Announce Shorewall 2.4.2

git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@2386 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
teastep 2005-07-21 16:23:08 +00:00
parent d7f9a22d77
commit 9e6161cf9d
2 changed files with 98 additions and 47 deletions

View File

@ -19,82 +19,134 @@ Texts. A copy of the license is included in the section entitled “<span
class="quote"><a href="GnuCopyright.htm" target="_self">GNU Free class="quote"><a href="GnuCopyright.htm" target="_self">GNU Free
Documentation License</a></span>”.<br> Documentation License</a></span>”.<br>
</p> </p>
<p>2005-07-17<br> <p>2005-07-21<br>
</p> </p>
<hr style="width: 100%; height: 2px;"> <hr style="width: 100%; height: 2px;">
<a name="20050717"></a> <span style="font-weight: bold;">07/21/2005 Shorewall 2.4.2<br>
<h2><font color="#FF0000">07/17/2005 Security vulnerability in MACLIST processing</font></h2> <br>
</span>Problems Corrected:<br>
<ol>
<li>The /etc/shorewall/hosts file now includes information about
defining a zone using one or more ipsets.</li>
<li>A <a href="#20050717">vulnerability involving MACLIST_TTL &gt; 0
or MACLIST_DISPOSITION=ACCEPT</a> has been corrected.</li>
<li>It is now possible to specify !&lt;address&gt; in the SUBNET
column of /etc/shorewall/masq. Previously, it was necessary to write
0.0.0.0/0!&lt;address&gt;.</li>
<li>When &lt;network1&gt;!&lt;network2&gt; was specified in the
SUBNET column of /etc/shorewall/masq, IPSEC policies were not correctly
applied to the resulting rules. This usually resulted in IPSEC not
working through the interface specified in the INTERFACES column.<br>
<span style="font-weight: bold;"></span></li>
</ol>
New Features:<br>
<ol>
<li>A 'loose' provider option has been added. If you wish to be able
to use marking to specify the gateway used by connections originating
on the firewall itself, the specify 'loose' for each provider. It has
bee reported that 'loose' may break the effect of 'track' so beware if
you need 'track' functionality (you shouldn't be originating many
connections from your firewall to the net anyway).<br>
<br>
To use 'loose', you also need to add two entries in /etc/shorewall/masq:<br>
<pre><span style="font-family: monospace;">&nbsp;&nbsp; #INTERFACE&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SUBNET&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ADDRESS<br> $IF_ISP1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $IP_ISP2&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $IP_ISP1<br> $IF_ISP2&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $IP_ISP1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $IP_ISP2</span></pre>
where:<br>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $IF_ISP1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; is the interface to ISP 1.<br> $IF_ISP2&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; is the interface to ISP 2.<br> $IP_ISP1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; is the IP address of $IF_ISP1<br> $IP_ISP2&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; is the IP address of $IF_ISP2</pre>
</li>
<li>/sbin/shorewall now issues a warning each time that it finds that
startup is disabled.</li>
<li>A new COPY column has been added to the /etc/shorewall/providers
file. Normally, when a table name/number is given in the DUPLICATE
column, the entire table (less default routes) is copied. The COPY
column allows you to limit the routes copied to those that go through
an interface listed in COPY. For example, if you enter eth0 in
INTERFACE, "eth1,eth2" in COPY and 'main' in DUPLICATE then the new
table created will contain those routes through the interfaces eth0,
eth1 and eth2.<br>
</li>
</ol>
<span style="font-weight: bold;"></span>
<hr style="width: 100%; height: 2px;">
<h2><a name="20050717"></a><font color="#ff0000"><span
style="font-weight: bold;"></span>07/17/2005 Security vulnerability in
MACLIST processing</font></h2>
<h3>Description</h3> <h3>Description</h3>
<p> <p>
A security vulnerability has been discovered which affects all supported A security vulnerability has been discovered which affects all
stable versions of Shorewall.&nbsp; This vulnerability enables a client supported
stable versions of Shorewall.&nbsp; This vulnerability enables a client
accepted by MAC address filtering to bypass any other rule.&nbsp; If accepted by MAC address filtering to bypass any other rule.&nbsp; If
MACLIST_TTL is set to a value greater than 0 or MACLIST_DISPOSITION is set MACLIST_TTL is set to a value greater than 0 or MACLIST_DISPOSITION is
to "ACCEPT" in /etc/shorewall/shorewall.conf (default is MACLIST_TTL=0 and set
MACLIST_DISPOSITION=REJECT), and a client is positively identified through to "ACCEPT" in /etc/shorewall/shorewall.conf (default is MACLIST_TTL=0
and
MACLIST_DISPOSITION=REJECT), and a client is positively identified
through
its MAC address, it bypasses all other policies/rules in place, thus its MAC address, it bypasses all other policies/rules in place, thus
gaining access to all open services on the firewall. gaining access to all open services on the firewall.
</p> </p>
<h3>Fix</h3> <h3>Fix</h3>
<h4>Workaround</h4> <h4>Workaround</h4>
<p> <p>
For Shorewall 2.2.x or 2.4.x, set MACLIST_TTL=0 or MACLIST_DISPOSITION=REJECT For Shorewall 2.2.x or 2.4.x, set MACLIST_TTL=0 or
MACLIST_DISPOSITION=REJECT
in /etc/shorewall/shorewall.conf.&nbsp; For Shorewall 2.0.x, set in /etc/shorewall/shorewall.conf.&nbsp; For Shorewall 2.0.x, set
MACLIST_DISPOSITION=REJECT in /etc/shorewall/shorewall.conf.&nbsp; MACLIST MACLIST_DISPOSITION=REJECT in /etc/shorewall/shorewall.conf.&nbsp;
MACLIST
filtering is of limited value on Internet-connected hosts, and the filtering is of limited value on Internet-connected hosts, and the
Shorewall team recommends this approach to be used if possible. Shorewall team recommends this approach to be used if possible.
</p> </p>
<h4>Upgrade</h4> <h4>Upgrade</h4>
<p> <p>
For Shorewall 2.4.x, a fixed version of the 'firewall' script is available at: For Shorewall 2.4.x, a fixed version of the 'firewall' script is
<a href="http://shorewall.net/pub/shorewall/2.4/shorewall-2.4.1/errata/firewall">http://shorewall.net/pub/shorewall/2.4/shorewall-2.4.1/errata/firewall</a> available at:
and its mirrors, <a
<a href="http://www.shorewall.net/pub/shorewall/2.4/shorewall-2.4.1/errata/firewall">http://www.shorewall.net/pub/shorewall/2.4/shorewall-2.4.1/errata/firewall</a> href="http://shorewall.net/pub/shorewall/2.4/shorewall-2.4.1/errata/firewall">http://shorewall.net/pub/shorewall/2.4/shorewall-2.4.1/errata/firewall</a>
and its mirrors, <a
href="http://www.shorewall.net/pub/shorewall/2.4/shorewall-2.4.1/errata/firewall">http://www.shorewall.net/pub/shorewall/2.4/shorewall-2.4.1/errata/firewall</a>
and and
<a href="http://slovakia.shorewall.net/pub/shorewall/2.4/shorewall-2.4.1/errata/firewall">http://slovakia.shorewall.net/pub/shorewall/2.4/shorewall-2.4.1/errata/firewall</a>. <a
href="http://slovakia.shorewall.net/pub/shorewall/2.4/shorewall-2.4.1/errata/firewall">http://slovakia.shorewall.net/pub/shorewall/2.4/shorewall-2.4.1/errata/firewall</a>.
</p> </p>
<p> <p>
For Shorewall 2.2.x, a fixed version of the 'firewall' script is available at: For Shorewall 2.2.x, a fixed version of the 'firewall' script is
<a href="http://shorewall.net/pub/shorewall/2.2/shorewall-2.2.5/errata/firewall">http://shorewall.net/pub/shorewall/2.2/shorewall-2.2.5/errata/firewall</a> available at:
and its mirrors, <a
<a href="http://www.shorewall.net/pub/shorewall/2.2/shorewall-2.2.5/errata/firewall">http://www.shorewall.net/pub/shorewall/2.2/shorewall-2.2.5/errata/firewall</a> href="http://shorewall.net/pub/shorewall/2.2/shorewall-2.2.5/errata/firewall">http://shorewall.net/pub/shorewall/2.2/shorewall-2.2.5/errata/firewall</a>
and its mirrors, <a
href="http://www.shorewall.net/pub/shorewall/2.2/shorewall-2.2.5/errata/firewall">http://www.shorewall.net/pub/shorewall/2.2/shorewall-2.2.5/errata/firewall</a>
and and
<a href="http://slovakia.shorewall.net/pub/shorewall/2.2/shorewall-2.2.5/errata/firewall">http://slovakia.shorewall.net/pub/shorewall/2.2/shorewall-2.2.5/errata/firewall</a>. <a
href="http://slovakia.shorewall.net/pub/shorewall/2.2/shorewall-2.2.5/errata/firewall">http://slovakia.shorewall.net/pub/shorewall/2.2/shorewall-2.2.5/errata/firewall</a>.
</p> </p>
<p> <p>
For Shorewall 2.0.x, a fixed version of the 'firewall' script is available at: For Shorewall 2.0.x, a fixed version of the 'firewall' script is
available at:
<a href="http://shorewall.net/pub/shorewall/errata/2.0.17/firewall">http://shorewall.net/pub/shorewall/errata/2.0.17/firewall</a> <a href="http://shorewall.net/pub/shorewall/errata/2.0.17/firewall">http://shorewall.net/pub/shorewall/errata/2.0.17/firewall</a>
and its mirrors, and its mirrors, <a
<a href="http://www.shorewall.net/pub/shorewall/errata/2.0.17/firewall">http://www.shorewall.net/pub/shorewall/errata/2.0.17/firewall</a> href="http://www.shorewall.net/pub/shorewall/errata/2.0.17/firewall">http://www.shorewall.net/pub/shorewall/errata/2.0.17/firewall</a>
and and
<a href="http://slovakia.shorewall.net/pub/shorewall/errata/2.0.17/firewall">http://slovakia.shorewall.net/pub/shorewall/errata/2.0.17/firewall</a>. <a
href="http://slovakia.shorewall.net/pub/shorewall/errata/2.0.17/firewall">http://slovakia.shorewall.net/pub/shorewall/errata/2.0.17/firewall</a>.
</p> </p>
<p> <p>
Users of any version before 2.0.17 are urged to upgrade to a supported Users of any version before 2.0.17 are urged to upgrade to a supported
version of Shorewall (preferably 2.4.1) before using the fixed version of Shorewall (preferably 2.4.1) before using the fixed
files.&nbsp; Only the most recent version of the 2.0.x and 2.2.x files.&nbsp; Only the most recent version of the 2.0.x and 2.2.x
streams will be supported by the development team, and the 1.x branches streams will be supported by the development team, and the 1.x branches
are no longer maintained at all.&nbsp; Future releases of Shorewall will are no longer maintained at all.&nbsp; Future releases of Shorewall
will
include this fix. include this fix.
</p> </p>
<p>This information was based on <p>This information was based on
<a href="http://seclists.org/lists/fulldisclosure/2005/Jul/0409.html">Patrick <a href="http://seclists.org/lists/fulldisclosure/2005/Jul/0409.html">Patrick
Blitz's post to the Full Disclosure mailing list</a>.&nbsp; Thanks to Blitz's post to the Full Disclosure mailing list</a>.&nbsp; Thanks to
Supernaut (supernaut at ns dot sympatico dot ca) for reporting this bug. Supernaut (supernaut at ns dot sympatico dot ca) for reporting this bug.<br>
</p>
<p><span style="font-weight: bold;">Version Upgrade<br>
</span></p>
<p>The vulnerability is corrected in Shorewall 2.4.2.<br>
</p> </p>
<hr style="width: 100%; height: 2px;"><span style="font-weight: bold;">07/13/2005 <hr style="width: 100%; height: 2px;"><span style="font-weight: bold;">07/13/2005
Shorewall 2.4.1<br> Shorewall 2.4.1<br>
</span><br> </span><br>
@ -124,7 +176,6 @@ configurations, be filtered by the 'maclist' option even though the
'dhcp' option was specified. This has been corrected.<br> 'dhcp' option was specified. This has been corrected.<br>
</li> </li>
</ol> </ol>
<span style="font-weight: bold;">06/05/2005 <span style="font-weight: bold;">06/05/2005
Shorewall 2.4.0<br> Shorewall 2.4.0<br>
<br> <br>

View File

@ -33,12 +33,12 @@ to 2.x releases of Shorewall. For older versions:</p>
target="_top">here</a>. </p> target="_top">here</a>. </p>
</li> </li>
</ul> </ul>
<p>The current 2.4 Stable Release is 2.4.1 -- Here are the <a <p>The current 2.4 Stable Release is 2.4.2 -- Here are the <a
href="http://shorewall.net/pub/shorewall/2.4/shorewall-2.4.1/releasenotes.txt">release href="http://shorewall.net/pub/shorewall/2.4/shorewall-2.4.2/releasenotes.txt">release
notes</a> and here are the <a notes</a> and here are the <a
href="http://shorewall.net/pub/shorewall/2.4/shorewall-2.4.1/known_problems.txt">known href="http://shorewall.net/pub/shorewall/2.4/shorewall-2.4.2/known_problems.txt">known
problems</a> and <a problems</a> and <a
href="http://shorewall.net/pub/shorewall/2.4/shorewall-2.4.1/errata/">updates</a>.<br> href="http://shorewall.net/pub/shorewall/2.4/shorewall-2.4.2/errata/">updates</a>.<br>
</p> </p>
<p><a <p><a
href="http://lists.shorewall.net/pipermail/shorewall-announce/2004-December/000451.html"><span href="http://lists.shorewall.net/pipermail/shorewall-announce/2004-December/000451.html"><span
@ -53,7 +53,7 @@ Foundation; with no Invariant Sections, with no Front-Cover, and with
no Back-Cover Texts. A copy of the license is included in the section no Back-Cover Texts. A copy of the license is included in the section
entitled “<a href="GnuCopyright.htm" target="_self">GNU entitled “<a href="GnuCopyright.htm" target="_self">GNU
Free Documentation License</a>”.</p> Free Documentation License</a>”.</p>
<p>2005-07-16</p> <p>2005-07-21</p>
<hr style="width: 100%; height: 2px;"> <hr style="width: 100%; height: 2px;">
<h3>Table of Contents</h3> <h3>Table of Contents</h3>
<p style="margin-left: 0.42in; margin-bottom: 0in;"><a href="#Intro">Introduction <p style="margin-left: 0.42in; margin-bottom: 0in;"><a href="#Intro">Introduction