From 9638a089201adbfabd275a3a652ccad3ad7fe0d6 Mon Sep 17 00:00:00 2001 From: teastep Date: Wed, 8 Nov 2006 15:56:25 +0000 Subject: [PATCH] Don't subject IPSEC traffic to rfc1918 filtering git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@4810 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb --- Shorewall/compiler | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/Shorewall/compiler b/Shorewall/compiler index 26a4eeb33..1fcb612a8 100755 --- a/Shorewall/compiler +++ b/Shorewall/compiler @@ -3537,6 +3537,9 @@ setup_blacklist() { add_common_rules() { local savelogparms="$LOGPARMS" local broadcasts="$(find_broadcasts) 255.255.255.255 224.0.0.0/4" + local policy + + [ -n "$POLICY_MATCH" ] && policy="-m policy --pol $ipsec --dir in" || policy= # # Populate the smurf chain # @@ -3632,7 +3635,6 @@ __EOF__ for host in $hosts; do ipsec=${host%^*} host=${host#*^} - [ -n "$POLICY_MATCH" ] && policy="-m policy --pol $ipsec --dir in" || policy= interface=${host%%:*} network=${host#*:} @@ -3745,7 +3747,6 @@ __EOF__ for host in $hosts; do ipsec=${host%^*} host=${host#*^} - [ -n "$POLICY_MATCH" ] && policy="-m policy --pol $ipsec --dir in" || policy= interface=${host%%:*} networks=${host#*:} @@ -3754,7 +3755,7 @@ __EOF__ done [ -n "$MANGLE_ENABLED" -a -z "$CONNTRACK_MATCH" ] && \ - run_iptables -t mangle -A PREROUTING -m state --state NEW -i $interface $(match_source_hosts $networks) -j man1918 + run_iptables -t mangle -A PREROUTING -m state --state NEW -i $interface $(match_source_hosts $networks) $policy -j man1918 done fi