diff --git a/STABLE/documentation/ECN.html b/STABLE/documentation/ECN.html new file mode 100644 index 000000000..c2ebd20ed --- /dev/null +++ b/STABLE/documentation/ECN.html @@ -0,0 +1,83 @@ + + + + Shorewall and ECN + + + + + + + + + + + +
+

ECN

+
+
+Explicit Congestion Notification (ECN) is described in RFC 3168 and is a +proposed internet standard. Unfortunately, not all sites support ECN and +when a TCP connection offering ECN is sent to sites that don't support it, +the result is often that the connection request is ignored.
+
+To allow ECN to be used, Shorewall allows you to enable ECN on your Linux +systems then disable it in your firewall when the destination matches a list +that you create (the /etc/shorewall/ecn file).
+
+You enable ECN by
+
+
+
echo 1 > /proc/sys/net/ipv4/tcp_ecn
+
+You must arrange for that command to be executed at system boot. Most distributions +have a method for doing that -- on RedHat, you make an entry in /etc/sysctl.conf.
+
+
+
net.ipv4.tcp_ecn = 1

+
+Entries in /etc/shorewall/ecn have two columns as follows:
+
+INTERFACE    - The name of an interface on your system
+
+HOST(S)        - An address (host or subnet) +of a system or group of systems accessed through the  interface in the +first column. You may include a comma-separated list of such addresses in +this column.
+
+Example: Your external interface is eth0 and you want to disable ECN for +tcp connections to 192.0.2.0/24:
+
+In /etc/shorewall/ecn:
+
+
+ + + + + + + + + + + +
INTERFACE
+
HOST(S)
+
eth0
+
192.0.2.0/24
+
+
+
+Last updated 3/28/2003 - Tom Eastep + +

Copyright © 2001, 2002, 2003 Thomas M. Eastep.
+

+ + diff --git a/STABLE/firewall b/STABLE/firewall index 3c5f24883..0c0f74f26 100755 --- a/STABLE/firewall +++ b/STABLE/firewall @@ -3195,6 +3195,11 @@ initialize_netfilter () { setcontinue FORWARD setcontinue INPUT setcontinue OUTPUT + + # + # Enable the Loopback interface + run_iptables -A INPUT -i lo -j ACCEPT + run_iptables -A OUTPUT -o lo -j ACCEPT # # Allow DNS lookups during startup for FQDNs and deep-six INVALID packets @@ -3494,12 +3499,6 @@ add_common_rules() { # setup_blacklist - # - # Enable the Loopback interface - # - run_iptables -A INPUT -i lo -j ACCEPT - run_iptables -A OUTPUT -o lo -j ACCEPT - # # Route Filtering #