mirror of
https://gitlab.com/shorewall/code.git
synced 2025-06-24 19:51:40 +02:00
Verify DEST interface in /etc/shorewall/tcrules
git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@1997 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
parent
573ff6ae57
commit
9b8295527d
@ -2379,6 +2379,7 @@ process_tc_rule()
|
|||||||
r="${r}$(dest_ip_range $dest) "
|
r="${r}$(dest_ip_range $dest) "
|
||||||
;;
|
;;
|
||||||
*)
|
*)
|
||||||
|
verify_interface $dest || fatal_error "Unknown interface $dest in rule \"$rule\""
|
||||||
r="${r}$(match_dest_dev $dest) "
|
r="${r}$(match_dest_dev $dest) "
|
||||||
;;
|
;;
|
||||||
esac
|
esac
|
||||||
|
@ -21,7 +21,23 @@
|
|||||||
# DROP - silently drop the packet
|
# DROP - silently drop the packet
|
||||||
# logdrop - log then drop
|
# logdrop - log then drop
|
||||||
#
|
#
|
||||||
###############################################################################
|
# By default, the RETURN target causes 'norfc1918' processing to cease for a
|
||||||
|
# packet if the packet's source IP address matches the rule. Thus, if you have:
|
||||||
|
#
|
||||||
|
# SUBNETS TARGET
|
||||||
|
# 192.168.1.0/24 RETURN
|
||||||
|
#
|
||||||
|
# then traffic from 192.168.1.4 to 10.0.3.9 will be accepted even though you
|
||||||
|
# also have:
|
||||||
|
#
|
||||||
|
# SUBNETS TARGET
|
||||||
|
# 10.0.0.0/8 logdrop
|
||||||
|
#
|
||||||
|
# Setting RFC1918_STRICT=Yes in shorewall.conf will cause such traffic to be
|
||||||
|
# logged and dropped since while the packet's source matches the RETURN rule,
|
||||||
|
# the packet's destination matches the 'logdrop' rule.
|
||||||
|
#
|
||||||
|
################################################################################
|
||||||
#SUBNETS TARGET
|
#SUBNETS TARGET
|
||||||
172.16.0.0/12 logdrop # RFC 1918
|
172.16.0.0/12 logdrop # RFC 1918
|
||||||
192.168.0.0/16 logdrop # RFC 1918
|
192.168.0.0/16 logdrop # RFC 1918
|
||||||
|
@ -23,6 +23,8 @@ Changes in 2.2.2
|
|||||||
|
|
||||||
10) Implement RFC1918_STRICT
|
10) Implement RFC1918_STRICT
|
||||||
|
|
||||||
|
11) Verify interface names in the DEST column of tcrules.
|
||||||
|
|
||||||
Changes in 2.2.1
|
Changes in 2.2.1
|
||||||
|
|
||||||
1) Add examples to the zones and policy files.
|
1) Add examples to the zones and policy files.
|
||||||
|
@ -2379,6 +2379,7 @@ process_tc_rule()
|
|||||||
r="${r}$(dest_ip_range $dest) "
|
r="${r}$(dest_ip_range $dest) "
|
||||||
;;
|
;;
|
||||||
*)
|
*)
|
||||||
|
verify_interface $dest || fatal_error "Unknown interface $dest in rule \"$rule\""
|
||||||
r="${r}$(match_dest_dev $dest) "
|
r="${r}$(match_dest_dev $dest) "
|
||||||
;;
|
;;
|
||||||
esac
|
esac
|
||||||
|
@ -20,6 +20,10 @@ Problems corrected in version 2.2.2
|
|||||||
5) Previously, the 'install.sh' script did not update the
|
5) Previously, the 'install.sh' script did not update the
|
||||||
/usr/share/shorewall/action.* files.
|
/usr/share/shorewall/action.* files.
|
||||||
|
|
||||||
|
6) Previously, when an interface name appeared in the DEST column of
|
||||||
|
/etc/shorewall/tcrules, the name was not validated against the set
|
||||||
|
of defined interfaces and bridge ports.
|
||||||
|
|
||||||
-----------------------------------------------------------------------
|
-----------------------------------------------------------------------
|
||||||
New Features in version 2.2.2
|
New Features in version 2.2.2
|
||||||
|
|
||||||
|
@ -21,9 +21,8 @@
|
|||||||
# DROP - silently drop the packet
|
# DROP - silently drop the packet
|
||||||
# logdrop - log then drop
|
# logdrop - log then drop
|
||||||
#
|
#
|
||||||
# By default, the RETURN target in the 'rfc1918' causes 'norfc1918'
|
# By default, the RETURN target causes 'norfc1918' processing to cease for a
|
||||||
# processing to cease for a packet if the packet's source IP address matches
|
# packet if the packet's source IP address matches the rule. Thus, if you have:
|
||||||
# the rule. Thus, if you have:
|
|
||||||
#
|
#
|
||||||
# SUBNETS TARGET
|
# SUBNETS TARGET
|
||||||
# 192.168.1.0/24 RETURN
|
# 192.168.1.0/24 RETURN
|
||||||
|
@ -23,6 +23,8 @@ Changes in 2.2.2
|
|||||||
|
|
||||||
10) Implement RFC1918_STRICT
|
10) Implement RFC1918_STRICT
|
||||||
|
|
||||||
|
11) Verify interface names in the DEST column of tcrules.
|
||||||
|
|
||||||
Changes in 2.2.1
|
Changes in 2.2.1
|
||||||
|
|
||||||
1) Add examples to the zones and policy files.
|
1) Add examples to the zones and policy files.
|
||||||
|
@ -2379,6 +2379,7 @@ process_tc_rule()
|
|||||||
r="${r}$(dest_ip_range $dest) "
|
r="${r}$(dest_ip_range $dest) "
|
||||||
;;
|
;;
|
||||||
*)
|
*)
|
||||||
|
verify_interface $dest || fatal_error "Unknown interface $dest in rule \"$rule\""
|
||||||
r="${r}$(match_dest_dev $dest) "
|
r="${r}$(match_dest_dev $dest) "
|
||||||
;;
|
;;
|
||||||
esac
|
esac
|
||||||
|
@ -20,6 +20,10 @@ Problems corrected in version 2.2.2
|
|||||||
5) Previously, the 'install.sh' script did not update the
|
5) Previously, the 'install.sh' script did not update the
|
||||||
/usr/share/shorewall/action.* files.
|
/usr/share/shorewall/action.* files.
|
||||||
|
|
||||||
|
6) Previously, when an interface name appeared in the DEST column of
|
||||||
|
/etc/shorewall/tcrules, the name was not validated against the set
|
||||||
|
of defined interfaces and bridge ports.
|
||||||
|
|
||||||
-----------------------------------------------------------------------
|
-----------------------------------------------------------------------
|
||||||
New Features in version 2.2.2
|
New Features in version 2.2.2
|
||||||
|
|
||||||
|
@ -21,9 +21,8 @@
|
|||||||
# DROP - silently drop the packet
|
# DROP - silently drop the packet
|
||||||
# logdrop - log then drop
|
# logdrop - log then drop
|
||||||
#
|
#
|
||||||
# By default, the RETURN target in the 'rfc1918' causes 'norfc1918'
|
# By default, the RETURN target causes 'norfc1918' processing to cease for a
|
||||||
# processing to cease for a packet if the packet's source IP address matches
|
# packet if the packet's source IP address matches the rule. Thus, if you have:
|
||||||
# the rule. Thus, if you have:
|
|
||||||
#
|
#
|
||||||
# SUBNETS TARGET
|
# SUBNETS TARGET
|
||||||
# 192.168.1.0/24 RETURN
|
# 192.168.1.0/24 RETURN
|
||||||
|
Loading…
x
Reference in New Issue
Block a user