mirror of
https://gitlab.com/shorewall/code.git
synced 2024-12-18 20:30:43 +01:00
Update release notes
Signed-off-by: Tom Eastep <teastep@shorewall.net>
This commit is contained in:
parent
642319d706
commit
59c11e205b
@ -27,6 +27,17 @@ VI. PROBLEMS CORRECTED AND NEW FEATURES IN PRIOR RELEASES
|
||||
STARTUP_LOG=/var/log/shorewall-lite-init.log
|
||||
(or shorewall6-lite-init.log)
|
||||
|
||||
3) The 4.4.20 Shorewall6 installer always installed the plain
|
||||
(unannotated) version of shorewall6.conf, regardless of the '-p'
|
||||
setting.
|
||||
|
||||
4) Due to dissatisfaction with the default setting for configuration
|
||||
file annotation, the default has returned to 'plain' (unannotated)
|
||||
configuration files. If you wish to include documentation in your
|
||||
installed configuration files, use the '-a' option in the
|
||||
installer. The '-p' option will remain supported until 4.4.21 when
|
||||
it will be removed.
|
||||
|
||||
4.4.20
|
||||
|
||||
1) Previously, when a device number was explicitly specified in
|
||||
@ -35,76 +46,26 @@ VI. PROBLEMS CORRECTED AND NEW FEATURES IN PRIOR RELEASES
|
||||
did not specify a number. Now, the compiler selects the lowest
|
||||
unallocated number when no device number is explicitly allocated.
|
||||
|
||||
2) Certain attacks can be best defended through use of one of these
|
||||
two measures.
|
||||
|
||||
a) rt_filter (Shorewall's routefilter). Only applicable to IPv4
|
||||
and can't be used with some multi-ISP configurations.
|
||||
|
||||
b) Insert a DROP rule that prevents hairpinning (routeback). The
|
||||
rule must be inserted before any ESTABLISHED,RELATED firewall
|
||||
rules. This approach is not appropriate for bridges and other
|
||||
cases, where the 'routeback' option is specified or implied.
|
||||
|
||||
For non-routeback interfaces, Shorewall and Shorewall6 will now
|
||||
insert a hairpin rule, provided that the routefilter option is not
|
||||
specified. The rule will dispose of hairpins according to the
|
||||
setting of two new options in shorewall.conf and shorewall6.conf:
|
||||
|
||||
SFILTER_LOG_LEVEL
|
||||
Specifies the logging level; default is 'info'. To omit
|
||||
logging, specify FILTER_LOG_LEVEL=none.
|
||||
|
||||
|
||||
SFILTER_DISPOSITION
|
||||
Specifies the disposition. Default is DROP and the possible
|
||||
values are DROP, A_DROP, REJECT and A_REJECT.
|
||||
|
||||
To deal with bridges and other routeback interfaces , there is now
|
||||
an 'sfilter' option in /shorewall/interfaces and
|
||||
/etc/shorewall6/interfaces.
|
||||
|
||||
The value of the 'sfilter' option is a list of network addresses
|
||||
enclosed in in parentheses. Where only a single address is listed,
|
||||
the parentheses may be omitted. When a packet from a
|
||||
source-filtered address is received on the interface, it is
|
||||
disposed of based on the new SFILTER_ options described above.
|
||||
|
||||
For a bridge or other routeback interface, you should list all of
|
||||
your other local networks (those networks not attached to the
|
||||
bridge) in the bridge's sfilter list.
|
||||
|
||||
Example:
|
||||
|
||||
My DMZ is 2001:470:b:227::40/124
|
||||
|
||||
My local interface (br1) is a bridge.
|
||||
|
||||
In /etc/shorewall6/interfaces, I have:
|
||||
|
||||
#ZONE INTERFACE BROADCAST OPTIONS
|
||||
loc br1 - sfilter=2001:470:b:227::40/124
|
||||
|
||||
3) The obsolete PKTTYPE option has been removed from shorewall.conf
|
||||
2) The obsolete PKTTYPE option has been removed from shorewall.conf
|
||||
and the associated manpage.
|
||||
|
||||
4) The iptables 1.4.11 release produces an error when negative numbers
|
||||
3) The iptables 1.4.11 release produces an error when negative numbers
|
||||
are specified for IPMARK mask values. Shorewall now converts such
|
||||
numbers to their 32-bit hex equivalent.
|
||||
|
||||
5) Previously, before /etc/shorewall6/params was processed, the
|
||||
4) Previously, before /etc/shorewall6/params was processed, the
|
||||
IPv4 Shorewall libraries (/usr/share/shorewall/lib.*) were
|
||||
loaded rather that the IPv6 versions (/usr/share/shorewall6/lib.*).
|
||||
Now, the correct libraries are loaded.
|
||||
|
||||
6) Shorewall now sets /proc/sys/net/bridge/bridge_nf_call_iptables or
|
||||
5) Shorewall now sets /proc/sys/net/bridge/bridge_nf_call_iptables or
|
||||
/proc/sys/net/bridge/bridge_nf_call_ip6tables when there are
|
||||
interfaces with the 'bridge' option. This insures that netfilter
|
||||
rules are invoked for bridged traffic. Previously, Shorewall was
|
||||
not setting these flags with the possible result that a
|
||||
bridge/firewall would not work properly.
|
||||
|
||||
7) Problem corrections released in 4.4.19.1-4.4.19.4 (see below)
|
||||
6) Problem corrections released in 4.4.19.1-4.4.19.4 (see below)
|
||||
are also included in this release.
|
||||
|
||||
----------------------------------------------------------------------------
|
||||
@ -272,6 +233,56 @@ VI. PROBLEMS CORRECTED AND NEW FEATURES IN PRIOR RELEASES
|
||||
which will match packets in the INVALID state, and 'NI'
|
||||
which will match packets in either NEW or INVALID state.
|
||||
|
||||
12) Certain attacks can be best defended through use of one of these
|
||||
two measures.
|
||||
|
||||
a) rt_filter (Shorewall's routefilter). Only applicable to IPv4
|
||||
and can't be used with some multi-ISP configurations.
|
||||
|
||||
b) Insert a DROP rule that prevents hairpinning (routeback). The
|
||||
rule must be inserted before any ESTABLISHED,RELATED firewall
|
||||
rules. This approach is not appropriate for bridges and other
|
||||
cases, where the 'routeback' option is specified or implied.
|
||||
|
||||
For non-routeback interfaces, Shorewall and Shorewall6 will now
|
||||
insert a hairpin rule, provided that the routefilter option is not
|
||||
specified. The rule will dispose of hairpins according to the
|
||||
setting of two new options in shorewall.conf and shorewall6.conf:
|
||||
|
||||
SFILTER_LOG_LEVEL
|
||||
Specifies the logging level; default is 'info'. To omit
|
||||
logging, specify FILTER_LOG_LEVEL=none.
|
||||
|
||||
|
||||
SFILTER_DISPOSITION
|
||||
Specifies the disposition. Default is DROP and the possible
|
||||
values are DROP, A_DROP, REJECT and A_REJECT.
|
||||
|
||||
To deal with bridges and other routeback interfaces , there is now
|
||||
an 'sfilter' option in /shorewall/interfaces and
|
||||
/etc/shorewall6/interfaces.
|
||||
|
||||
The value of the 'sfilter' option is a list of network addresses
|
||||
enclosed in in parentheses. Where only a single address is listed,
|
||||
the parentheses may be omitted. When a packet from a
|
||||
source-filtered address is received on the interface, it is
|
||||
disposed of based on the new SFILTER_ options described above.
|
||||
|
||||
For a bridge or other routeback interface, you should list all of
|
||||
your other local networks (those networks not attached to the
|
||||
bridge) in the bridge's sfilter list.
|
||||
|
||||
Example:
|
||||
|
||||
My DMZ is 2001:470:b:227::40/124
|
||||
|
||||
My local interface (br1) is a bridge.
|
||||
|
||||
In /etc/shorewall6/interfaces, I have:
|
||||
|
||||
#ZONE INTERFACE BROADCAST OPTIONS
|
||||
loc br1 - sfilter=2001:470:b:227::40/124
|
||||
|
||||
----------------------------------------------------------------------------
|
||||
I V. R E L E A S E 4 . 4 H I G H L I G H T S
|
||||
----------------------------------------------------------------------------
|
||||
|
Loading…
Reference in New Issue
Block a user