mirror of
https://gitlab.com/shorewall/code.git
synced 2025-01-10 23:58:14 +01:00
Update web site for 2.4.0
git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@2226 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
parent
aef84305b4
commit
a3ad40f97c
@ -19,9 +19,499 @@ Texts. A copy of the license is included in the section entitled “<span
|
||||
class="quote"><a href="GnuCopyright.htm" target="_self">GNU Free
|
||||
Documentation License</a></span>”.<br>
|
||||
</p>
|
||||
<p>2005-05-26<br>
|
||||
<p>2005-06-05<br>
|
||||
</p>
|
||||
<hr style="width: 100%; height: 2px;"><span style="font-weight: bold;">05/20/2005
|
||||
<hr style="width: 100%; height: 2px;"><span style="font-weight: bold;">06/05/2005
|
||||
Shorewall 2.4.0<br>
|
||||
<br>
|
||||
Note:</span> Because of the short time that has elapsed since the
|
||||
release of Shorewall 2.2.0, Shorewall 2.0 will be supported until 1
|
||||
December 2005 or until the release of Shorewall 2.6.0, whichever occurs
|
||||
first.<br>
|
||||
<br>
|
||||
New Features:<br>
|
||||
<ol>
|
||||
<li>Shorewall 2.4.0 includes support for multiple internet interfaces
|
||||
to different ISPs.<br>
|
||||
<br>
|
||||
The file /etc/shorewall/providers may be used to define the different
|
||||
providers. It can actually be used to define alternate routing tables
|
||||
so uses like transparent proxy can use the file as well.<br>
|
||||
<br>
|
||||
Columns are:<br>
|
||||
<br>
|
||||
<span style="font-family: monospace;">
|
||||
NAME
|
||||
The provider name.</span><br style="font-family: monospace;">
|
||||
<br style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
NUMBER The
|
||||
provider number -- a number between 1 and 15</span><br
|
||||
style="font-family: monospace;">
|
||||
<br style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
MARK
|
||||
A FWMARK value used in your /etc/shorewall/tcrules file to direct
|
||||
packets for this provider.</span><br style="font-family: monospace;">
|
||||
<br style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
DUPLICATE The name of an existing
|
||||
table to duplicate. May</span><span style="font-family: monospace;"> be
|
||||
'main' or the name of a previous provider.</span><br
|
||||
style="font-family: monospace;">
|
||||
<br style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
INTERFACE The name of the network
|
||||
interface to the</span><span style="font-family: monospace;"> provider.
|
||||
Must be listed in</span><span style="font-family: monospace;">
|
||||
/etc/shorewall/interfaces.</span><br style="font-family: monospace;">
|
||||
<br style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
GATEWAY The IP address
|
||||
of the provider's gateway router.</span><span
|
||||
style="font-family: monospace;"> If you enter "detect" here then
|
||||
Shorewall will</span><span style="font-family: monospace;"> attempt to
|
||||
determine the gateway IP address</span><span
|
||||
style="font-family: monospace;"> automatically.</span><br
|
||||
style="font-family: monospace;">
|
||||
<br style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
OPTIONS A
|
||||
comma-separated list selected from the</span><span
|
||||
style="font-family: monospace;"> following:</span><br
|
||||
style="font-family: monospace;">
|
||||
<br style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
track If specified, connections FROM this interface are</span><span
|
||||
style="font-family: monospace;"> to be tracked so that responses may
|
||||
be routed</span><span style="font-family: monospace;"> back out this
|
||||
same interface.</span><br style="font-family: monospace;">
|
||||
<br style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
You want specify 'track' if internet hosts will be</span><span
|
||||
style="font-family: monospace;"> connecting to local servers through
|
||||
this</span><span style="font-family: monospace;"> provider.</span><br
|
||||
style="font-family: monospace;">
|
||||
<br style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
Because of limitations in the 'ip' utility and</span><span
|
||||
style="font-family: monospace;"> policy routing, you may not use the
|
||||
SAVE or</span><span style="font-family: monospace;"> RESTORE tcrules
|
||||
options or use connection</span><span style="font-family: monospace;">
|
||||
marking on any traffic to or from this</span><br
|
||||
style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
interface. For traffic control purposes, you</span><span
|
||||
style="font-family: monospace;"> must mark packets in the FORWARD
|
||||
chain (or</span><span style="font-family: monospace;"> better yet, use
|
||||
the CLASSIFY target).</span><br style="font-family: monospace;">
|
||||
<br style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
balance The providers that have 'balance' specified will</span><span
|
||||
style="font-family: monospace;"> get outbound traffic load-balanced
|
||||
among them. By</span><span style="font-family: monospace;"> default,
|
||||
all interfaces with 'balance' specified</span><span
|
||||
style="font-family: monospace;"> will have the same
|
||||
weight <br>
|
||||
|
||||
(1). You can change the</span><span style="font-family: monospace;">
|
||||
weight of the route out of the interface by</span><span
|
||||
style="font-family: monospace;"> specifiying balance=<weight>
|
||||
where <weight> is</span><span style="font-family: monospace;">
|
||||
the desired route weight.</span><br style="font-family: monospace;">
|
||||
<br style="font-family: monospace;">
|
||||
Example: You run squid in
|
||||
your DMZ on IP address 192.168.2.99. Your DMZ interface is eth2<br>
|
||||
<br style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
#NAME NUMBER MARK DUPLICATE INTERFACE
|
||||
GATEWAY OPTIONS</span><br
|
||||
style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
Squid 1
|
||||
1
|
||||
-
|
||||
eth2 192.168.2.99 -</span><br>
|
||||
<br>
|
||||
Use of this feature requires that your kernel and iptabls
|
||||
support CONNMARK target and conntrack match support. It does NOT
|
||||
require the ROUTE target extension.<br>
|
||||
<br>
|
||||
WARNING: The current version of iptables (1.3.1) is broken
|
||||
with respect to CONNMARK and iptables-save/iptables-restore. This means
|
||||
that if you configure multiple ISPs, "shorewall restore" may<br>
|
||||
fail. You must patch your iptables using the patch at <a
|
||||
href="http://shorewall.net/pub/shorewall/contrib/iptables/CONNMARK.diff">http://shorewall.net/pub/shorewall/contrib/iptables/CONNMARK.diff</a>.<br>
|
||||
<br>
|
||||
</li>
|
||||
<li>Shorewall 2.3.0 supports the 'cmd-owner' option of the owner
|
||||
match facility in Netfilter. Like all owner match options, 'cmd-owner'
|
||||
may only be applied to traffic that originates on the firewall.<br>
|
||||
<br>
|
||||
The syntax of the USER/GROUP column in the following files has been
|
||||
extended:<br>
|
||||
<br>
|
||||
/etc/shorewall/accounting<br>
|
||||
/etc/shorewall/rules<br>
|
||||
/etc/shorewall/tcrules<br>
|
||||
|
||||
/usr/share/shorewall/action.template<br>
|
||||
<br>
|
||||
To specify a command, prefix the command name with "+".<br>
|
||||
<br>
|
||||
Examples:<br>
|
||||
<br>
|
||||
<span style="font-family: monospace;">
|
||||
+mozilla-bin
|
||||
#The program is named "mozilla-bin"</span><br
|
||||
style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
joe+mozilla-bin #The
|
||||
program is named "mozilla-bin" and</span><br
|
||||
style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
#is being run by user "joe"</span><br style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
joe:users+mozilla-bin #The program is named "mozilla-bin"
|
||||
and</span><br style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
#is being run by user "joe" with</span><br
|
||||
style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
#effective group "users".</span><br style="font-family: monospace;">
|
||||
<br>
|
||||
Note that this is not a particularly robust feature and I
|
||||
would never advertise it as a "Personal Firewall" equivalent. Using
|
||||
symbolic links, it's easy to alias command names to be anything you
|
||||
want.<br>
|
||||
<br>
|
||||
</li>
|
||||
<li>Support has been added for ipsets (see <a
|
||||
href="http://people.netfilter.org/kadlec/ipset/">http://people.netfilter.org/kadlec/ipset/</a>).<br>
|
||||
<br>
|
||||
In most places where a host or network address may be used, you may
|
||||
also use the name of an ipset prefaced by "+".<br>
|
||||
<br>
|
||||
Example: "+Mirrors"<br>
|
||||
<br>
|
||||
The name of the set may be optionally followed by:<br>
|
||||
<br>
|
||||
a) a number from 1 to 6 enclosed in square brackets ([]) -- this number
|
||||
indicates the maximum number of ipset binding levels that are to be
|
||||
matched. Depending on the context where the ipset name is used, either
|
||||
all "src" or all "dst" matches will be used.<br>
|
||||
<br>
|
||||
Example: "+Mirrors[4]"<br>
|
||||
<br>
|
||||
b) a series of "src" and "dst" options separated by commas and inclosed
|
||||
in square brackets ([]). These will be passed directly to iptables in
|
||||
the generated --set clause. See the ipset documentation for details.<br>
|
||||
<br>
|
||||
Example:
|
||||
"+Mirrors[src,dst,src]"<br>
|
||||
<br>
|
||||
Note that "+Mirrors[4]" used in the SOURCE column of the rules file is
|
||||
equivalent to "+Mirrors[src,src,src,src]".<br>
|
||||
<br>
|
||||
To generate a negative match, prefix the "+" with "!" as in "!+Mirrors".<br>
|
||||
<br>
|
||||
Example 1: Blacklist all hosts in an ipset named "blacklist"<br>
|
||||
<br>
|
||||
|
||||
/etc/shorewall/blacklist<br>
|
||||
<br style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
#ADDRESS/SUBNET
|
||||
PROTOCOL PORT</span><br
|
||||
style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
+blacklist</span><br style="font-family: monospace;">
|
||||
<br>
|
||||
Example 2: Allow SSH from all hosts in an ipset named "sshok:<br>
|
||||
<br>
|
||||
|
||||
/etc/shorewall/rules<br>
|
||||
<br style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
#ACTION
|
||||
SOURCE DEST
|
||||
PROTO DEST PORT(S)</span><br
|
||||
style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
ACCEPT
|
||||
+sshok
|
||||
fw
|
||||
tcp 22</span><br
|
||||
style="font-family: monospace;">
|
||||
<br>
|
||||
Shorewall can automatically capture the contents of your ipsets for
|
||||
you. If you specify SAVE_IPSETS=Yes in /etc/shorewall/shorewall.conf
|
||||
then "shorewall save" will save the contents of your ipsets. The file
|
||||
where the sets are saved is formed by taking the name where the
|
||||
Shorewall configuration is stored and appending "-ipsets". So if you
|
||||
enter the command "shorewall save standard" then your Shorewall
|
||||
configuration will be saved in var/lib/shorewall/standard and your
|
||||
ipset contents will be saved in /var/lib/shorewall/standard-ipsets.
|
||||
Assuming the default RESTOREFILE setting, if you just enter "shorewall
|
||||
save" then your Shorewall configuration will be saved in
|
||||
/var/lib/shorewall/restore and your ipset contents will be saved in
|
||||
/var/lib/shorewall/restore-ipsets.<br>
|
||||
<br>
|
||||
Regardless of the setting of SAVE_IPSETS, the "shorewall -f start" and
|
||||
"shorewall restore" commands will restore the ipset contents
|
||||
corresponding to the Shorewall configuration restored provided that the
|
||||
saved Shorewall configuration specified exists.<br>
|
||||
<br>
|
||||
For example, "shorewall restore standard" would restore the ipset
|
||||
contents from /var/lib/shorewall/standard-ipsets provided that
|
||||
/var/lib/shorewall/standard exists and is executable and that
|
||||
/var/lib/shorewall/standard-ipsets exists and is executable.<br>
|
||||
<br>
|
||||
Also regardless of the setting of SAVE_IPSETS, the "shorewall forget"
|
||||
command will purge the saved ipset information (if any) associated with
|
||||
the saved shorewall configuration being removed.<br>
|
||||
<br>
|
||||
You can also associate ipset contents with Shorewall configuration
|
||||
directories using the following command:<br>
|
||||
<br>
|
||||
ipset -S > <config
|
||||
directory>/ipsets<br>
|
||||
<br>
|
||||
Example:<br>
|
||||
<br>
|
||||
ipset -S > /etc/shorewall/ipsets<br>
|
||||
<br>
|
||||
When you start or restart Shorewall (including using the 'try' command)
|
||||
from the configuration directory, your ipsets will be configured from
|
||||
the saved ipsets file. Once again, this behavior is independent of the
|
||||
setting of SAVE_IPSETS.<br>
|
||||
<br>
|
||||
Ipsets are well suited for large blacklists. You can maintain your
|
||||
blacklist using the 'ipset' utility without ever having to restart or
|
||||
refresh Shorewall. If you use the SAVE_IPSETS=Yes feature just be sure
|
||||
to "shorewall save" after altering the blacklist ipset(s).<br>
|
||||
<br>
|
||||
Example /etc/shorewall/blacklist:<br>
|
||||
<br>
|
||||
<span style="font-family: monospace;">
|
||||
#ADDRESS/SUBNET
|
||||
PROTOCOL PORT</span><br
|
||||
style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
+Blacklist[src,dst]</span><br style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
+Blacklistnets[src,dst]</span><br style="font-family: monospace;">
|
||||
<br>
|
||||
Create the blacklist ipsets using:<br>
|
||||
<br>
|
||||
ipset -N
|
||||
Blacklist iphash<br>
|
||||
ipset -N
|
||||
Blacklistnets nethash<br>
|
||||
<br>
|
||||
Add entries<br>
|
||||
<br>
|
||||
ipset -A Blacklist 206.124.146.177<br>
|
||||
ipset -A Blacklistnets
|
||||
206.124.146.0/24<br>
|
||||
<br>
|
||||
To allow entries for individual ports<br>
|
||||
<br>
|
||||
ipset -N SMTP portmap --from 1
|
||||
--to 31<br>
|
||||
ipset -A SMTP 25<br>
|
||||
<br>
|
||||
ipset -A Blacklist 206.124.146.177<br>
|
||||
ipset -B Blacklist 206.124.146.177
|
||||
-b SMTP<br>
|
||||
<br>
|
||||
Now only port 25 will be blocked from 206.124.146.177.<br>
|
||||
<br>
|
||||
</li>
|
||||
<li>Shorewall 2.4.0 can now configure routing if your kernel and
|
||||
iptables support the ROUTE target extension. This extension is
|
||||
available in Patch-O-Matic-ng. This feature is *EXPERIMENTAL* since the
|
||||
Netfilter team have no intention of ever releasing the ROUTE target
|
||||
extension to kernel.org.<br>
|
||||
<br>
|
||||
Routing is configured using the /etc/shorewall/routes file. Columns in
|
||||
the file are as follows:<br>
|
||||
<br>
|
||||
<span style="font-family: monospace;">
|
||||
SOURCE
|
||||
Source of the packet. May be any of the</span><span
|
||||
style="font-family: monospace;"> following:</span><br
|
||||
style="font-family: monospace;">
|
||||
<br style="font-family: monospace;">
|
||||
<br style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
- A host or network address</span><br style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
- A network interface name.</span><br style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
- The name of an ipset prefaced with "+"</span><br
|
||||
style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
- $FW (for packets originating on the firewall)</span><br
|
||||
style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
- A MAC address in Shorewall format</span><br
|
||||
style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
- A range of IP addresses (assuming that your</span><span
|
||||
style="font-family: monospace;"> kernel and iptables support range
|
||||
match)</span><br style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
- A network interface name followed by ":"</span><span
|
||||
style="font-family: monospace;"> and an address or address range.</span><br
|
||||
style="font-family: monospace;">
|
||||
<br style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
DEST
|
||||
Destination of the packet. May be any of the</span><span
|
||||
style="font-family: monospace;"> following:</span><br
|
||||
style="font-family: monospace;">
|
||||
<br style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
- A host or network address</span><br style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
- A network interface name (determined from</span><br
|
||||
style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
routing table(s))</span><br style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
- The name of an ipset prefaced with "+"</span><br
|
||||
style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
- A network interface name followed by ":"</span><br
|
||||
style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
and an address or address range.</span><br
|
||||
style="font-family: monospace;">
|
||||
<br style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
PROTO
|
||||
Protocol - Must be "tcp", "udp", "icmp",</span><span
|
||||
style="font-family: monospace;"> "ipp2p", a number, or "all". "ipp2p"
|
||||
requires</span><span style="font-family: monospace;"> ipp2p match
|
||||
support in your kernel and</span><span style="font-family: monospace;">
|
||||
iptables.</span><br style="font-family: monospace;">
|
||||
<br style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
PORT(S) Destination
|
||||
Ports. A comma-separated list of</span><span
|
||||
style="font-family: monospace;"> Port names (from /etc/services), port
|
||||
numbers</span><span style="font-family: monospace;"> or port ranges; if
|
||||
the protocol is "icmp", this</span><span style="font-family: monospace;">
|
||||
column is interpreted as the destination</span><span
|
||||
style="font-family: monospace;"> icmp-type(s).</span><br
|
||||
style="font-family: monospace;">
|
||||
<br style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
If the protocol is ipp2p, this column is</span><span
|
||||
style="font-family: monospace;"> interpreted as an ipp2p option
|
||||
without the</span><span style="font-family: monospace;"> leading "--"
|
||||
(example "bit" for bit-torrent).</span><span
|
||||
style="font-family: monospace;"> If no PORT is given, "ipp2p" is
|
||||
assumed.</span><br style="font-family: monospace;">
|
||||
<br style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
This column is ignored if PROTOCOL = all but</span><span
|
||||
style="font-family: monospace;"> must be entered if any of the
|
||||
following field</span><span style="font-family: monospace;"> is
|
||||
supplied. In that case, it is suggested that</span><span
|
||||
style="font-family: monospace;"> this field contain "-"</span><br
|
||||
style="font-family: monospace;">
|
||||
<br style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
SOURCE PORT(S) (Optional) Source port(s). If omitted,</span><span
|
||||
style="font-family: monospace;"> any source port is acceptable.
|
||||
Specified as a</span><span style="font-family: monospace;">
|
||||
comma-separated list of port names, port</span><span
|
||||
style="font-family: monospace;"> numbers or port ranges.</span><br
|
||||
style="font-family: monospace;">
|
||||
<br style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
TEST
|
||||
Defines a test on the existing packet or</span><span
|
||||
style="font-family: monospace;"> connection mark.</span><br
|
||||
style="font-family: monospace;">
|
||||
<br style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
The rule will match only if the test returns</span><span
|
||||
style="font-family: monospace;"> true. Tests have the format</span><span
|
||||
style="font-family: monospace;"> [!]<value>[/<mask>][:C]</span><br
|
||||
style="font-family: monospace;">
|
||||
<br style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
Where:</span><br style="font-family: monospace;">
|
||||
<br style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
! Inverts the test (not equal)</span><span
|
||||
style="font-family: monospace;"> <value> Value of the packet or</span><span
|
||||
style="font-family: monospace;"> connection mark.</span><br
|
||||
style="font-family: monospace;">
|
||||
<br style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
<mask> A mask to be applied to the</span><span
|
||||
style="font-family: monospace;"> mark before testing</span><br
|
||||
style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
:C Designates a connection</span><span
|
||||
style="font-family: monospace;"> mark. If omitted, the packet</span><span
|
||||
style="font-family: monospace;"> mark's value is tested.</span><br
|
||||
style="font-family: monospace;">
|
||||
<br style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
INTERFACE The interface that the
|
||||
packet is to be routed</span><span style="font-family: monospace;"> out
|
||||
of. If you do not specify this field then</span><span
|
||||
style="font-family: monospace;"> you must place "-" in this column and
|
||||
enter an</span><span style="font-family: monospace;"> IP address in the
|
||||
GATEWAY column.</span><br style="font-family: monospace;">
|
||||
<br style="font-family: monospace;">
|
||||
<span style="font-family: monospace;">
|
||||
GATEWAY The gateway
|
||||
that the packet is to be forewarded</span><span
|
||||
style="font-family: monospace;"> through.</span><br
|
||||
style="font-family: monospace;">
|
||||
<br style="font-family: monospace;">
|
||||
</li>
|
||||
<li>Normally when Shorewall is stopped, starting or restarting then
|
||||
connections are allowed from hosts listed in
|
||||
/etc/shorewall/routestopped to the firewall and to other hosts listed
|
||||
in /etc/shorewall/routestopped.<br>
|
||||
<br>
|
||||
A new 'source' option is added for entries in that file which will
|
||||
cause Shorewall to allow traffic from the host listed in the entry to
|
||||
ANY other host. When 'source' is specified in an entry, it is
|
||||
unnecessary to also specify 'routeback'.<br>
|
||||
<br>
|
||||
Similarly, a new 'dest' option is added which will cause Shorewall to
|
||||
allow traffic to the host listed in the entry from ANY other host. When
|
||||
'source' is specified in an entry, it is unnecessary to also specify
|
||||
'routeback'.<br>
|
||||
<br>
|
||||
</li>
|
||||
<li>This change was implemented by Lorenzo Martignoni. It provides
|
||||
two new commands: "safe-start" and "safe-restart".<br>
|
||||
<br>
|
||||
<span style="font-weight: bold;">safe-start</span> starts Shorewall
|
||||
then prompts you to ask you if everything looks ok. If you answer "no"
|
||||
or if you don't answer within 60 seconds, a "shorewall clear" is
|
||||
executed.<br>
|
||||
<br>
|
||||
<span style="font-weight: bold;">safe-restart</span> saves your
|
||||
current configuration to /var/lib/shorewall/safe-restart then issues a
|
||||
"shorewall restart"; It then prompts you to ask if you if you want to
|
||||
accept the new configuration. If you answer "no" or if you don't answer
|
||||
within 60 seconds, the configuration is restored to its prior state.<br>
|
||||
<br>
|
||||
These new commands require either that your /bin/sh supports the "-t"
|
||||
option to the 'read' command or that you have /bin/bash installed.<br>
|
||||
</li>
|
||||
</ol>
|
||||
<span style="font-weight: bold;">05/20/2005
|
||||
Shorewall CVS Repository has Moved to Sourceforge<br>
|
||||
<br>
|
||||
</span>The CVS repository may now be accessed at <a target="_top"
|
||||
|
@ -12,8 +12,15 @@
|
||||
<h1><span style="font-weight: bold;"></span>Shorewall 2.x</h1>
|
||||
<h2><a
|
||||
href="http://lists.shorewall.net/pipermail/shorewall-users/2005-May/018605.html">A
|
||||
Note About the Future of Shorewall from Tom Eastep</a><br>
|
||||
Note About the Future of Shorewall from Tom Eastep</a></h2>
|
||||
<h2>A Note of Thanks<br>
|
||||
</h2>
|
||||
I would like to thank each and every one of you who have written to
|
||||
offer your best wishes regarding my retirement from Shorewall. There
|
||||
have been just too many posts to try to answer individually but I want
|
||||
you to know that I appreciate your having taking the time to write.<br>
|
||||
<br>
|
||||
-Tom<br>
|
||||
<hr style="width: 100%; height: 2px;">
|
||||
<p>The information on this site applies only
|
||||
to 2.x releases of Shorewall. For older versions:</p>
|
||||
@ -31,19 +38,12 @@ to 2.x releases of Shorewall. For older versions:</p>
|
||||
target="_top">here</a>. </p>
|
||||
</li>
|
||||
</ul>
|
||||
<p>The current 2.2 Stable Release is 2.2.5 -- Here are the <a
|
||||
href="http://shorewall.net/pub/shorewall/2.2/shorewall-2.2.5/releasenotes.txt">release
|
||||
<p>The current 2.4 Stable Release is 2.4.0 -- Here are the <a
|
||||
href="http://shorewall.net/pub/shorewall/2.4/shorewall-2.4.0/releasenotes.txt">release
|
||||
notes</a> and here are the <a
|
||||
href="http://shorewall.net/pub/shorewall/2.2/shorewall-2.2.5/known_problems.txt">known
|
||||
href="http://shorewall.net/pub/shorewall/2.4/shorewall-2.4.0/known_problems.txt">known
|
||||
problems</a> and <a
|
||||
href="http://shorewall.net/pub/shorewall/2.2/shorewall-2.2.5/errata/">updates</a>.<br>
|
||||
</p>
|
||||
<p>The current 2.3 Development Release is 2.4.0-RC2 -- Here are the <a
|
||||
href="http://shorewall.net/pub/shorewall/2.4/shorewall-2.4.0-RC2/releasenotes.txt">release
|
||||
notes</a> and here are the <a
|
||||
href="http://shorewall.net/pub/shorewall/2.4/shorewall-2.4.0-RC2/known_problems.txt">known
|
||||
problems</a> and <a
|
||||
href="http://shorewall.net/pub/shorewall/2.4/shorewall-2.4.0-RC2/errata/">updates</a>.
|
||||
href="http://shorewall.net/pub/shorewall/2.4/shorewall-2.4.0/errata/">updates</a>.<br>
|
||||
</p>
|
||||
<p><a
|
||||
href="http://lists.shorewall.net/pipermail/shorewall-announce/2004-December/000451.html"><span
|
||||
@ -58,7 +58,7 @@ Foundation; with no Invariant Sections, with no Front-Cover, and with
|
||||
no Back-Cover Texts. A copy of the license is included in the section
|
||||
entitled “<a href="GnuCopyright.htm" target="_self">GNU
|
||||
Free Documentation License</a>”.</p>
|
||||
<p>2005-05-30</p>
|
||||
<p>2005-06-05</p>
|
||||
<hr style="width: 100%; height: 2px;">
|
||||
<h3>Table of Contents</h3>
|
||||
<p style="margin-left: 0.42in; margin-bottom: 0in;"><a href="#Intro">Introduction
|
||||
|
Loading…
Reference in New Issue
Block a user