Jacques and
|
||||||
on the recent release of Bering 1.0 Final!!! <br>
|
Eric on the recent release of Bering 1.0 Final!!! <br>
|
||||||
</b>
|
</b>
|
||||||
|
|
||||||
|
|
||||||
@ -195,12 +197,26 @@ the hope that it will be useful, but WITHOUT
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
<p><b>2/4/2003 - Shorewall 1.3.14-RC1</b><b> </b><b><img
|
||||||
|
border="0" src="images/new10.gif" width="28" height="12" alt="(New)">
|
||||||
|
</b></p>
|
||||||
|
|
||||||
|
<p>Includes the Beta 2 content plus support for OpenVPN tunnels.<br>
|
||||||
|
</p>
|
||||||
|
<p> The release candidate may be downloaded from:<br>
|
||||||
|
</p>
|
||||||
|
|
||||||
|
<blockquote><a href="http://www.shorewall.net/pub/shorewall/Beta">http://www.shorewall.net/pub/shorewall/Beta</a><a
|
||||||
|
href="ftp://ftp.shorewall.net/pub/shorewall/Beta" target="_top"><br>
|
||||||
|
ftp://ftp.shorewall.net/pub/shorewall/Beta</a></blockquote>
|
||||||
|
|
||||||
|
<p></p>
|
||||||
<p><b>1/28/2003 - Shorewall 1.3.14-Beta2 </b><b><img border="0"
|
<p><b>1/28/2003 - Shorewall 1.3.14-Beta2 </b><b><img border="0"
|
||||||
src="images/new10.gif" width="28" height="12" alt="(New)">
|
src="images/new10.gif" width="28" height="12" alt="(New)">
|
||||||
</b></p>
|
</b></p>
|
||||||
|
|
||||||
<p>Includes the Beta 1 content plus restores VLAN device names of the
|
<p>Includes the Beta 1 content plus restores VLAN device names of the
|
||||||
form $dev.$vid (e.g., eth0.1)</p>
|
form $dev.$vid (e.g., eth0.1)</p>
|
||||||
|
|
||||||
<p> The beta may be downloaded from:<br>
|
<p> The beta may be downloaded from:<br>
|
||||||
</p>
|
</p>
|
||||||
@ -219,33 +235,34 @@ form $dev.$vid (e.g., eth0.1)</p>
|
|||||||
|
|
||||||
<ol>
|
<ol>
|
||||||
<li>An OLD_PING_HANDLING option has been added to shorewall.conf.
|
<li>An OLD_PING_HANDLING option has been added to shorewall.conf.
|
||||||
When set to Yes, Shorewall ping handling is as it has always been (see http://www.shorewall.net/ping.html).<br>
|
When set to Yes, Shorewall ping handling is as it has always been (see
|
||||||
|
http://www.shorewall.net/ping.html).<br>
|
||||||
<br>
|
<br>
|
||||||
When OLD_PING_HANDLING=No, icmp echo (ping) is handled via rules and policies
|
When OLD_PING_HANDLING=No, icmp echo (ping) is handled via rules and
|
||||||
just like any other connection request. The FORWARDPING=Yes option in shorewall.conf
|
policies just like any other connection request. The FORWARDPING=Yes option
|
||||||
and the 'noping' and 'filterping' options in /etc/shorewall/interfaces will
|
in shorewall.conf and the 'noping' and 'filterping' options in /etc/shorewall/interfaces
|
||||||
all generate an error.<br>
|
will all generate an error.<br>
|
||||||
<br>
|
<br>
|
||||||
</li>
|
</li>
|
||||||
<li>It is now possible to direct Shorewall to create a "label"
|
<li>It is now possible to direct Shorewall to create a "label"
|
||||||
such as "eth0:0" for IP addresses that it creates under ADD_IP_ALIASES=Yes
|
such as "eth0:0" for IP addresses that it creates under ADD_IP_ALIASES=Yes
|
||||||
and ADD_SNAT_ALIASES=Yes. This is done by specifying the label instead of
|
and ADD_SNAT_ALIASES=Yes. This is done by specifying the label instead
|
||||||
just the interface name:<br>
|
of just the interface name:<br>
|
||||||
<br>
|
<br>
|
||||||
a) In the INTERFACE column of /etc/shorewall/masq<br>
|
a) In the INTERFACE column of /etc/shorewall/masq<br>
|
||||||
b) In the INTERFACE column of /etc/shorewall/nat<br>
|
b) In the INTERFACE column of /etc/shorewall/nat<br>
|
||||||
</li>
|
</li>
|
||||||
<li>When an interface name is entered in the SUBNET column of the
|
<li>When an interface name is entered in the SUBNET column of
|
||||||
/etc/shorewall/masq file, Shorewall previously masqueraded traffic from
|
the /etc/shorewall/masq file, Shorewall previously masqueraded traffic from
|
||||||
only the first subnet defined on that interface. It did not masquerade traffic
|
only the first subnet defined on that interface. It did not masquerade
|
||||||
from:<br>
|
traffic from:<br>
|
||||||
<br>
|
<br>
|
||||||
a) The subnets associated with other addresses on the interface.<br>
|
a) The subnets associated with other addresses on the interface.<br>
|
||||||
b) Subnets accessed through local routers.<br>
|
b) Subnets accessed through local routers.<br>
|
||||||
<br>
|
<br>
|
||||||
Beginning with Shorewall 1.3.14, if you enter an interface name in the
|
Beginning with Shorewall 1.3.14, if you enter an interface name in the
|
||||||
SUBNET column, shorewall will use the firewall's routing table to construct
|
SUBNET column, shorewall will use the firewall's routing table to construct
|
||||||
the masquerading/SNAT rules.<br>
|
the masquerading/SNAT rules.<br>
|
||||||
<br>
|
<br>
|
||||||
Example 1 -- This is how it works in 1.3.14.<br>
|
Example 1 -- This is how it works in 1.3.14.<br>
|
||||||
<br>
|
<br>
|
||||||
@ -257,12 +274,12 @@ the masquerading/SNAT rules.<br>
|
|||||||
<pre> [root@gateway test]# shorewall start<br> ...<br> Masqueraded Subnets and Hosts:<br> To 0.0.0.0/0 from 192.168.1.0/24 through eth0 using 206.124.146.176<br> To 0.0.0.0/0 from 192.168.10.0/24 through eth0 using 206.124.146.176<br> Processing /etc/shorewall/tos...</pre>
|
<pre> [root@gateway test]# shorewall start<br> ...<br> Masqueraded Subnets and Hosts:<br> To 0.0.0.0/0 from 192.168.1.0/24 through eth0 using 206.124.146.176<br> To 0.0.0.0/0 from 192.168.10.0/24 through eth0 using 206.124.146.176<br> Processing /etc/shorewall/tos...</pre>
|
||||||
<br>
|
<br>
|
||||||
When upgrading to Shorewall 1.3.14, if you have multiple local subnets
|
When upgrading to Shorewall 1.3.14, if you have multiple local subnets
|
||||||
connected to an interface that is specified in the SUBNET column of an /etc/shorewall/masq
|
connected to an interface that is specified in the SUBNET column of an /etc/shorewall/masq
|
||||||
entry, your /etc/shorewall/masq file will need changing. In most cases, you
|
entry, your /etc/shorewall/masq file will need changing. In most cases,
|
||||||
will simply be able to remove redundant entries. In some cases though, you
|
you will simply be able to remove redundant entries. In some cases though,
|
||||||
might want to change from using the interface name to listing specific subnetworks
|
you might want to change from using the interface name to listing specific
|
||||||
if the change described above will cause masquerading to occur on subnetworks
|
subnetworks if the change described above will cause masquerading to occur
|
||||||
that you don't wish to masquerade.<br>
|
on subnetworks that you don't wish to masquerade.<br>
|
||||||
<br>
|
<br>
|
||||||
Example 2 -- Suppose that your current config is as follows:<br>
|
Example 2 -- Suppose that your current config is as follows:<br>
|
||||||
<br>
|
<br>
|
||||||
@ -271,7 +288,7 @@ connected to an interface that is specified in the SUBNET column of an /etc/sho
|
|||||||
|
|
||||||
<pre> [root@gateway test]# ip route show dev eth2<br> 192.168.1.0/24 scope link<br> 192.168.10.0/24 proto kernel scope link src 192.168.10.254<br> [root@gateway test]#<br></pre>
|
<pre> [root@gateway test]# ip route show dev eth2<br> 192.168.1.0/24 scope link<br> 192.168.10.0/24 proto kernel scope link src 192.168.10.254<br> [root@gateway test]#<br></pre>
|
||||||
In this case, the second entry in /etc/shorewall/masq is no longer
|
In this case, the second entry in /etc/shorewall/masq is no longer
|
||||||
required.<br>
|
required.<br>
|
||||||
<br>
|
<br>
|
||||||
Example 3 -- What if your current configuration is like this?<br>
|
Example 3 -- What if your current configuration is like this?<br>
|
||||||
<br>
|
<br>
|
||||||
@ -295,6 +312,7 @@ required.<br>
|
|||||||
<p><b>1/18/2003 - Shorewall 1.3.13 Documentation in PDF Format</b><b> </b><b>
|
<p><b>1/18/2003 - Shorewall 1.3.13 Documentation in PDF Format</b><b> </b><b>
|
||||||
</b></p>
|
</b></p>
|
||||||
|
|
||||||
|
|
||||||
<p>Juraj Ontkanin has produced a PDF containing the Shorewall 1.3.13
|
<p>Juraj Ontkanin has produced a PDF containing the Shorewall 1.3.13
|
||||||
documenation. the PDF may be downloaded from</p>
|
documenation. the PDF may be downloaded from</p>
|
||||||
<a
|
<a
|
||||||
@ -321,13 +339,14 @@ for making this happen.<br>
|
|||||||
|
|
||||||
<ol>
|
<ol>
|
||||||
<li>A new 'DNAT-' action has been added for entries in the
|
<li>A new 'DNAT-' action has been added for entries in the
|
||||||
/etc/shorewall/rules file. DNAT- is intended for advanced users who wish
|
/etc/shorewall/rules file. DNAT- is intended for advanced users who wish
|
||||||
to minimize the number of rules that connection requests must traverse.<br>
|
to minimize the number of rules that connection requests must traverse.<br>
|
||||||
<br>
|
<br>
|
||||||
A Shorewall DNAT rule actually generates two iptables rules: a header
|
A Shorewall DNAT rule actually generates two iptables rules: a header
|
||||||
rewriting rule in the 'nat' table and an ACCEPT rule in the 'filter' table.
|
rewriting rule in the 'nat' table and an ACCEPT rule in the 'filter'
|
||||||
A DNAT- rule only generates the first of these rules. This is handy when
|
table. A DNAT- rule only generates the first of these rules. This is
|
||||||
you have several DNAT rules that would generate the same ACCEPT rule.<br>
|
handy when you have several DNAT rules that would generate the same ACCEPT
|
||||||
|
rule.<br>
|
||||||
<br>
|
<br>
|
||||||
Here are three rules from my previous rules file:<br>
|
Here are three rules from my previous rules file:<br>
|
||||||
<br>
|
<br>
|
||||||
@ -339,8 +358,8 @@ to minimize the number of rules that connection requests must traverse.<br>
|
|||||||
<br>
|
<br>
|
||||||
ACCEPT net dmz:206.124.146.177 tcp smtp<br>
|
ACCEPT net dmz:206.124.146.177 tcp smtp<br>
|
||||||
<br>
|
<br>
|
||||||
By writing the rules this way, I end up with only one copy of the
|
By writing the rules this way, I end up with only one copy of
|
||||||
ACCEPT rule.<br>
|
the ACCEPT rule.<br>
|
||||||
<br>
|
<br>
|
||||||
DNAT- net dmz:206.124.146.177 tcp smtp - 206.124.146.178<br>
|
DNAT- net dmz:206.124.146.177 tcp smtp - 206.124.146.178<br>
|
||||||
DNAT- net dmz:206.124.146.177 tcp smtp - 206.124.146.179<br>
|
DNAT- net dmz:206.124.146.177 tcp smtp - 206.124.146.179<br>
|
||||||
@ -352,17 +371,17 @@ to minimize the number of rules that connection requests must traverse.<br>
|
|||||||
<br>
|
<br>
|
||||||
</li>
|
</li>
|
||||||
<li>A new CLEAR_TC option has been added to shorewall.conf.
|
<li>A new CLEAR_TC option has been added to shorewall.conf.
|
||||||
If this option is set to 'No' then Shorewall won't clear the current traffic
|
If this option is set to 'No' then Shorewall won't clear the current traffic
|
||||||
control rules during [re]start. This setting is intended for use by people
|
control rules during [re]start. This setting is intended for use by people
|
||||||
that prefer to configure traffic shaping when the network interfaces come
|
that prefer to configure traffic shaping when the network interfaces
|
||||||
up rather than when the firewall is started. If that is what you want
|
come up rather than when the firewall is started. If that is what you
|
||||||
to do, set TC_ENABLED=Yes and CLEAR_TC=No and do not supply an /etc/shorewall/tcstart
|
want to do, set TC_ENABLED=Yes and CLEAR_TC=No and do not supply an /etc/shorewall/tcstart
|
||||||
file. That way, your traffic shaping rules can still use the 'fwmark'
|
file. That way, your traffic shaping rules can still use the 'fwmark'
|
||||||
classifier based on packet marking defined in /etc/shorewall/tcrules.<br>
|
classifier based on packet marking defined in /etc/shorewall/tcrules.<br>
|
||||||
<br>
|
<br>
|
||||||
</li>
|
</li>
|
||||||
<li>A new SHARED_DIR variable has been added that allows distribution
|
<li>A new SHARED_DIR variable has been added that allows
|
||||||
packagers to easily move the shared directory (default /usr/lib/shorewall).
|
distribution packagers to easily move the shared directory (default /usr/lib/shorewall).
|
||||||
Users should never have a need to change the value of this shorewall.conf
|
Users should never have a need to change the value of this shorewall.conf
|
||||||
setting.</li>
|
setting.</li>
|
||||||
|
|
||||||
@ -408,34 +427,35 @@ classifier based on packet marking defined in /etc/shorewall/tcrules.<br>
|
|||||||
<li>"shorewall refresh" now reloads the traffic shaping
|
<li>"shorewall refresh" now reloads the traffic shaping
|
||||||
rules (tcrules and tcstart).</li>
|
rules (tcrules and tcstart).</li>
|
||||||
<li>"shorewall debug [re]start" now turns off debugging
|
<li>"shorewall debug [re]start" now turns off debugging
|
||||||
after an error occurs. This places the point of the failure near the
|
after an error occurs. This places the point of the failure near
|
||||||
end of the trace rather than up in the middle of it.</li>
|
the end of the trace rather than up in the middle of it.</li>
|
||||||
<li>"shorewall [re]start" has been speeded up by more
|
<li>"shorewall [re]start" has been speeded up by
|
||||||
than 40% with my configuration. Your milage may vary.</li>
|
more than 40% with my configuration. Your milage may vary.</li>
|
||||||
<li>A "shorewall show classifiers" command has been
|
<li>A "shorewall show classifiers" command has been
|
||||||
added which shows the current packet classification filters. The output
|
added which shows the current packet classification filters. The
|
||||||
from this command is also added as a separate page in "shorewall monitor"</li>
|
output from this command is also added as a separate page in "shorewall
|
||||||
<li>ULOG (must be all caps) is now accepted as a valid
|
monitor"</li>
|
||||||
syslog level and causes the subject packets to be logged using the
|
<li>ULOG (must be all caps) is now accepted as a
|
||||||
ULOG target rather than the LOG target. This allows you to run ulogd
|
valid syslog level and causes the subject packets to be logged using
|
||||||
(available from <a
|
the ULOG target rather than the LOG target. This allows you to run
|
||||||
|
ulogd (available from <a
|
||||||
href="http://www.gnumonks.org/projects/ulogd">http://www.gnumonks.org/projects/ulogd</a>)
|
href="http://www.gnumonks.org/projects/ulogd">http://www.gnumonks.org/projects/ulogd</a>)
|
||||||
and log all Shorewall messages <a href="shorewall_logging.html">to
|
and log all Shorewall messages <a
|
||||||
a separate log file</a>.</li>
|
href="shorewall_logging.html">to a separate log file</a>.</li>
|
||||||
<li>If you are running a kernel that has a FORWARD
|
<li>If you are running a kernel that has a FORWARD
|
||||||
chain in the mangle table ("shorewall show mangle" will show you
|
chain in the mangle table ("shorewall show mangle" will show you
|
||||||
the chains in the mangle table), you can set MARK_IN_FORWARD_CHAIN=Yes
|
the chains in the mangle table), you can set MARK_IN_FORWARD_CHAIN=Yes
|
||||||
in <a href="Documentation.htm#Conf">shorewall.conf</a>. This allows for
|
in <a href="Documentation.htm#Conf">shorewall.conf</a>. This allows for
|
||||||
marking input packets based on their destination even when you are
|
marking input packets based on their destination even when you are
|
||||||
using Masquerading or SNAT.</li>
|
using Masquerading or SNAT.</li>
|
||||||
<li>I have cluttered up the /etc/shorewall directory
|
<li>I have cluttered up the /etc/shorewall directory
|
||||||
with empty 'init', 'start', 'stop' and 'stopped' files. If you already
|
with empty 'init', 'start', 'stop' and 'stopped' files. If you
|
||||||
have a file with one of these names, don't worry -- the upgrade process
|
already have a file with one of these names, don't worry -- the upgrade
|
||||||
won't overwrite your file.</li>
|
process won't overwrite your file.</li>
|
||||||
<li>I have added a new RFC1918_LOG_LEVEL variable to
|
<li>I have added a new RFC1918_LOG_LEVEL variable
|
||||||
<a href="Documentation.htm#Conf">shorewall.conf</a>. This variable
|
to <a href="Documentation.htm#Conf">shorewall.conf</a>. This variable
|
||||||
specifies the syslog level at which packets are logged as a result
|
specifies the syslog level at which packets are logged as a result
|
||||||
of entries in the /etc/shorewall/rfc1918 file. Previously, these packets
|
of entries in the /etc/shorewall/rfc1918 file. Previously, these packets
|
||||||
were always logged at the 'info' level.</li>
|
were always logged at the 'info' level.</li>
|
||||||
|
|
||||||
|
|
||||||
@ -444,9 +464,9 @@ of entries in the /etc/shorewall/rfc1918 file. Previously, these packets
|
|||||||
|
|
||||||
<p><b>12/20/2002 - Shorewall 1.3.12 Beta 3</b><br>
|
<p><b>12/20/2002 - Shorewall 1.3.12 Beta 3</b><br>
|
||||||
</p>
|
</p>
|
||||||
This version corrects a problem with Blacklist logging. In
|
This version corrects a problem with Blacklist logging.
|
||||||
Beta 2, if BLACKLIST_LOG_LEVEL was set to anything but ULOG, the firewall
|
In Beta 2, if BLACKLIST_LOG_LEVEL was set to anything but ULOG, the
|
||||||
would fail to start and "shorewall refresh" would also fail.<br>
|
firewall would fail to start and "shorewall refresh" would also fail.<br>
|
||||||
|
|
||||||
|
|
||||||
<p> You may download the Beta from:<br>
|
<p> You may download the Beta from:<br>
|
||||||
@ -462,8 +482,8 @@ of entries in the /etc/shorewall/rfc1918 file. Previously, these packets
|
|||||||
|
|
||||||
<p><b>12/20/2002 - Shorewall 1.3.12 Beta 2</b><b>
|
<p><b>12/20/2002 - Shorewall 1.3.12 Beta 2</b><b>
|
||||||
</b></p>
|
</b></p>
|
||||||
The first public Beta version of Shorewall 1.3.12 is now
|
The first public Beta version of Shorewall 1.3.12 is
|
||||||
available (Beta 1 was made available only to a limited audience).
|
now available (Beta 1 was made available only to a limited audience).
|
||||||
<br>
|
<br>
|
||||||
<br>
|
<br>
|
||||||
Features include:<br>
|
Features include:<br>
|
||||||
@ -475,26 +495,26 @@ of entries in the /etc/shorewall/rfc1918 file. Previously, these packets
|
|||||||
<li>"shorewall refresh" now reloads the traffic
|
<li>"shorewall refresh" now reloads the traffic
|
||||||
shaping rules (tcrules and tcstart).</li>
|
shaping rules (tcrules and tcstart).</li>
|
||||||
<li>"shorewall debug [re]start" now turns off
|
<li>"shorewall debug [re]start" now turns off
|
||||||
debugging after an error occurs. This places the point of the failure
|
debugging after an error occurs. This places the point of the failure
|
||||||
near the end of the trace rather than up in the middle of it.</li>
|
near the end of the trace rather than up in the middle of it.</li>
|
||||||
<li>"shorewall [re]start" has been speeded up
|
<li>"shorewall [re]start" has been speeded up
|
||||||
by more than 40% with my configuration. Your milage may vary.</li>
|
by more than 40% with my configuration. Your milage may vary.</li>
|
||||||
<li>A "shorewall show classifiers" command has
|
<li>A "shorewall show classifiers" command has
|
||||||
been added which shows the current packet classification filters.
|
been added which shows the current packet classification filters.
|
||||||
The output from this command is also added as a separate page in "shorewall
|
The output from this command is also added as a separate page in
|
||||||
monitor"</li>
|
"shorewall monitor"</li>
|
||||||
<li>ULOG (must be all caps) is now accepted as
|
<li>ULOG (must be all caps) is now accepted
|
||||||
a valid syslog level and causes the subject packets to be logged using
|
as a valid syslog level and causes the subject packets to be logged
|
||||||
the ULOG target rather than the LOG target. This allows you to run ulogd
|
using the ULOG target rather than the LOG target. This allows you to
|
||||||
(available from <a
|
run ulogd (available from <a
|
||||||
href="http://www.gnumonks.org/projects/ulogd">http://www.gnumonks.org/projects/ulogd</a>)
|
href="http://www.gnumonks.org/projects/ulogd">http://www.gnumonks.org/projects/ulogd</a>)
|
||||||
and log all Shorewall messages <a href="shorewall_logging.html">to
|
and log all Shorewall messages <a
|
||||||
a separate log file</a>.</li>
|
href="shorewall_logging.html">to a separate log file</a>.</li>
|
||||||
<li>If you are running a kernel that has a FORWARD
|
<li>If you are running a kernel that has a FORWARD
|
||||||
chain in the mangle table ("shorewall show mangle" will show you the
|
chain in the mangle table ("shorewall show mangle" will show you
|
||||||
chains in the mangle table), you can set MARK_IN_FORWARD_CHAIN=Yes
|
the chains in the mangle table), you can set MARK_IN_FORWARD_CHAIN=Yes
|
||||||
in shorewall.conf. This allows for marking input packets based on their
|
in shorewall.conf. This allows for marking input packets based on
|
||||||
destination even when you are using Masquerading or SNAT.</li>
|
their destination even when you are using Masquerading or SNAT.</li>
|
||||||
<li>I have cluttered up the /etc/shorewall directory
|
<li>I have cluttered up the /etc/shorewall directory
|
||||||
with empty 'init', 'start', 'stop' and 'stopped' files. If you already
|
with empty 'init', 'start', 'stop' and 'stopped' files. If you already
|
||||||
have a file with one of these names, don't worry -- the upgrade process
|
have a file with one of these names, don't worry -- the upgrade process
|
||||||
@ -534,7 +554,7 @@ in shorewall.conf. This allows for marking input packets based on their
|
|||||||
|
|
||||||
<p>Two months and 3 days after I pre-ordered Mandrake 9.0, it was finally
|
<p>Two months and 3 days after I pre-ordered Mandrake 9.0, it was finally
|
||||||
delivered. I have installed 9.0 on one of my systems and I am
|
delivered. I have installed 9.0 on one of my systems and I am
|
||||||
now in a position to support Shorewall users who run Mandrake 9.0.</p>
|
now in a position to support Shorewall users who run Mandrake 9.0.</p>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@ -549,17 +569,20 @@ now in a position to support Shorewall users who run Mandrake 9.0.</p>
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
<p><b>12/3/2002 - Shorewall 1.3.11a</b><b>
|
<p><b>12/3/2002 - Shorewall 1.3.11a</b><b>
|
||||||
</b></p>
|
</b></p>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
<p>This is a bug-fix roll up which includes Roger Aich's fix for DNAT
|
<p>This is a bug-fix roll up which includes Roger Aich's fix for DNAT
|
||||||
with excluded subnets (e.g., "DNAT foo!bar ..."). Current 1.3.11
|
with excluded subnets (e.g., "DNAT foo!bar ..."). Current 1.3.11
|
||||||
users who don't need rules of this type need not upgrade to 1.3.11.</p>
|
users who don't need rules of this type need not upgrade to 1.3.11.</p>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
<p><b>11/25/2002 - Shorewall 1.3.11 Documentation in PDF Format</b><b>
|
<p><b>11/25/2002 - Shorewall 1.3.11 Documentation in PDF Format</b><b>
|
||||||
</b></p>
|
</b></p>
|
||||||
|
|
||||||
@ -593,25 +616,26 @@ now in a position to support Shorewall users who run Mandrake 9.0.</p>
|
|||||||
|
|
||||||
|
|
||||||
<ul>
|
<ul>
|
||||||
<li>A 'tcpflags' option has been added
|
<li>A 'tcpflags' option has been
|
||||||
to entries in <a href="Documentation.htm#Interfaces">/etc/shorewall/interfaces</a>.
|
added to entries in <a
|
||||||
|
href="Documentation.htm#Interfaces">/etc/shorewall/interfaces</a>.
|
||||||
This option causes Shorewall to make a set of sanity check on TCP
|
This option causes Shorewall to make a set of sanity check on TCP
|
||||||
packet header flags.</li>
|
packet header flags.</li>
|
||||||
<li>It is now allowed to use 'all'
|
<li>It is now allowed to use 'all'
|
||||||
in the SOURCE or DEST column in a <a
|
in the SOURCE or DEST column in a <a
|
||||||
href="Documentation.htm#Rules">rule</a>. When used, 'all' must appear
|
href="Documentation.htm#Rules">rule</a>. When used, 'all' must appear
|
||||||
by itself (in may not be qualified) and it does not enable intra-zone
|
by itself (in may not be qualified) and it does not enable intra-zone
|
||||||
traffic. For example, the rule <br>
|
traffic. For example, the rule <br>
|
||||||
<br>
|
<br>
|
||||||
ACCEPT loc all tcp 80<br>
|
ACCEPT loc all tcp 80<br>
|
||||||
<br>
|
<br>
|
||||||
does not enable http traffic from 'loc' to
|
does not enable http traffic from 'loc'
|
||||||
'loc'.</li>
|
to 'loc'.</li>
|
||||||
<li>Shorewall's use of the 'echo' command
|
<li>Shorewall's use of the 'echo'
|
||||||
is now compatible with bash clones such as ash and dash.</li>
|
command is now compatible with bash clones such as ash and dash.</li>
|
||||||
<li>fw->fw policies now generate
|
<li>fw->fw policies now generate
|
||||||
a startup error. fw->fw rules generate a warning and are
|
a startup error. fw->fw rules generate a warning and are
|
||||||
ignored</li>
|
ignored</li>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@ -704,6 +728,7 @@ ignored</li>
|
|||||||
|
|
||||||
<h2><a name="Donations"></a>Donations</h2>
|
<h2><a name="Donations"></a>Donations</h2>
|
||||||
|
|
||||||
|
|
||||||
</td>
|
</td>
|
||||||
|
|
||||||
<td width="88" bgcolor="#4b017c"
|
<td width="88" bgcolor="#4b017c"
|
||||||
@ -727,6 +752,7 @@ ignored</li>
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
<table border="0" cellpadding="5" cellspacing="0"
|
<table border="0" cellpadding="5" cellspacing="0"
|
||||||
style="border-collapse: collapse;" width="100%" id="AutoNumber2"
|
style="border-collapse: collapse;" width="100%" id="AutoNumber2"
|
||||||
bgcolor="#4b017c">
|
bgcolor="#4b017c">
|
||||||
@ -760,6 +786,7 @@ ignored</li>
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
<p align="center"><font size="4" color="#ffffff">Shorewall is free
|
<p align="center"><font size="4" color="#ffffff">Shorewall is free
|
||||||
but if you try it and find it useful, please consider making a donation
|
but if you try it and find it useful, please consider making a donation
|
||||||
to <a
|
to <a
|
||||||
@ -774,16 +801,19 @@ Children's Foundation.</font></a> Thanks!</font></p>
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
</tbody>
|
</tbody>
|
||||||
|
|
||||||
</table>
|
</table>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
<p><font size="2">Updated 1/28/2003 - <a href="support.htm">Tom Eastep</a></font>
|
<p><font size="2">Updated 2/4/2003 - <a href="support.htm">Tom Eastep</a></font>
|
||||||
|
|
||||||
<br>
|
<br>
|
||||||
</p>
|
</p>
|
||||||
<br>
|
<br>
|
||||||
|
<br>
|
||||||
|
<br>
|
||||||
</body>
|
</body>
|
||||||
</html>
|
</html>
|
||||||
|
Loading…
x
Reference in New Issue
Block a user