diff --git a/STABLE/documentation/FAQ.htm b/STABLE/documentation/FAQ.htm index cdc341c7b..0b8e1ab08 100644 --- a/STABLE/documentation/FAQ.htm +++ b/STABLE/documentation/FAQ.htm @@ -3,677 +3,678 @@ - + - + - + - + Shorewall FAQ - + - + - - - + + - + + - - + +
+
- +

Shorewall FAQs

-
- +

1. I want to forward UDP - port 7777 to my my personal PC with IP address 192.168.1.5. - I've looked everywhere and can't find how to do it.

+ port 7777 to my my personal PC with IP address 192.168.1.5. + I've looked everywhere and can't find how to do it.

- +

1a. Ok -- I followed those instructions - but it doesn't work.
-

+ but it doesn't work.
+

- +

1b. I'm still having problems with - port forwarding

- + port forwarding

+

2. I port forward www requests - to www.mydomain.com (IP 130.151.100.69) to system 192.168.1.5 - in my local network. External clients can browse http://www.mydomain.com - but internal clients can't.

+ to www.mydomain.com (IP 130.151.100.69) to system 192.168.1.5 + in my local network. External clients can browse +http://www.mydomain.com but internal clients can't.

- +

2a. I have a zone "Z" with an RFC1918 - subnet and I use static NAT to assign non-RFC1918 - addresses to hosts in Z. Hosts in Z cannot communicate with - each other using their external (non-RFC1918 addresses) so -they can't access each other using their DNS names.

+ subnet and I use static NAT to assign non-RFC1918 + addresses to hosts in Z. Hosts in Z cannot communicate +with each other using their external (non-RFC1918 addresses) +so they can't access each other using their DNS names.

- +

3. I want to use Netmeeting - or MSN Instant Messenger with Shorewall. What + or MSN Instant Messenger with Shorewall. What do I do?

- +

4. I just used an online port scanner - to check my firewall and it shows some ports as 'closed' - rather than 'blocked'. Why?

+ to check my firewall and it shows some ports as 'closed' + rather than 'blocked'. Why?

- +

4a. I just ran an nmap UDP scan - of my firewall and it showed 100s of ports as open!!!!

+ of my firewall and it showed 100s of ports as open!!!!

- +

5. I've installed Shorewall and now - I can't ping through the firewall

+ I can't ping through the firewall

- +

6. Where are the log messages - written and how do I change the destination?

+ written and how do I change the destination?

- +

6a. Are there any log parsers - that work with Shorewall?

- + that work with Shorewall?

+

6b. DROP messages on port 10619 are flooding the logs with their connect - requests. Can i exclude these error messages for this port temporarily -from logging in Shorewall?
-

- + requests. Can i exclude these error messages for this port temporarily + from logging in Shorewall?
+

+

6c. All day long I get a steady flow - of these DROP messages from port 53 to some high numbered port.  - They get dropped, but what the heck are they?
-

- + of these DROP messages from port 53 to some high numbered port.  + They get dropped, but what the heck are they?
+

+

6d. Why is the MAC address -in Shorewall log messages so long? I thought MAC addresses were only -6 bytes in length.
-

- + in Shorewall log messages so long? I thought MAC addresses were only + 6 bytes in length.
+

+

7. When I stop Shorewall using 'shorewall stop', I can't connect to anything. Why doesn't that command - work?

+ work?

- +

8. When I try to start Shorewall - on RedHat I get messages about insmod failing -- what's - wrong?

+ on RedHat I get messages about insmod failing -- +what's wrong?

- +

9. Why can't Shorewall detect - my interfaces properly?

+ my interfaces properly?

- +

10. What distributions does - it work with?

+ it work with?

- +

11. What features does it support?

- +

12. Is there a GUI?

- +

13. Why do you call it "Shorewall"?

- +

14. I'm connected via a cable modem - and it has an internel web server that allows me to configure/monitor - it but as expected if I enable rfc1918 blocking -for my eth0 interface, it also blocks the cable modems - web server.

+ and it has an internel web server that allows me to +configure/monitor it but as expected if I enable rfc1918 +blocking for my eth0 interface, it also blocks the cable +modems web server.

- +

14a. Even though it assigns public - IP addresses, my ISP's DHCP server has an RFC 1918 address. - If I enable RFC 1918 filtering on my external interface, + IP addresses, my ISP's DHCP server has an RFC 1918 address. + If I enable RFC 1918 filtering on my external interface, my DHCP client cannot renew its lease.

- +

15. My local systems can't see - out to the net

+ out to the net

- +

16. Shorewall is writing log messages - all over my console making it unusable!
-

- 17. making it unusable!
+

+ 17. How do I find out why this traffic is getting logged?
-
- 18. Is there any way - to use aliased ip addresses with Shorewall, and maintain - separate rulesets for different IPs?
-
- 19. I have added entries - to /etc/shorewall/tcrules but they don't seem to do - anything. Why?
-
- 20. I have just set up - a server. Do I have to change Shorewall to allow access to my -server from the internet?
+
+ 18.
Is there any +way to use aliased ip addresses with Shorewall, and +maintain separate rulesets for different IPs?
+
+ 19. I have added entries + to /etc/shorewall/tcrules but they don't seem to do + anything. Why?
+
+ 20. I have just set up + a server. Do I have to change Shorewall to allow access to my + server from the internet?
+
+
21. I see these strange + log entries occasionally; what are they?
+

+ 22. I have some iptables commands + that I want to run when Shorewall starts. Which file do +I put them in?

-
21. I see these strange -log entries occasionally; what are they?
-

- 22. I have some iptables commands - that I want to run when Shorewall starts. Which file do I - put them in?
-
- 23. Why do you use such ugly fonts - on your web site?
-
- 24. How can I allow conections to - let's say the ssh port only from specific IP Addresses on the + 23. Why do you use such ugly fonts + on your web site?
+
+ 24. How can I allow conections +to let's say the ssh port only from specific IP Addresses on the internet?
-
-25. How to I tell which version of Shorewall -I am running?
-
- -
+
+ 25. How to I tell which version of Shorewall + I am running?
+
+ +

1. I want to forward UDP port 7777 to - my my personal PC with IP address 192.168.1.5. I've looked - everywhere and can't find how to do it.

+ my my personal PC with IP address 192.168.1.5. I've looked + everywhere and can't find how to do it. - +

Answer: The first example in the rules file documentation shows how to - do port forwarding under Shorewall. The format of a port-forwarding - rule to a local system is as follows:

+ do port forwarding under Shorewall. The format of a port-forwarding + rule to a local system is as follows:

- +
- + - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + - + - +
ACTIONSOURCEDESTINATIONPROTOCOLPORTSOURCE PORTORIG. DEST.
DNATnetloc:<local IP address>[:<local - port>]<protocol><port #>
-

-
ACTIONSOURCEDESTINATIONPROTOCOLPORTSOURCE PORTORIG. DEST.
DNATnetloc:<local IP address>[:<local + port>]<protocol><port #>
+

+
-
+ - +

So to forward UDP port 7777 to internal system 192.168.1.5, - the rule is:

+ the rule is:

- +
- + - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + - + - +
ACTIONSOURCEDESTINATIONPROTOCOLPORTSOURCE PORTORIG. DEST.
DNATnetloc:192.168.1.5udp7777
-

-
ACTIONSOURCEDESTINATIONPROTOCOLPORTSOURCE PORTORIG. DEST.
DNATnetloc:192.168.1.5udp7777
+

+
-
+ - +
If - you want to forward requests directed to a particular address ( <external - IP> ) on your firewall to an internal system:
+ you want to forward requests directed to a particular address ( <external + IP> ) on your firewall to an internal system: - +
- + - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + - + - +
ACTIONSOURCEDESTINATIONPROTOCOLPORTSOURCE PORTORIG. DEST.
DNATnetloc:<local IP address>[:<local - port>]<protocol><port #>-<external IP>
ACTIONSOURCEDESTINATIONPROTOCOLPORTSOURCE PORTORIG. DEST.
DNATnetloc:<local IP address>[:<local + port>]<protocol><port #>-<external IP>
-
+ - Finally, if you need to forward a range of ports, in the PORT column specify -the range as low-port:high-port.
- + Finally, if you need to forward a range of ports, in the PORT column +specify the range as low-port:high-port.
+

1a. Ok -- I followed those instructions - but it doesn't work

+ but it doesn't work - +

Answer: That is usually the result of one of two things:

- + - +

1b. I'm still having problems with port - forwarding

- Answer: To further diagnose this problem:
- + forwarding + Answer: To further diagnose this problem:
+ - +

2. I port forward www requests to www.mydomain.com - (IP 130.151.100.69) to system 192.168.1.5 in my local + (IP 130.151.100.69) to system 192.168.1.5 in my local network. External clients can browse http://www.mydomain.com but internal clients can't.

- +

Answer: I have two objections to this setup.

- + - +

If you insist on an IP solution to the accessibility problem - rather than a DNS solution, then assuming that your external - interface is eth0 and your internal interface is eth1 -and that eth1 has IP address 192.168.1.254 with subnet 192.168.1.0/24, - do the following:

+ rather than a DNS solution, then assuming that your +external interface is eth0 and your internal interface +is eth1 and that eth1 has IP address 192.168.1.254 with subnet +192.168.1.0/24, do the following:

- +

a) In /etc/shorewall/interfaces, specify "multi" as an option - for eth1 (No longer required as of Shorewall version + for eth1 (No longer required as of Shorewall version 1.3.9).

- -
+ +

b) In /etc/shorewall/rules, add:

-
+
- -
+ +
- + - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + - + - +
ACTIONSOURCEDESTINATIONPROTOCOLPORTSOURCE PORTORIG. DEST.
DNATloc:192.168.1.0/24loc:192.168.1.5tcpwww-130.151.100.69:192.168.1.254
ACTIONSOURCEDESTINATIONPROTOCOLPORTSOURCE PORTORIG. DEST.
DNATloc:192.168.1.0/24loc:192.168.1.5tcpwww-130.151.100.69:192.168.1.254
-
-
+ +
- -
+ +

That rule only works of course if you have a static external - IP address. If you have a dynamic IP address and are -running Shorewall 1.3.4 or later then include this in /etc/shorewall/params:

-
+ IP address. If you have a dynamic IP address and are + running Shorewall 1.3.4 or later then include this in /etc/shorewall/params:

+
- -
+ +
     ETH0_IP=`find_interface_address eth0`
-
+
- -
+ +

and make your DNAT rule:

-
+
- -
+ +
- + - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + - + - +
ACTIONSOURCEDESTINATIONPROTOCOLPORTSOURCE PORTORIG. DEST.
DNATloc:192.168.1.0/24loc:192.168.1.5tcpwww-$ETH0_IP:192.168.1.254
ACTIONSOURCEDESTINATIONPROTOCOLPORTSOURCE PORTORIG. DEST.
DNATloc:192.168.1.0/24loc:192.168.1.5tcpwww-$ETH0_IP:192.168.1.254
-
-
+ +
- -
+ +

Using this technique, you will want to configure your DHCP/PPPoE - client to automatically restart Shorewall each time that - you get a new IP address.

-
+ client to automatically restart Shorewall each time +that you get a new IP address.

+
- +

2a. I have a zone "Z" with an RFC1918 - subnet and I use static NAT to assign non-RFC1918 addresses - to hosts in Z. Hosts in Z cannot communicate with each other - using their external (non-RFC1918 addresses) so they can't -access each other using their DNS names.

+ subnet and I use static NAT to assign non-RFC1918 addresses + to hosts in Z. Hosts in Z cannot communicate with each other + using their external (non-RFC1918 addresses) so they can't + access each other using their DNS names. - +

Answer: This is another problem that is best solved - using Bind Version 9 "views". It allows both external + using Bind Version 9 "views". It allows both external and internal clients to access a NATed host using the host's -DNS name.

+ DNS name.

- +

Another good way to approach this problem is to switch from - static NAT to Proxy ARP. That way, the hosts in Z have -non-RFC1918 addresses and can be accessed externally and internally -using the same address.

+ static NAT to Proxy ARP. That way, the hosts in Z have + non-RFC1918 addresses and can be accessed externally and +internally using the same address.

- +

If you don't like those solutions and prefer routing all Z->Z traffic through your firewall then:

- +

a) Specify "multi" on the entry for Z's interface in /etc/shorewall/interfaces - (If you are running a Shorewall version earlier than 1.3.9).
- b) Set the Z->Z policy to ACCEPT.
- c) Masquerade Z to itself.
-
- Example:

+ (If you are running a Shorewall version earlier than 1.3.9).
+ b) Set the Z->Z policy to ACCEPT.
+ c) Masquerade Z to itself.
+
+ Example:

- +

Zone: dmz
- Interface: eth2
- Subnet: 192.168.2.0/24

+ Interface: eth2
+ Subnet: 192.168.2.0/24

- +

In /etc/shorewall/interfaces:

- +
- + - - - - - - - - - - - - - + + + + + + + + + + + + + - + - +
ZONEINTERFACEBROADCASTOPTIONS
dmzeth2192.168.2.255multi
ZONEINTERFACEBROADCASTOPTIONS
dmzeth2192.168.2.255multi
-
+ - +

In /etc/shorewall/policy:

- +
- + - - - - - - - - - - - - - + + + + + + + + + + + + + - + - +
SOURCE DESTINATIONPOLICYLIMIT:BURST
dmzdmzACCEPT
-
SOURCE DESTINATIONPOLICYLIMIT:BURST
dmzdmzACCEPT
+
-
+ - +

In /etc/shorewall/masq:

- +
- + - - - - - - - - - - - + + + + + + + + + + + - + - +
INTERFACE - SUBNETADDRESS
eth2192.168.2.0/24
-
INTERFACE + SUBNETADDRESS
eth2192.168.2.0/24
+
-
+ - +

3. I want to use Netmeeting or MSN Instant - Messenger with Shorewall. What do I do?

+ Messenger with Shorewall. What do I do? - +

Answer: There is an H.323 connection - tracking/NAT module that may help with Netmeeting. -Look here for a solution -for MSN IM but be aware that there are significant security risks involved -with this solution. Also check the Netfilter mailing list archives - at http://www.netfilter.org. -

+ tracking/NAT module that may help with Netmeeting. + Look here for a solution + for MSN IM but be aware that there are significant security risks involved + with this solution. Also check the Netfilter mailing list +archives at http://www.netfilter.org. +

- +

4. I just used an online port scanner - to check my firewall and it shows some ports as 'closed' - rather than 'blocked'. Why?

+ to check my firewall and it shows some ports as 'closed' + rather than 'blocked'. Why? - +

Answer: The common.def included with version 1.3.x - always rejects connection requests on TCP port 113 + always rejects connection requests on TCP port 113 rather than dropping them. This is necessary to prevent outgoing connection problems to services that use the 'Auth' mechanism for identifying requesting users. Shorewall also @@ -684,551 +685,530 @@ these connection requests rather than dropping them cuts down slightly on the amount of Windows chatter on LAN segments connected to the Firewall.

- +

If you are seeing port 80 being 'closed', that's probably - your ISP preventing you from running a web server in - violation of your Service Agreement.

+ your ISP preventing you from running a web server +in violation of your Service Agreement.

- +

4a. I just ran an nmap UDP scan of my - firewall and it showed 100s of ports as open!!!!

+ firewall and it showed 100s of ports as open!!!! - +

Answer: Take a deep breath and read the nmap man page - section about UDP scans. If nmap gets nothing - back from your firewall then it reports the port as open. - If you want to see which UDP ports are really open, temporarily - change your net->all policy to REJECT, restart Shorewall + section about UDP scans. If nmap gets nothing + back from your firewall then it reports the port as open. + If you want to see which UDP ports are really open, temporarily + change your net->all policy to REJECT, restart Shorewall and do the nmap UDP scan again.

- +

5. I've installed Shorewall and now I - can't ping through the firewall

+ can't ping through the firewall - +

Answer: If you want your firewall to be totally open - for "ping":

+ for "ping":

- +

a) Do NOT specify 'noping' on any interface in /etc/shorewall/interfaces.
- b) Copy /etc/shorewall/icmp.def to -/etc/shorewall/icmpdef
- c) Add the following to /etc/shorewall/icmpdef: -

+ b) Copy /etc/shorewall/icmp.def +to /etc/shorewall/icmpdef
+ c) Add the following to /etc/shorewall/icmpdef: +

- +
- +

run_iptables -A icmpdef -p ICMP --icmp-type echo-request - -j ACCEPT
-

-
- For a complete description of Shorewall 'ping' management, - see this page. - + -j ACCEPT
+

+ + For a complete description of Shorewall 'ping' management, + see this page. +

6. Where are the log messages written - and how do I change the destination?

+ and how do I change the destination? - +

Answer: NetFilter uses the kernel's equivalent of syslog (see "man syslog") to log messages. It always uses the LOG_KERN (kern) facility (see "man openlog") and you get to choose the log level (again, see "man syslog") in your policies and rules. The destination for messaged logged by syslog is controlled by /etc/syslog.conf (see "man syslog.conf"). - When you have changed /etc/syslog.conf, be sure to restart - syslogd (on a RedHat system, "service syslog restart").

+ When you have changed /etc/syslog.conf, be sure to restart + syslogd (on a RedHat system, "service syslog restart").

- +

By default, older versions of Shorewall ratelimited log messages - through settings + through settings in /etc/shorewall/shorewall.conf -- If you want to log all messages, set:

- -
+ +
     LOGLIMIT=""
LOGBURST=""

Beginning with Shorewall version 1.3.12, you can set up Shorewall to log all of its messages to a separate file.
-
+
- +

6a. Are there any log parsers that work - with Shorewall?

+ with Shorewall? - +

Answer: Here are several links that may be helpful: -

+

- +
- +

http://www.shorewall.net/pub/shorewall/parsefw/
- http://www.fireparse.com
- http://cert.uni-stuttgart.de/projects/fwlogwatch
- http://www.logwatch.org

- http://gege.org/iptables
-

-
- I personnaly use Logwatch. It emails me a report each -day from my various systems with each report summarizing the logged -activity on the corresponding system. - + http://www.logwatch.org
+ http://gege.org/iptables
+

+ + I personnaly use Logwatch. It emails me a report each + day from my various systems with each report summarizing the logged + activity on the corresponding system. +

6b. DROP messages on port 10619 - are flooding the logs with their connect requests. Can i exclude - these error messages for this port temporarily from logging in Shorewall?

- Temporarily add the following rule:
- + are flooding the logs with their connect requests. Can i exclude + these error messages for this port temporarily from logging in Shorewall? + Temporarily add the following rule:
+
	DROP    net    fw    udp    10619
- +

6c. All day long I get a steady flow - of these DROP messages from port 53 to some high numbered port.  They get - dropped, but what the heck are they?

- + of these DROP messages from port 53 to some high numbered port.  They +get dropped, but what the heck are they? +
Jan  8 15:50:48 norcomix kernel: Shorewall:net2all:DROP:IN=eth0 OUT= MAC=00:40:c7:2e:09:c0:00:01:64:4a:70:00:08:00
SRC=208.138.130.16 DST=24.237.22.45 LEN=53 TOS=0x00 PREC=0x00
TTL=251 ID=8288 DF PROTO=UDP SPT=53 DPT=40275 LEN=33
- Answer: There are two possibilities:
- + Answer: There are two possibilities:
+
    -
  1. They are late-arriving replies to DNS queries.
  2. -
  3. They are corrupted reply packets.
  4. - +
  5. They are late-arriving replies to DNS queries.
  6. +
  7. They are corrupted reply packets.
  8. +
- You can distinguish the difference by setting the logunclean - option (/etc/shorewall/interfaces) - on your external interface (eth0 in the above example). If they get logged - twice, they are corrupted. I solve this problem by using an /etc/shorewall/common - file like this:
- -
+ You can distinguish the difference by setting the logunclean + option (/etc/shorewall/interfaces) + on your external interface (eth0 in the above example). If they get logged + twice, they are corrupted. I solve this problem by using an /etc/shorewall/common + file like this:
+ +
#
# Include the standard common.def file
#
. /etc/shorewall/common.def
#
# The following rule is non-standard and compensates for tardy
# DNS replies
#
run_iptables -A common -p udp --sport 53 -mstate --state NEW -j DROP
-
- The above file is also include in all of my sample configurations -available in the Quick Start +
+ The above file is also include in all of my sample configurations + available in the Quick Start Guides.
- +

6d. Why is the MAC address in -Shorewall log messages so long? I thought MAC addresses were only 6 bytes -in length. What is labeled as the MAC address in a Shorewall log message is -actually the Ethernet frame header. In contains:
-

- + Shorewall log messages so long? I thought MAC addresses were only 6 bytes + in length. +What is labeled as the MAC address in a Shorewall log message is actually +the Ethernet frame header. It contains:
+ - Example:
-
- MAC=00:04:4c:dc:e2:28:00:b0:8e:cf:3c:4c:08:00
- + Example:
+
+ MAC=00:04:4c:dc:e2:28:00:b0:8e:cf:3c:4c:08:00
+ - +

7. When I stop Shorewall using 'shorewall - stop', I can't connect to anything. Why doesn't that command - work?

+ stop', I can't connect to anything. Why doesn't that command + work? - +

The 'stop' command is intended to place your firewall into - a safe state whereby only those hosts listed in /etc/shorewall/routestopped' - are activated. If you want to totally open up your firewall, - you must use the 'shorewall clear' command.

+ a safe state whereby only those hosts listed in /etc/shorewall/routestopped' + are activated. If you want to totally open up your firewall, + you must use the 'shorewall clear' command.

- +

8. When I try to start Shorewall on RedHat, - I get messages about insmod failing -- what's wrong?

+ I get messages about insmod failing -- what's wrong? - +

Answer: The output you will see looks something like - this:

+ this:

- +
     /lib/modules/2.4.17/kernel/net/ipv4/netfilter/ip_tables.o: init_module: Device or resource busy
Hint: insmod errors can be caused by incorrect module parameters, including invalid IO or IRQ parameters
/lib/modules/2.4.17/kernel/net/ipv4/netfilter/ip_tables.o: insmod
/lib/modules/2.4.17/kernel/net/ipv4/netfilter/ip_tables.o failed
/lib/modules/2.4.17/kernel/net/ipv4/netfilter/ip_tables.o: insmod ip_tables failed
iptables v1.2.3: can't initialize iptables table `nat': iptables who? (do you need to insmod?)
Perhaps iptables or your kernel needs to be upgraded.
- +

This is usually cured by the following sequence of commands: -

+

- -
+ +
     service ipchains stop
chkconfig --delete ipchains
rmmod ipchains
-
+
- -
+ +

Also, be sure to check the errata - for problems concerning the version of iptables (v1.2.3) - shipped with RH7.2.

-
+ for problems concerning the version of iptables (v1.2.3) + shipped with RH7.2.

+
- +

- + +

9. Why can't Shorewall detect my interfaces - properly?

+ properly? - +

I just installed Shorewall and when I issue the start command, - I see the following:

+ I see the following:

- -
+ +
     Processing /etc/shorewall/shorewall.conf ...
Processing /etc/shorewall/params ...
Starting Shorewall...
Loading Modules...
Initializing...
Determining Zones...
Zones: net loc
Validating interfaces file...
Validating hosts file...
Determining Hosts in Zones...
Net Zone: eth0:0.0.0.0/0
Local Zone: eth1:0.0.0.0/0
Deleting user chains...
Creating input Chains...
...
-
+
- -
+ +

Why can't Shorewall detect my interfaces properly?

-
+
- -
+ +

Answer: The above output is perfectly normal. The Net zone is defined as all hosts that are connected through eth0 and the local zone is defined as all hosts connected through eth1

-
+
- +

10. What Distributions does it work with?

- +

Shorewall works with any GNU/Linux distribution that includes - the proper + the proper prerequisites.

- +

11. What Features does it have?

- +

Answer: See the Shorewall - Feature List.

+ Feature List.

- +

12. Is there a GUI?

- +

Answer: Yes. Shorewall support is included in Webmin - 1.060 and later versions. See http://www.webmin.com -

+ 1.060 and later versions. See http://www.webmin.com +

- +

13. Why do you call it "Shorewall"?

- +

Answer: Shorewall is a concatenation of "Shoreline" - (the city - where I live) and "Firewall". The full name of -the product is actually "Shoreline Firewall" but "Shorewall" is must -more commonly used.

+ (the city + where I live) and "Firewall". The full name of + the product is actually "Shoreline Firewall" but "Shorewall" is must + more commonly used.

- +

14. I'm connected via a cable modem - and it has an internal web server that allows me to configure/monitor - it but as expected if I enable rfc1918 blocking for my -eth0 interface (the internet one), it also blocks the cable -modems web server.

+ and it has an internal web server that allows me to +configure/monitor it but as expected if I enable rfc1918 +blocking for my eth0 interface (the internet one), it also +blocks the cable modems web server. - +

Is there any way it can add a rule before the rfc1918 blocking - that will let all traffic to and from the 192.168.100.1 - address of the modem in/out but still block all other rfc1918 - addresses?

+ that will let all traffic to and from the 192.168.100.1 + address of the modem in/out but still block all other rfc1918 + addresses?

- +

Answer: If you are running a version of Shorewall earlier than 1.3.1, create /etc/shorewall/start and in it, place the following:

- -
+ +
     run_iptables -I rfc1918 -s 192.168.100.1 -j ACCEPT
-
+
- -
+ +

If you are running version 1.3.1 or later, simply add the - following to /etc/shorewall/rfc1918:

-
+ following to /etc/shorewall/rfc1918:

+
- -
+ +
- + - - - - - - - - - + + + + + + + + + - + - +
SUBNET TARGET
192.168.100.1RETURN
SUBNET TARGET
192.168.100.1RETURN
-
-
+ +
- -
+ +

Be sure that you add the entry ABOVE the entry for 192.168.0.0/16.
-

- +

+ +

Note: If you add a second IP address to your external firewall - interface to correspond to the modem address, you must + interface to correspond to the modem address, you must also make an entry in /etc/shorewall/rfc1918 for that address. For example, if you configure the address 192.168.100.2 on your firewall, then you would add two entries to /etc/shorewall/rfc1918:
-

- +

+ +
- + - - - - - - - - - - - - - + + + + + + + + + + + + + - + + - +
SUBNET
-
TARGET
-
192.168.100.1
-
RETURN
-
192.168.100.2
-
RETURN
-
SUBNET
+
TARGET
+
192.168.100.1
+
RETURN
+
192.168.100.2
+
RETURN
+
-
-
+ +
- -
+ +

14a. Even though it assigns public IP addresses, my ISP's DHCP server has an RFC 1918 address. If I enable RFC 1918 filtering on my external interface, my DHCP client cannot renew its lease.

-
+
- -
+ +

The solution is the same as FAQ 14 above. Simply substitute - the IP address of your ISPs DHCP server.

-
+ the IP address of your ISPs DHCP server.

+
- +

15. My local systems can't see out to - the net

+ the net - +

Answer: Every time I read "systems can't see out to - the net", I wonder where the poster bought computers + the net", I wonder where the poster bought computers with eyes and what those computers will "see" when things are working properly. That aside, the most common causes of this problem are:

- +
    -
  1. +
  2. - +

    The default gateway on each local system isn't set to - the IP address of the local firewall interface.

    -
  3. -
  4. + the IP address of the local firewall interface.

    +
  5. +
  6. - +

    The entry for the local network in the /etc/shorewall/masq - file is wrong or missing.

    -
  7. -
  8. + file is wrong or missing.

    +
  9. +
  10. - +

    The DNS settings on the local systems are wrong or the - user is running a DNS server on the firewall and hasn't - enabled UDP and TCP port 53 from the firewall to the internet.

    -
  11. + user is running a DNS server on the firewall and hasn't + enabled UDP and TCP port 53 from the firewall to the +internet.

    + - +
- +

16. Shorewall is writing log messages - all over my console making it unusable!

+ all over my console making it unusable! - +

Answer: "man dmesg" -- add a suitable 'dmesg' command - to your startup scripts or place it in /etc/shorewall/start. - Under RedHat, the max log level that is sent to the console - is specified in /etc/sysconfig/init in the LOGLEVEL variable.
-

- + to your startup scripts or place it in /etc/shorewall/start. + Under RedHat, the max log level that is sent to the +console is specified in /etc/sysconfig/init in the LOGLEVEL +variable.
+

+

17. How do I find out why this traffic is getting - logged?

- Answer: Logging occurs out of a -number of chains (as indicated in the log message) in Shorewall:
- + logged? + Answer: Logging occurs out of +a number of chains (as indicated in the log message) in Shorewall:
+
    -
  1. man1918 - The destination -address is listed in /etc/shorewall/rfc1918 with a logdrop - target -- see /etc/shorewall/rfc1918.
  2. -
  3. rfc1918 - The source address - is listed in /etc/shorewall/rfc1918 with a logdrop target - -- see /etc/shorewall/rfc1918.
  4. -
  5. all2<zone>, <zone>2all - or all2all - You have aman1918 - The destination + address is listed in /etc/shorewall/rfc1918 with a logdrop + target -- see /etc/shorewall/rfc1918.
  6. +
  7. rfc1918 - The source address + is listed in /etc/shorewall/rfc1918 with a logdrop target + -- see /etc/shorewall/rfc1918.
  8. +
  9. all2<zone>, <zone>2all + or all2all - You have a policy that specifies a log level - and this packet is being logged under that policy. If you intend - to ACCEPT this traffic then you need a rule to that effect.
    -
  10. -
  11. <zone1>2<zone2> - - Either you have a policy -for <zone1> to <zone2> that -specifies a log level and this packet is being logged under -that policy or this packet matches a +
  12. <zone1>2<zone2> + - Either you have a +policy for <zone1> to <zone2> +that specifies a log level and this packet is being logged +under that policy or this packet matches a rule that includes a log level.
  13. -
  14. <interface>_mac - The packet - is being logged under the maclist <interface>_mac - The packet + is being logged under the maclist interface option.
    -
  15. -
  16. logpkt - The packet is being - logged under the logunclean +
  17. logpkt - The packet is being + logged under the logunclean interface option.
  18. -
  19. badpkt - The packet is being - logged under the dropunclean badpkt - The packet is being + logged under the dropunclean interface option as specified in the LOGUNCLEAN setting in /etc/shorewall/shorewall.conf.
  20. -
  21. blacklst - The packet is being - logged because the source IP is blacklisted in theblacklst - The packet is +being logged because the source IP is blacklisted in the /etc/shorewall/blacklist file.
  22. -
  23. newnotsyn - The packet is -being logged because it is a TCP packet that is not part of -any current connection yet it is not a syn packet. Options affecting -the logging of such packets include NEWNOTSYN and - LOGNEWNOTSYN in newnotsyn - The packet is + being logged because it is a TCP packet that is not part +of any current connection yet it is not a syn packet. Options +affecting the logging of such packets include NEWNOTSYN + and LOGNEWNOTSYN in /etc/shorewall/shorewall.conf.
  24. -
  25. INPUT or FORWARD - The - packet has a source IP address that isn't in any of your defined - zones ("shorewall check" and look at the printed zone definitions) - or the chain is FORWARD and the destination IP isn't in any of -your defined zones.
  26. -
  27. logflags - The packet is being logged - because it failed the checks implemented by the tcpflags INPUT or FORWARD - +The packet has a source IP address that isn't in any of your +defined zones ("shorewall check" and look at the printed zone +definitions) or the chain is FORWARD and the destination IP isn't +in any of your defined zones.
  28. +
  29. logflags - The packet is being logged + because it failed the checks implemented by the tcpflags interface option.
    -
  30. - + +
- +

18. Is there any way to use aliased ip addresses - with Shorewall, and maintain separate rulesets for different - IPs?

- Answer: Yes. You simply use the IP address - in your rules (or if you use NAT, use the local IP address in - your rules). Note: The ":n" notation (e.g., eth0:0) is deprecated - and will disappear eventually. Neither iproute (ip and tc) -nor iptables supports that notation so neither does Shorewall. -
-
- Example 1:
-
- /etc/shorewall/rules - -
     # Accept AUTH but only on address 192.0.2.125

ACCEPT net fw:192.0.2.125 tcp auth
- Example - 2 (NAT):
-
- /etc/shorewall/nat
- -
     192.0.2.126	eth0	10.1.1.126
- /etc/shorewall/rules - -
     # Accept HTTP on 192.0.2.126 (a.k.a. 10.1.1.126)

ACCEPT net loc:10.1.1.126 tcp www
- Example 3 (DNAT):
-
-
     # Forward SMTP on external address 192.0.2.127 to local system 10.1.1.127

DNAT net loc:10.1.1.127 tcp smtp - 192.0.2.127
- + with Shorewall, and maintain separate rulesets for different + IPs? + Answer: Yes. See Shorewall and Aliased Interfaces. +

19. I have added entries to /etc/shorewall/tcrules - but they don't seem to do anything. Why?

- You probably haven't set TC_ENABLED=Yes in /etc/shorewall/shorewall.conf - so the contents of the tcrules file are simply being ignored.
- + but they don't seem to do anything. Why? + You probably haven't set TC_ENABLED=Yes in /etc/shorewall/shorewall.conf + so the contents of the tcrules file are simply being ignored.
+

20. I have just set up a server. Do I have - to change Shorewall to allow access to my server from the internet?
-

- Yes. Consult the
+ + Yes. Consult the
QuickStart guide that you used during your initial setup for information about how to set up rules for your server.
- +

21. I see these strange log entries occasionally; - what are they?
-

- + what are they?
+ +
- +
Nov 25 18:58:52 linux kernel: Shorewall:net2all:DROP:IN=eth1 OUT= MAC=00:60:1d:f0:a6:f9:00:60:1d:f6:35:50:08:00
SRC=206.124.146.179 DST=192.0.2.3 LEN=56 TOS=0x00 PREC=0x00 TTL=110 ID=18558 PROTO=ICMP TYPE=3 CODE=3
[SRC=192.0.2.3 DST=172.16.1.10 LEN=128 TOS=0x00 PREC=0x00 TTL=47 ID=0 DF PROTO=UDP SPT=53 DPT=2857 LEN=108 ]
-
- 192.0.2.3 is external on my firewall... 172.16.0.0/24 - is my internal LAN
-
- Answer: While most people associate the Internet - Control Message Protocol (ICMP) with 'ping', ICMP is a key piece - of the internet. ICMP is used to report problems back to the sender - of a packet; this is what is happening here. Unfortunately, where + + 192.0.2.3 is external on my firewall... 172.16.0.0/24 + is my internal LAN
+
+ Answer: While most people associate the Internet + Control Message Protocol (ICMP) with 'ping', ICMP is a key piece + of the internet. ICMP is used to report problems back to the sender + of a packet; this is what is happening here. Unfortunately, where NAT is involved (including SNAT, DNAT and Masquerade), there are a lot of broken implementations. That is what you are seeing with these messages.
-
- Here is my interpretation of what is happening -- to - confirm this analysis, one would have to have packet sniffers placed - a both ends of the connection.
-
- Host 172.16.1.10 behind NAT gateway 206.124.146.179 -sent a UDP DNS query to 192.0.2.3 and your DNS server tried to send -a response (the response information is in the brackets -- note source - port 53 which marks this as a DNS reply). When the response was returned - to to 206.124.146.179, it rewrote the destination IP TO 172.16.1.10 - and forwarded the packet to 172.16.1.10 who no longer had a connection - on UDP port 2857. This causes a port unreachable (type 3, code 3) to - be generated back to 192.0.2.3. As this packet is sent back through -206.124.146.179, that box correctly changes the source address in the -packet to 206.124.146.179 but doesn't reset the DST IP in the original +
+ Here is my interpretation of what is happening -- +to confirm this analysis, one would have to have packet sniffers +placed a both ends of the connection.
+
+ Host 172.16.1.10 behind NAT gateway 206.124.146.179 + sent a UDP DNS query to 192.0.2.3 and your DNS server tried to +send a response (the response information is in the brackets -- note +source port 53 which marks this as a DNS reply). When the response was +returned to to 206.124.146.179, it rewrote the destination IP TO 172.16.1.10 + and forwarded the packet to 172.16.1.10 who no longer had a connection + on UDP port 2857. This causes a port unreachable (type 3, code 3) +to be generated back to 192.0.2.3. As this packet is sent back through + 206.124.146.179, that box correctly changes the source address in +the packet to 206.124.146.179 but doesn't reset the DST IP in the original DNS response similarly. When the ICMP reaches your firewall (192.0.2.3), your firewall has no record of having sent a DNS reply to 172.16.1.10 so this ICMP doesn't appear to be related to anything that was sent. @@ -1237,54 +1217,56 @@ all2all chain. I have also seen cases where the source IP in the ICMP itself isn't set back to the external IP of the remote NAT gateway; that causes your firewall to log and drop the packet out of the rfc1918 chain because the source IP is reserved by RFC 1918.
- +

22. I have some iptables commands that - I want to run when Shorewall starts. Which file do I put them - in?

- You can place these commands in one of the run when Shorewall starts. Which file do I put them + in? + You can place these commands in one of the Shorewall Extension Scripts. Be sure that you look at the contents of the chain(s) that you will be modifying - with your commands to be sure that the commands will do what they are - intended. Many iptables commands published in HOWTOs and other instructional + with your commands to be sure that the commands will do what they +are intended. Many iptables commands published in HOWTOs and other instructional material use the -A command which adds the rules to the end of the chain. Most chains that Shorewall constructs end with an unconditional DROP, ACCEPT or REJECT rule and any rules that you add after that will be ignored. Check "man iptables" and look at the -I (--insert) command.
- +

23. Why do you use such ugly fonts on your - web site?

- The Shorewall web site is almost font neutral (it doesn't explicitly - specify fonts except on a few pages) so the fonts you see are largely - the default fonts configured in your browser. If you don't like them then - reconfigure your browser.
- + web site? + The Shorewall web site is almost font neutral (it doesn't +explicitly specify fonts except on a few pages) so the fonts you see +are largely the default fonts configured in your browser. If you don't +like them then reconfigure your browser.
+

24. How can I allow conections to let's say - the ssh port only from specific IP Addresses on the internet?

- In the SOURCE column of the rule, follow "net" by a colon and a -list of the host/subnet addresses as a comma-separated list.
- + the ssh port only from specific IP Addresses on the internet? + In the SOURCE column of the rule, follow "net" by a colon and +a list of the host/subnet addresses as a comma-separated list.
+
    net:<ip1>,<ip2>,...
- Example:
- + Example:
+
    ACCEPT	net:192.0.2.16/28,192.0.2.44	fw	tcp	22
- +

- +
- +

25. How to I tell which version of Shorewall -I am running?
-

- At the shell prompt, type:
+ I am running?
+ + At the shell prompt, type:
+
+     /sbin/shorewall version

-     /sbin/shorewall version
-
-Last updated 2/22/2003 - Tom Eastep - + Last updated 3/5/2003 - Tom Eastep +

Copyright © 2001, 2002, 2003 Thomas M. Eastep.
-

+

+
+

diff --git a/STABLE/documentation/News.htm b/STABLE/documentation/News.htm index 00f18d51e..4f0b5e007 100644 --- a/STABLE/documentation/News.htm +++ b/STABLE/documentation/News.htm @@ -3,7 +3,7 @@ - + Shorewall News @@ -11,2507 +11,2855 @@ - + - + - + - - - + + - + + - - + +
+
- +

Shorewall News Archive

-
- -

2/21/2003 - Shorewall 1.4.0 Beta 1 

- Shorewall 1.4 represents the - next step in the evolution of Shorewall. The main thrust of the initial -release is simply to remove the cruft that has accumulated in Shorewall + +

3/7/2003 - Shorewall 1.4.0 RC2 

+ Shorewall 1.4 represents +the next step in the evolution of Shorewall. The main thrust of the initial + release is simply to remove the cruft that has accumulated in Shorewall over time.
-
- IMPORTANT: Shorewall 1.4.0 REQUIRES the iproute package - ('ip' utility).
-
- Function from 1.3 that has been omitted from this version include:
- +
+ IMPORTANT: Shorewall 1.4.0 requires the iproute package +('ip' utility).
+
+ Function from 1.3 that has been omitted from this version include:
+
    -
  1. The MERGE_HOSTS variable in shorewall.conf is no longer supported. - Shorewall 1.4 behavior is the same as 1.3 with MERGE_HOSTS=Yes.
    -
    -
  2. -
  3. Interface names of the form <device>:<integer> in /etc/shorewall/interfaces - now generate an error.
    -
    -
  4. -
  5. Shorewall 1.4 implements behavior consistent with OLD_PING_HANDLING=No. - OLD_PING_HANDLING=Yes will generate an error at startup as will specification - of the 'noping' or 'filterping' interface options.
    -
    -
  6. -
  7. The 'routestopped' option in the /etc/shorewall/interfaces and /etc/shorewall/hosts - files is no longer supported and will generate an error at startup if +
  8. The MERGE_HOSTS variable in shorewall.conf is no longer supported. +Shorewall 1.4 behavior is the same as 1.3 with MERGE_HOSTS=Yes.
    +
    +
  9. +
  10. Interface names of the form <device>:<integer> in /etc/shorewall/interfaces + now generate an error.
    +
    +
  11. +
  12. Shorewall 1.4 implements behavior consistent with OLD_PING_HANDLING=No. + OLD_PING_HANDLING=Yes will generate an error at startup as will specification + of the 'noping' or 'filterping' interface options.
    +
    +
  13. +
  14. The 'routestopped' option in the /etc/shorewall/interfaces and /etc/shorewall/hosts + files is no longer supported and will generate an error at startup if specified.
    -
    -
  15. -
  16. The Shorewall 1.2 syntax for DNAT and REDIRECT rules is no longer - accepted.
    -
    -
  17. -
  18. The ALLOWRELATED variable in shorewall.conf is no longer supported. - Shorewall 1.4 behavior is the same as 1.3 with ALLOWRELATED=Yes.
    -
    -
  19. -
  20. The icmp.def file has been removed.
    -
  21. - +
    + +
  22. The Shorewall 1.2 syntax for DNAT and REDIRECT rules is no longer +accepted.
    +
    +
  23. +
  24. The ALLOWRELATED variable in shorewall.conf is no longer supported. + Shorewall 1.4 behavior is the same as 1.3 with ALLOWRELATED=Yes.
    +
    +
  25. +
  26. The icmp.def file has been removed.
    +
- Changes for 1.4 include:
- + Changes for 1.4 include:
+
    -
  1. The /etc/shorewall/shorewall.conf file has been completely reorganized - into logical sections.
    -
    -
  2. -
  3. LOG is now a valid action for a rule (/etc/shorewall/rules).
    -
    -
  4. -
  5. The firewall script and version file are now installed in /usr/share/shorewall.
    -
    -
  6. -
  7. Late arriving DNS replies are now silently dropped in the common -chain by default.
    -
    -
  8. -
  9. In addition to behaving like OLD_PING_HANDLING=No, Shorewall 1.4 -no longer unconditionally accepts outbound ICMP packets. So if you want -to 'ping' from the firewall, you will need the appropriate rule or policy. +
  10. The /etc/shorewall/shorewall.conf file has been completely reorganized + into logical sections.
    +
    +
  11. +
  12. LOG is now a valid action for a rule (/etc/shorewall/rules).
    +
    +
  13. +
  14. The firewall script and version file are now installed in /usr/share/shorewall.
    +
    +
  15. +
  16. Late arriving DNS replies are now silently dropped in the common chain + by default.
    +
    +
  17. +
  18. In addition to behaving like OLD_PING_HANDLING=No, Shorewall 1.4 no + longer unconditionally accepts outbound ICMP packets. So if you want to +'ping' from the firewall, you will need the appropriate rule or policy.
    +
    +
  19. +
  20. CONTINUE is now a valid action for a rule (/etc/shorewall/rules).
    +
  21. - -
- -

2/8/2003 - Shoreawall 1.3.14

- -

New features include

- -
    -
  1. An OLD_PING_HANDLING option has been added to shorewall.conf. -When set to Yes, Shorewall ping handling is as it has always been (see -http://www.shorewall.net/ping.html).
    -
    - When OLD_PING_HANDLING=No, icmp echo (ping) is handled via rules - and policies just like any other connection request. The FORWARDPING=Yes - option in shorewall.conf and the 'noping' and 'filterping' options in - /etc/shorewall/interfaces will all generate an error.
    -
    -
  2. -
  3. It is now possible to direct Shorewall to create a "label" such - as  "eth0:0" for IP addresses that it creates under ADD_IP_ALIASES=Yes - and ADD_SNAT_ALIASES=Yes. This is done by specifying the label instead -of just the interface name:
    -  
    -    a) In the INTERFACE column of /etc/shorewall/masq
    -    b) In the INTERFACE column of /etc/shorewall/nat
    -  
  4. -
  5. Support for OpenVPN Tunnels.
    -
    -
  6. -
  7. Support for VLAN devices with names of the form $DEV.$VID (e.g., - eth0.0)
    +
  8. 802.11b devices with names of the form wlan<n> + now support the 'maclist' option.
    +
    +
  9. +
  10. Explicit Congestion Notification (ECN - RFC 3168) may now +be turned off on a host or network basis using the new /etc/shorewall/ecn + file. To use this facility:
    +
    +    a) You must be running kernel 2.4.20
    +    b) You must have applied the patch in
    +    http://www.shorewall/net/pub/shorewall/ecn/patch.
    +    c) You must have iptables 1.2.7a installed.

  11. -
  12. In /etc/shorewall/tcrules, the MARK value may be optionally followed - by ":" and either 'F' or 'P' to designate that the marking will occur in -the FORWARD or PREROUTING chains respectively. If this additional specification - is omitted, the chain used to mark packets will be determined by the setting - of the MARK_IN_FORWARD_CHAIN option in shorewall.conf.
    -
    -
  13. -
  14. When an interface name is entered in the SUBNET column of the -/etc/shorewall/masq file, Shorewall previously masqueraded traffic from -only the first subnet defined on that interface. It did not masquerade -traffic from:
    -  
    -    a) The subnets associated with other addresses on the interface.
    -    b) Subnets accessed through local routers.
    -  
    - Beginning with Shorewall 1.3.14, if you enter an interface name -in the SUBNET column, shorewall will use the firewall's routing table -to construct the masquerading/SNAT rules.
    -  
    - Example 1 -- This is how it works in 1.3.14.
    -   
    - -
       [root@gateway test]# cat /etc/shorewall/masq
    #INTERFACE              SUBNET                  ADDRESS
    eth0                    eth2                    206.124.146.176
    #LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE
    - -
       [root@gateway test]# ip route show dev eth2
    192.168.1.0/24  scope link
    192.168.10.0/24  proto kernel  scope link  src 192.168.10.254
    - -
       [root@gateway test]# shorewall start
    ...
    Masqueraded Subnets and Hosts:
    To 0.0.0.0/0 from 192.168.1.0/24 through eth0 using 206.124.146.176
    To 0.0.0.0/0 from 192.168.10.0/24 through eth0 using 206.124.146.176
    Processing /etc/shorewall/tos...
    -  
    - When upgrading to Shorewall 1.3.14, if you have multiple local -subnets connected to an interface that is specified in the SUBNET column -of an /etc/shorewall/masq entry, your /etc/shorewall/masq file will need -changing. In most cases, you will simply be able to remove redundant entries. -In some cases though, you might want to change from using the interface -name to listing specific subnetworks if the change described above will -cause masquerading to occur on subnetworks that you don't wish to masquerade.
    -  
    - Example 2 -- Suppose that your current config is as follows:
    -   
    - -
       [root@gateway test]# cat /etc/shorewall/masq
    #INTERFACE              SUBNET                  ADDRESS
    eth0                    eth2                    206.124.146.176
    eth0                    192.168.10.0/24         206.124.146.176
    #LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE
    - -
       [root@gateway test]# ip route show dev eth2
    192.168.1.0/24  scope link
    192.168.10.0/24  proto kernel  scope link  src 192.168.10.254
    [root@gateway test]#
    -  
    -    In this case, the second entry in /etc/shorewall/masq is no -longer required.
    -  
    - Example 3 -- What if your current configuration is like this?
    -  
    - -
       [root@gateway test]# cat /etc/shorewall/masq
    #INTERFACE              SUBNET                  ADDRESS
    eth0                    eth2                    206.124.146.176
    #LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE
    - -
       [root@gateway test]# ip route show dev eth2
    192.168.1.0/24  scope link
    192.168.10.0/24  proto kernel  scope link  src 192.168.10.254
    [root@gateway test]#
    -  
    -    In this case, you would want to change the entry in  /etc/shorewall/masq - to:
    - -
       #INTERFACE              SUBNET                  ADDRESS
    eth0                    192.168.1.0/24          206.124.146.176
    #LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE
    -
  15. - +
  16. The /etc/shorewall/params file is now processed first so that variables +may be used in the /etc/shorewall/shorewall.conf file.
- -


- 2/5/2003 - Shorewall Support included in Webmin 1.060

- -

Webmin version 1.060 now has Shorewall support included as standard. See - http://www.webmin.com.
-
- 2/4/2003 - Shorewall 1.3.14-RC1

- -

Includes the Beta 2 content plus support for OpenVPN tunnels.

- -

1/28/2003 - Shorewall 1.3.14-Beta2

+ +

2/27/2003 - Shorewall 1.4.0 Beta 2 

+ Shorewall 1.4 represents +the next step in the evolution of Shorewall. The main thrust of the initial + release is simply to remove the cruft that has accumulated in Shorewall +over time.
+
+ IMPORTANT: Shorewall 1.4.0 REQUIRES the iproute package + ('ip' utility).
+
+ Function from 1.3 that has been omitted from this version include:
-

Includes the Beta 1 content plus restores VLAN device names of the form - $dev.$vid (e.g., eth0.1)

- -

1/25/2003 - Shorewall 1.3.14-Beta1
-

- -

The Beta includes the following changes:
-

-
    -
  1. An OLD_PING_HANDLING option has been added to shorewall.conf. - When set to Yes, Shorewall ping handling is as it has always been (see - http://www.shorewall.net/ping.html).
    -
    - When OLD_PING_HANDLING=No, icmp echo (ping) is handled via rules - and policies just like any other connection request. The FORWARDPING=Yes - option in shorewall.conf and the 'noping' and 'filterping' options in - /etc/shorewall/interfaces will all generate an error.
    -
    -
  2. -
  3. It is now possible to direct Shorewall to create a "label" - such as  "eth0:0" for IP addresses that it creates under ADD_IP_ALIASES=Yes - and ADD_SNAT_ALIASES=Yes. This is done by specifying the label instead -of just the interface name:
    -  
    -    a) In the INTERFACE column of /etc/shorewall/masq
    -    b) In the INTERFACE column of /etc/shorewall/nat
    -  
  4. -
  5. When an interface name is entered in the SUBNET column of -the /etc/shorewall/masq file, Shorewall previously masqueraded traffic -from only the first subnet defined on that interface. It did not masquerade - traffic from:
    -  
    -    a) The subnets associated with other addresses on the interface.
    -    b) Subnets accessed through local routers.
    -  
    - Beginning with Shorewall 1.3.14, if you enter an interface name -in the SUBNET column, shorewall will use the firewall's routing table -to construct the masquerading/SNAT rules.
    -  
    - Example 1 -- This is how it works in 1.3.14.
    -   
    - -
       [root@gateway test]# cat /etc/shorewall/masq
    #INTERFACE              SUBNET                  ADDRESS
    eth0                    eth2                    206.124.146.176
    #LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE
    - -
       [root@gateway test]# ip route show dev eth2
    192.168.1.0/24  scope link
    192.168.10.0/24  proto kernel  scope link  src 192.168.10.254
    - -
       [root@gateway test]# shorewall start
    ...
    Masqueraded Subnets and Hosts:
    To 0.0.0.0/0 from 192.168.1.0/24 through eth0 using 206.124.146.176
    To 0.0.0.0/0 from 192.168.10.0/24 through eth0 using 206.124.146.176
    Processing /etc/shorewall/tos...
    -  
    - When upgrading to Shorewall 1.3.14, if you have multiple local -subnets connected to an interface that is specified in the SUBNET column -of an /etc/shorewall/masq entry, your /etc/shorewall/masq file will need -changing. In most cases, you will simply be able to remove redundant entries. -In some cases though, you might want to change from using the interface -name to listing specific subnetworks if the change described above will -cause masquerading to occur on subnetworks that you don't wish to masquerade.
    -  
    - Example 2 -- Suppose that your current config is as follows:
    -   
    - -
       [root@gateway test]# cat /etc/shorewall/masq
    #INTERFACE              SUBNET                  ADDRESS
    eth0                    eth2                    206.124.146.176
    eth0                    192.168.10.0/24         206.124.146.176
    #LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE
    - -
       [root@gateway test]# ip route show dev eth2
    192.168.1.0/24  scope link
    192.168.10.0/24  proto kernel  scope link  src 192.168.10.254
    [root@gateway test]#
    -  
    -    In this case, the second entry in /etc/shorewall/masq is no -longer required.
    -  
    - Example 3 -- What if your current configuration is like this?
    -  
    - -
       [root@gateway test]# cat /etc/shorewall/masq
    #INTERFACE              SUBNET                  ADDRESS
    eth0                    eth2                    206.124.146.176
    #LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE
    - -
       [root@gateway test]# ip route show dev eth2
    192.168.1.0/24  scope link
    192.168.10.0/24  proto kernel  scope link  src 192.168.10.254
    [root@gateway test]#
    -  
    -    In this case, you would want to change the entry in  /etc/shorewall/masq - to:
    - -
       #INTERFACE              SUBNET                  ADDRESS
    eth0                    192.168.1.0/24          206.124.146.176
    #LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE
    -
  6. - +
  7. The 'check' command is no longer supported.
    +
    +
  8. +
  9. The MERGE_HOSTS variable in shorewall.conf is no longer supported. +Shorewall 1.4 behavior is the same as 1.3 with MERGE_HOSTS=Yes.
    +
    +
  10. +
  11. Interface names of the form <device>:<integer> in /etc/shorewall/interfaces + now generate an error.
    +
    +
  12. +
  13. Shorewall 1.4 implements behavior consistent with OLD_PING_HANDLING=No. + OLD_PING_HANDLING=Yes will generate an error at startup as will specification + of the 'noping' or 'filterping' interface options.
    +
    +
  14. +
  15. The 'routestopped' option in the /etc/shorewall/interfaces and /etc/shorewall/hosts + files is no longer supported and will generate an error at startup if +specified.
    +
    +
  16. +
  17. The Shorewall 1.2 syntax for DNAT and REDIRECT rules is no longer +accepted.
    +
    +
  18. +
  19. The ALLOWRELATED variable in shorewall.conf is no longer supported. + Shorewall 1.4 behavior is the same as 1.3 with ALLOWRELATED=Yes.
    +
    +
  20. +
  21. The icmp.def file has been removed.
    +
+ Changes for 1.4 include:
+ +
    +
  1. The /etc/shorewall/shorewall.conf file has been completely reorganized + into logical sections.
    +
    +
  2. +
  3. LOG is now a valid action for a rule (/etc/shorewall/rules).
    +
    +
  4. +
  5. The firewall script and version file are now installed in /usr/share/shorewall.
    +
    +
  6. +
  7. Late arriving DNS replies are now silently dropped in the common chain + by default.
    +
    +
  8. +
  9. In addition to behaving like OLD_PING_HANDLING=No, Shorewall 1.4 no + longer unconditionally accepts outbound ICMP packets. So if you want to +'ping' from the firewall, you will need the appropriate rule or policy.
    +
    +
  10. +
  11. You may now disable ECN on a host or network basis.
    +
  12. +
+ +

3/5/2003 - Shorewall 1.4.0 RC1 

+ Shorewall 1.4 represents +the next step in the evolution of Shorewall. The main thrust of the initial + release is simply to remove the cruft that has accumulated in Shorewall +over time.
+
+ IMPORTANT: Shorewall 1.4.0 requires the iproute package +('ip' utility).
+
+ Function from 1.3 that has been omitted from this version include:
+ +
    +
  1. The MERGE_HOSTS variable in shorewall.conf is no longer supported. + Shorewall 1.4 behavior is the same as 1.3 with MERGE_HOSTS=Yes.
    +
    +
  2. +
  3. Interface names of the form <device>:<integer> in /etc/shorewall/interfaces + now generate an error.
    +
    +
  4. +
  5. Shorewall 1.4 implements behavior consistent with OLD_PING_HANDLING=No. + OLD_PING_HANDLING=Yes will generate an error at startup as will specification + of the 'noping' or 'filterping' interface options.
    +
    +
  6. +
  7. The 'routestopped' option in the /etc/shorewall/interfaces and /etc/shorewall/hosts + files is no longer supported and will generate an error at startup if +specified.
    +
    +
  8. +
  9. The Shorewall 1.2 syntax for DNAT and REDIRECT rules is no longer + accepted.
    +
    +
  10. +
  11. The ALLOWRELATED variable in shorewall.conf is no longer supported. + Shorewall 1.4 behavior is the same as 1.3 with ALLOWRELATED=Yes.
    +
    +
  12. +
  13. The icmp.def file has been removed.
    +
  14. + +
+ Changes for 1.4 include:
+ +
    +
  1. The /etc/shorewall/shorewall.conf file has been completely reorganized + into logical sections.
    +
    +
  2. +
  3. LOG is now a valid action for a rule (/etc/shorewall/rules).
    +
    +
  4. +
  5. The firewall script and version file are now installed in /usr/share/shorewall.
    +
    +
  6. +
  7. Late arriving DNS replies are now silently dropped in the common +chain by default.
    +
    +
  8. +
  9. In addition to behaving like OLD_PING_HANDLING=No, Shorewall 1.4 +no longer unconditionally accepts outbound ICMP packets. So if you want +to 'ping' from the firewall, you will need the appropriate rule or policy.
    +
    +
  10. +
  11. CONTINUE is now a valid action for a rule (/etc/shorewall/rules).
    +
    +
  12. +
  13. 802.11b devices with names of the form wlan<n> + now support the 'maclist' option.
    +
    +
  14. +
  15. Explicit Congestion Notification (ECN - RFC 3168) may now +be turned off on a host or network basis using the new /etc/shorewall/ecn + file. To use this facility:
    +
    +    a) You must be running kernel 2.4.20
    +    b) You must have applied the patch in
    +    http://www.shorewall/net/pub/shorewall/ecn/patch.
    +    c) You must have iptables 1.2.7a installed.
    +
    +
  16. +
  17. The /etc/shorewall/params file is now processed first so that variables +may be used in the /etc/shorewall/shorewall.conf file.
  18. + +
+ +

2/27/2003 - Shorewall 1.4.0 Beta 2 

+ Shorewall 1.4 represents +the next step in the evolution of Shorewall. The main thrust of the initial + release is simply to remove the cruft that has accumulated in Shorewall +over time.
+
+ IMPORTANT: Shorewall 1.4.0 REQUIRES the iproute package + ('ip' utility).
+
+ Function from 1.3 that has been omitted from this version include:
+ +
    +
  1. The 'check' command is no longer supported.
    +
    +
  2. +
  3. The MERGE_HOSTS variable in shorewall.conf is no longer supported. + Shorewall 1.4 behavior is the same as 1.3 with MERGE_HOSTS=Yes.
    +
    +
  4. +
  5. Interface names of the form <device>:<integer> in /etc/shorewall/interfaces + now generate an error.
    +
    +
  6. +
  7. Shorewall 1.4 implements behavior consistent with OLD_PING_HANDLING=No. + OLD_PING_HANDLING=Yes will generate an error at startup as will specification + of the 'noping' or 'filterping' interface options.
    +
    +
  8. +
  9. The 'routestopped' option in the /etc/shorewall/interfaces and /etc/shorewall/hosts + files is no longer supported and will generate an error at startup if +specified.
    +
    +
  10. +
  11. The Shorewall 1.2 syntax for DNAT and REDIRECT rules is no longer + accepted.
    +
    +
  12. +
  13. The ALLOWRELATED variable in shorewall.conf is no longer supported. + Shorewall 1.4 behavior is the same as 1.3 with ALLOWRELATED=Yes.
    +
    +
  14. +
  15. The icmp.def file has been removed.
    +
  16. + +
+ Changes for 1.4 include:
+ +
    +
  1. The /etc/shorewall/shorewall.conf file has been completely reorganized + into logical sections.
    +
    +
  2. +
  3. LOG is now a valid action for a rule (/etc/shorewall/rules).
    +
    +
  4. +
  5. The firewall script and version file are now installed in /usr/share/shorewall.
    +
    +
  6. +
  7. Late arriving DNS replies are now silently dropped in the common + chain by default.
    +
    +
  8. +
  9. In addition to behaving like OLD_PING_HANDLING=No, Shorewall 1.4 + no longer unconditionally accepts outbound ICMP packets. So if you want +to 'ping' from the firewall, you will need the appropriate rule or policy.
    +
    +
  10. +
  11. You may now disable ECN on a host or network basis.
    +
  12. + +
+ +

2/21/2003 - Shorewall 1.4.0 Beta 1 

+ Shorewall 1.4 represents +the next step in the evolution of Shorewall. The main thrust of the initial + release is simply to remove the cruft that has accumulated in Shorewall +over time.
+
+ IMPORTANT: Shorewall 1.4.0 REQUIRES the iproute package + ('ip' utility).
+
+ Function from 1.3 that has been omitted from this version include:
+ +
    +
  1. The MERGE_HOSTS variable in shorewall.conf is no longer supported. + Shorewall 1.4 behavior is the same as 1.3 with MERGE_HOSTS=Yes.
    +
    +
  2. +
  3. Interface names of the form <device>:<integer> in /etc/shorewall/interfaces + now generate an error.
    +
    +
  4. +
  5. Shorewall 1.4 implements behavior consistent with OLD_PING_HANDLING=No. + OLD_PING_HANDLING=Yes will generate an error at startup as will specification + of the 'noping' or 'filterping' interface options.
    +
    +
  6. +
  7. The 'routestopped' option in the /etc/shorewall/interfaces and +/etc/shorewall/hosts files is no longer supported and will generate an +error at startup if specified.
    +
    +
  8. +
  9. The Shorewall 1.2 syntax for DNAT and REDIRECT rules is no longer + accepted.
    +
    +
  10. +
  11. The ALLOWRELATED variable in shorewall.conf is no longer supported. + Shorewall 1.4 behavior is the same as 1.3 with ALLOWRELATED=Yes.
    +
    +
  12. +
  13. The icmp.def file has been removed.
    +
  14. + +
+ Changes for 1.4 include:
+ +
    +
  1. The /etc/shorewall/shorewall.conf file has been completely reorganized + into logical sections.
    +
    +
  2. +
  3. LOG is now a valid action for a rule (/etc/shorewall/rules).
    +
    +
  4. +
  5. The firewall script and version file are now installed in /usr/share/shorewall.
    +
    +
  6. +
  7. Late arriving DNS replies are now silently dropped in the common + chain by default.
    +
    +
  8. +
  9. In addition to behaving like OLD_PING_HANDLING=No, Shorewall 1.4 + no longer unconditionally accepts outbound ICMP packets. So if you want + to 'ping' from the firewall, you will need the appropriate rule or policy. +
  10. + +
+ +

2/8/2003 - Shoreawall 1.3.14

+ +

New features include

+ +
    +
  1. An OLD_PING_HANDLING option has been added to shorewall.conf. + When set to Yes, Shorewall ping handling is as it has always been (see + http://www.shorewall.net/ping.html).
    +
    + When OLD_PING_HANDLING=No, icmp echo (ping) is handled via rules + and policies just like any other connection request. The FORWARDPING=Yes + option in shorewall.conf and the 'noping' and 'filterping' options in + /etc/shorewall/interfaces will all generate an error.
    +
    +
  2. +
  3. It is now possible to direct Shorewall to create a "label" +such as  "eth0:0" for IP addresses that it creates under ADD_IP_ALIASES=Yes + and ADD_SNAT_ALIASES=Yes. This is done by specifying the label instead + of just the interface name:
    +  
    +    a) In the INTERFACE column of /etc/shorewall/masq
    +    b) In the INTERFACE column of /etc/shorewall/nat
    +  
  4. +
  5. Support for OpenVPN Tunnels.
    +
    +
  6. +
  7. Support for VLAN devices with names of the form $DEV.$VID (e.g., + eth0.0)
    +
    +
  8. +
  9. In /etc/shorewall/tcrules, the MARK value may be optionally followed + by ":" and either 'F' or 'P' to designate that the marking will occur +in the FORWARD or PREROUTING chains respectively. If this additional specification + is omitted, the chain used to mark packets will be determined by the setting + of the MARK_IN_FORWARD_CHAIN option in shorewall.conf.
    +
    +
  10. +
  11. When an interface name is entered in the SUBNET column of the + /etc/shorewall/masq file, Shorewall previously masqueraded traffic from + only the first subnet defined on that interface. It did not masquerade + traffic from:
    +  
    +    a) The subnets associated with other addresses on the interface.
    +    b) Subnets accessed through local routers.
    +  
    + Beginning with Shorewall 1.3.14, if you enter an interface name + in the SUBNET column, shorewall will use the firewall's routing table + to construct the masquerading/SNAT rules.
    +  
    + Example 1 -- This is how it works in 1.3.14.
    +   
    + + +
       [root@gateway test]# cat /etc/shorewall/masq
    #INTERFACE              SUBNET                  ADDRESS
    eth0                    eth2                    206.124.146.176
    #LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE
    + + +
       [root@gateway test]# ip route show dev eth2
    192.168.1.0/24  scope link
    192.168.10.0/24  proto kernel  scope link  src 192.168.10.254
    + + +
       [root@gateway test]# shorewall start
    ...
    Masqueraded Subnets and Hosts:
    To 0.0.0.0/0 from 192.168.1.0/24 through eth0 using 206.124.146.176
    To 0.0.0.0/0 from 192.168.10.0/24 through eth0 using 206.124.146.176
    Processing /etc/shorewall/tos...
    +  
    + When upgrading to Shorewall 1.3.14, if you have multiple local + subnets connected to an interface that is specified in the SUBNET column + of an /etc/shorewall/masq entry, your /etc/shorewall/masq file will need + changing. In most cases, you will simply be able to remove redundant entries. + In some cases though, you might want to change from using the interface + name to listing specific subnetworks if the change described above will +cause masquerading to occur on subnetworks that you don't wish to masquerade.
    +  
    + Example 2 -- Suppose that your current config is as follows:
    +   
    + + +
       [root@gateway test]# cat /etc/shorewall/masq
    #INTERFACE              SUBNET                  ADDRESS
    eth0                    eth2                    206.124.146.176
    eth0                    192.168.10.0/24         206.124.146.176
    #LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE
    + + +
       [root@gateway test]# ip route show dev eth2
    192.168.1.0/24  scope link
    192.168.10.0/24  proto kernel  scope link  src 192.168.10.254
    [root@gateway test]#
    +  
    +    In this case, the second entry in /etc/shorewall/masq is +no longer required.
    +  
    + Example 3 -- What if your current configuration is like this?
    +  
    + + +
       [root@gateway test]# cat /etc/shorewall/masq
    #INTERFACE              SUBNET                  ADDRESS
    eth0                    eth2                    206.124.146.176
    #LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE
    + + +
       [root@gateway test]# ip route show dev eth2
    192.168.1.0/24  scope link
    192.168.10.0/24  proto kernel  scope link  src 192.168.10.254
    [root@gateway test]#
    +  
    +    In this case, you would want to change the entry in  /etc/shorewall/masq + to:
    + + +
       #INTERFACE              SUBNET                  ADDRESS
    eth0                    192.168.1.0/24          206.124.146.176
    #LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE
    +
  12. + +
+ +


+ 2/5/2003 - Shorewall Support included in Webmin 1.060

+ +

Webmin version 1.060 now has Shorewall support included as standard. See + http://www.webmin.com.
+
+ 2/4/2003 - Shorewall 1.3.14-RC1

+

Includes the Beta 2 content plus support for OpenVPN tunnels.

+ +

1/28/2003 - Shorewall 1.3.14-Beta2

+ +

Includes the Beta 1 content plus restores VLAN device names of the form + $dev.$vid (e.g., eth0.1)

+ +

1/25/2003 - Shorewall 1.3.14-Beta1
+

+ +

The Beta includes the following changes:
+

+ +
    +
  1. An OLD_PING_HANDLING option has been added to shorewall.conf. + When set to Yes, Shorewall ping handling is as it has always been (see + http://www.shorewall.net/ping.html).
    +
    + When OLD_PING_HANDLING=No, icmp echo (ping) is handled via rules + and policies just like any other connection request. The FORWARDPING=Yes + option in shorewall.conf and the 'noping' and 'filterping' options in + /etc/shorewall/interfaces will all generate an error.
    +
    +
  2. +
  3. It is now possible to direct Shorewall to create a "label" + such as  "eth0:0" for IP addresses that it creates under ADD_IP_ALIASES=Yes + and ADD_SNAT_ALIASES=Yes. This is done by specifying the label instead + of just the interface name:
    +  
    +    a) In the INTERFACE column of /etc/shorewall/masq
    +    b) In the INTERFACE column of /etc/shorewall/nat
    +  
  4. +
  5. When an interface name is entered in the SUBNET column +of the /etc/shorewall/masq file, Shorewall previously masqueraded traffic + from only the first subnet defined on that interface. It did not masquerade + traffic from:
    +  
    +    a) The subnets associated with other addresses on the interface.
    +    b) Subnets accessed through local routers.
    +  
    + Beginning with Shorewall 1.3.14, if you enter an interface name + in the SUBNET column, shorewall will use the firewall's routing table + to construct the masquerading/SNAT rules.
    +  
    + Example 1 -- This is how it works in 1.3.14.
    +   
    + + +
       [root@gateway test]# cat /etc/shorewall/masq
    #INTERFACE              SUBNET                  ADDRESS
    eth0                    eth2                    206.124.146.176
    #LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE
    + + +
       [root@gateway test]# ip route show dev eth2
    192.168.1.0/24  scope link
    192.168.10.0/24  proto kernel  scope link  src 192.168.10.254
    + + +
       [root@gateway test]# shorewall start
    ...
    Masqueraded Subnets and Hosts:
    To 0.0.0.0/0 from 192.168.1.0/24 through eth0 using 206.124.146.176
    To 0.0.0.0/0 from 192.168.10.0/24 through eth0 using 206.124.146.176
    Processing /etc/shorewall/tos...
    +  
    + When upgrading to Shorewall 1.3.14, if you have multiple local + subnets connected to an interface that is specified in the SUBNET column + of an /etc/shorewall/masq entry, your /etc/shorewall/masq file will need + changing. In most cases, you will simply be able to remove redundant entries. + In some cases though, you might want to change from using the interface + name to listing specific subnetworks if the change described above will +cause masquerading to occur on subnetworks that you don't wish to masquerade.
    +  
    + Example 2 -- Suppose that your current config is as follows:
    +   
    + + +
       [root@gateway test]# cat /etc/shorewall/masq
    #INTERFACE              SUBNET                  ADDRESS
    eth0                    eth2                    206.124.146.176
    eth0                    192.168.10.0/24         206.124.146.176
    #LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE
    + + +
       [root@gateway test]# ip route show dev eth2
    192.168.1.0/24  scope link
    192.168.10.0/24  proto kernel  scope link  src 192.168.10.254
    [root@gateway test]#
    +  
    +    In this case, the second entry in /etc/shorewall/masq is +no longer required.
    +  
    + Example 3 -- What if your current configuration is like this?
    +  
    + + +
       [root@gateway test]# cat /etc/shorewall/masq
    #INTERFACE              SUBNET                  ADDRESS
    eth0                    eth2                    206.124.146.176
    #LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE
    + + +
       [root@gateway test]# ip route show dev eth2
    192.168.1.0/24  scope link
    192.168.10.0/24  proto kernel  scope link  src 192.168.10.254
    [root@gateway test]#
    +  
    +    In this case, you would want to change the entry in  /etc/shorewall/masq + to:
    + + +
       #INTERFACE              SUBNET                  ADDRESS
    eth0                    192.168.1.0/24          206.124.146.176
    #LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE
    +
  6. + +
+

1/18/2003 - Shorewall 1.3.13 Documentation in PDF Format

- -

Juraj Ontkanin has produced a PDF containing the Shorewall 1.3.13 documenation. - the PDF may be downloaded from

-     Juraj Ontkanin has produced a PDF containing the Shorewall 1.3.13 documenation. + the PDF may be downloaded from

+    
ftp://slovakia.shorewall.net/mirror/shorewall/pdf/
-     http://slovakia.shorewall.net/pub/shorewall/pdf/ - +     http://slovakia.shorewall.net/pub/shorewall/pdf/ +

1/17/2003 - shorewall.net has MOVED 

- +

Thanks to the generosity of Alex Martin and Rett Consulting, www.shorewall.net and ftp.shorewall.net -are now hosted on a system in Bellevue, Washington. A big thanks to Alex -for making this happen.
-

- + href="http://www.rettc.com">Rett Consulting, www.shorewall.net and +ftp.shorewall.net are now hosted on a system in Bellevue, Washington. A +big thanks to Alex for making this happen.
+

+

1/13/2003 - Shorewall 1.3.13
-

- +

+

Just includes a few things that I had on the burner:
-

- +

+
    -
  1. A new 'DNAT-' action has been added for entries in the - /etc/shorewall/rules file. DNAT- is intended for advanced users who - wish to minimize the number of rules that connection requests must +
  2. A new 'DNAT-' action has been added for entries in +the /etc/shorewall/rules file. DNAT- is intended for advanced users +who wish to minimize the number of rules that connection requests must traverse.
    -
    - A Shorewall DNAT rule actually generates two iptables rules: - a header rewriting rule in the 'nat' table and an ACCEPT rule in the - 'filter' table. A DNAT- rule only generates the first of these rules. - This is handy when you have several DNAT rules that would generate the - same ACCEPT rule.
    -
    -    Here are three rules from my previous rules file:
    -
    -         DNAT   net  dmz:206.124.146.177 tcp smtp - 206.124.146.178
    -         DNAT   net  dmz:206.124.146.177 tcp smtp - 206.124.146.179
    -         ACCEPT net  dmz:206.124.146.177 tcp www,smtp,ftp,...
    -
    -    These three rules ended up generating _three_ copies of
    -
    -          ACCEPT net  dmz:206.124.146.177 tcp smtp
    -
    -    By writing the rules this way, I end up with only one copy - of the ACCEPT rule.
    -
    -         DNAT-  net  dmz:206.124.146.177 tcp smtp -  206.124.146.178
    -         DNAT-  net  dmz:206.124.146.177 tcp smtp -  206.124.146.179
    -         ACCEPT net  dmz:206.124.146.177 tcp www,smtp,ftp,....
    -
    -
  3. -
  4. The 'shorewall check' command now prints out the applicable - policy between each pair of zones.
    -
    -
  5. -
  6. A new CLEAR_TC option has been added to shorewall.conf. - If this option is set to 'No' then Shorewall won't clear the current -traffic control rules during [re]start. This setting is intended for use -by people that prefer to configure traffic shaping when the network interfaces -come up rather than when the firewall is started. If that is what you -want to do, set TC_ENABLED=Yes and CLEAR_TC=No and do not supply an /etc/shorewall/tcstart - file. That way, your traffic shaping rules can still use the 'fwmark' -classifier based on packet marking defined in /etc/shorewall/tcrules.
    -
    -
  7. -
  8. A new SHARED_DIR variable has been added that allows -distribution packagers to easily move the shared directory (default -/usr/lib/shorewall). Users should never have a need to change the value -of this shorewall.conf setting.
    -
  9. - -
- -

1/6/2003 - BURNOUT -

- -

Until further notice, I will not be involved in either Shorewall Development - or Shorewall Support

- -

-Tom Eastep
-

- -

12/30/2002 - Shorewall Documentation in PDF Format

- -

Juraj Ontkanin has produced a PDF containing the Shorewall 1.3.12 documenation. - the PDF may be downloaded from

- -

    ftp://slovakia.shorewall.net/mirror/shorewall/pdf/
-     http://slovakia.shorewall.net/pub/shorewall/pdf/
-

- -

12/27/2002 - Shorewall 1.3.12 Released

- -

Features include:
-

- -
    -
  1. "shorewall refresh" now reloads the traffic shaping - rules (tcrules and tcstart).
  2. -
  3. "shorewall debug [re]start" now turns off debugging - after an error occurs. This places the point of the failure near -the end of the trace rather than up in the middle of it.
  4. -
  5. "shorewall [re]start" has been speeded up by more -than 40% with my configuration. Your milage may vary.
  6. -
  7. A "shorewall show classifiers" command has been added - which shows the current packet classification filters. The output - from this command is also added as a separate page in "shorewall - monitor"
  8. -
  9. ULOG (must be all caps) is now accepted as a valid -syslog level and causes the subject packets to be logged using the -ULOG target rather than the LOG target. This allows you to run ulogd -(available from http://www.gnumonks.org/projects/ulogd) - and log all Shorewall messages to a separate log file.
  10. -
  11. If you are running a kernel that has a FORWARD chain - in the mangle table ("shorewall show mangle" will show you the chains - in the mangle table), you can set MARK_IN_FORWARD_CHAIN=Yes in - shorewall.conf. This allows for - marking input packets based on their destination even when you -are using Masquerading or SNAT.
  12. -
  13. I have cluttered up the /etc/shorewall directory with - empty 'init', 'start', 'stop' and 'stopped' files. If you already - have a file with one of these names, don't worry -- the upgrade process - won't overwrite your file.
  14. -
  15. I have added a new RFC1918_LOG_LEVEL variable to shorewall.conf. This variable specifies - the syslog level at which packets are logged as a result of entries - in the /etc/shorewall/rfc1918 file. Previously, these packets were always - logged at the 'info' level.
    +
    + A Shorewall DNAT rule actually generates two iptables rules: + a header rewriting rule in the 'nat' table and an ACCEPT rule in the + 'filter' table. A DNAT- rule only generates the first of these rules. + This is handy when you have several DNAT rules that would generate the + same ACCEPT rule.
    +
    +    Here are three rules from my previous rules file:
    +
    +         DNAT   net  dmz:206.124.146.177 tcp smtp - 206.124.146.178
    +         DNAT   net  dmz:206.124.146.177 tcp smtp - 206.124.146.179
    +         ACCEPT net  dmz:206.124.146.177 tcp www,smtp,ftp,...
    +
    +    These three rules ended up generating _three_ copies +of
    +
    +          ACCEPT net  dmz:206.124.146.177 tcp smtp
    +
    +    By writing the rules this way, I end up with only one +copy of the ACCEPT rule.
    +
    +         DNAT-  net  dmz:206.124.146.177 tcp smtp -  206.124.146.178
    +         DNAT-  net  dmz:206.124.146.177 tcp smtp -  206.124.146.179
    +         ACCEPT net  dmz:206.124.146.177 tcp www,smtp,ftp,....
    +
    +
  16. +
  17. The 'shorewall check' command now prints out the applicable + policy between each pair of zones.
    +
    +
  18. +
  19. A new CLEAR_TC option has been added to shorewall.conf. + If this option is set to 'No' then Shorewall won't clear the current + traffic control rules during [re]start. This setting is intended for + use by people that prefer to configure traffic shaping when the network + interfaces come up rather than when the firewall is started. If that +is what you want to do, set TC_ENABLED=Yes and CLEAR_TC=No and do not +supply an /etc/shorewall/tcstart file. That way, your traffic shaping +rules can still use the 'fwmark' classifier based on packet marking defined +in /etc/shorewall/tcrules.
    +
    +
  20. +
  21. A new SHARED_DIR variable has been added that allows + distribution packagers to easily move the shared directory (default + /usr/lib/shorewall). Users should never have a need to change the value + of this shorewall.conf setting.
-

12/20/2002 - Shorewall 1.3.12 Beta 3
-

- This version corrects a problem with Blacklist logging. -In Beta 2, if BLACKLIST_LOG_LEVEL was set to anything but ULOG, the -firewall would fail to start and "shorewall refresh" would also fail.
- -

12/20/2002 - Shorewall 1.3.12 Beta 2

- -

The first public Beta version of Shorewall 1.3.12 is now available (Beta - 1 was made available only to a limited audience).
-

- Features include:
- +

1/6/2003 - BURNOUT +

+ +

Until further notice, I will not be involved in either Shorewall Development + or Shorewall Support

+ +

-Tom Eastep
+

+ +

12/30/2002 - Shorewall Documentation in PDF Format

+ +

Juraj Ontkanin has produced a PDF containing the Shorewall 1.3.12 documenation. + the PDF may be downloaded from

+ +

    ftp://slovakia.shorewall.net/mirror/shorewall/pdf/
+     http://slovakia.shorewall.net/pub/shorewall/pdf/
+

+ +

12/27/2002 - Shorewall 1.3.12 Released

+ +

Features include:
+

+
    -
  1. "shorewall refresh" now reloads the traffic shaping - rules (tcrules and tcstart).
  2. -
  3. "shorewall debug [re]start" now turns off debugging - after an error occurs. This places the point of the failure near - the end of the trace rather than up in the middle of it.
  4. -
  5. "shorewall [re]start" has been speeded up by -more than 40% with my configuration. Your milage may vary.
  6. -
  7. A "shorewall show classifiers" command has been - added which shows the current packet classification filters. The - output from this command is also added as a separate page in "shorewall - monitor"
  8. -
  9. ULOG (must be all caps) is now accepted as a -valid syslog level and causes the subject packets to be logged -using the ULOG target rather than the LOG target. This allows you -to run ulogd (available from http://www.gnumonks.org/projects/ulogd) - and log all Shorewall messages "shorewall refresh" now reloads the traffic shaping + rules (tcrules and tcstart).
  10. +
  11. "shorewall debug [re]start" now turns off debugging + after an error occurs. This places the point of the failure near + the end of the trace rather than up in the middle of it.
  12. +
  13. "shorewall [re]start" has been speeded up by more + than 40% with my configuration. Your milage may vary.
  14. +
  15. A "shorewall show classifiers" command has been +added which shows the current packet classification filters. The +output from this command is also added as a separate page in "shorewall + monitor"
  16. +
  17. ULOG (must be all caps) is now accepted as a valid + syslog level and causes the subject packets to be logged using +the ULOG target rather than the LOG target. This allows you to run +ulogd (available from http://www.gnumonks.org/projects/ulogd) + and log all Shorewall messages to a separate log file.
  18. -
  19. If you are running a kernel that has a FORWARD - chain in the mangle table ("shorewall show mangle" will show you - the chains in the mangle table), you can set MARK_IN_FORWARD_CHAIN=Yes - in shorewall.conf. This allows for marking input packets based on -their destination even when you are using Masquerading or SNAT.
  20. -
  21. I have cluttered up the /etc/shorewall directory - with empty 'init', 'start', 'stop' and 'stopped' files. If you -already have a file with one of these names, don't worry -- the upgrade -process won't overwrite your file.
  22. - +
  23. If you are running a kernel that has a FORWARD +chain in the mangle table ("shorewall show mangle" will show you +the chains in the mangle table), you can set MARK_IN_FORWARD_CHAIN=Yes +in shorewall.conf. This allows for + marking input packets based on their destination even when you +are using Masquerading or SNAT.
  24. +
  25. I have cluttered up the /etc/shorewall directory + with empty 'init', 'start', 'stop' and 'stopped' files. If you + already have a file with one of these names, don't worry -- the upgrade + process won't overwrite your file.
  26. +
  27. I have added a new RFC1918_LOG_LEVEL variable to + shorewall.conf. This variable specifies + the syslog level at which packets are logged as a result of entries + in the /etc/shorewall/rfc1918 file. Previously, these packets were + always logged at the 'info' level.
    +
  28. +
- You may download the Beta from:
- + +

12/20/2002 - Shorewall 1.3.12 Beta 3
+

+ This version corrects a problem with Blacklist logging. + In Beta 2, if BLACKLIST_LOG_LEVEL was set to anything but ULOG, the + firewall would fail to start and "shorewall refresh" would also fail.
+ +

12/20/2002 - Shorewall 1.3.12 Beta 2

+ +

The first public Beta version of Shorewall 1.3.12 is now available (Beta + 1 was made available only to a limited audience).
+

+ Features include:
+ +
    +
  1. "shorewall refresh" now reloads the traffic + shaping rules (tcrules and tcstart).
  2. +
  3. "shorewall debug [re]start" now turns off +debugging after an error occurs. This places the point of the +failure near the end of the trace rather than up in the middle of +it.
  4. +
  5. "shorewall [re]start" has been speeded up +by more than 40% with my configuration. Your milage may vary.
  6. +
  7. A "shorewall show classifiers" command has +been added which shows the current packet classification filters. +The output from this command is also added as a separate page in "shorewall + monitor"
  8. +
  9. ULOG (must be all caps) is now accepted as +a valid syslog level and causes the subject packets to be logged +using the ULOG target rather than the LOG target. This allows you +to run ulogd (available from http://www.gnumonks.org/projects/ulogd) + and log all Shorewall messages to a separate log file.
  10. +
  11. If you are running a kernel that has a FORWARD + chain in the mangle table ("shorewall show mangle" will show you + the chains in the mangle table), you can set MARK_IN_FORWARD_CHAIN=Yes + in shorewall.conf. This allows for marking input packets based on + their destination even when you are using Masquerading or SNAT.
  12. +
  13. I have cluttered up the /etc/shorewall directory + with empty 'init', 'start', 'stop' and 'stopped' files. If you +already have a file with one of these names, don't worry -- the upgrade +process won't overwrite your file.
  14. + +
+ You may download the Beta from:
+
http://www.shorewall.net/pub/shorewall/Beta
- ftp://ftp.shorewall.net/pub/shorewall/Beta
-
- + +

12/12/2002 - Mandrake Multi Network Firewall Powered by Mandrake Linux -

- Shorewall is at the center of MandrakeSoft's recently-announced - Multi - Network Firewall (MNF) product. Here is the press - release.
- +

+ Shorewall is at the center of MandrakeSoft's +recently-announced Multi + Network Firewall (MNF) product. Here is the press + release.
+

12/7/2002 - Shorewall Support for Mandrake 9.0

- -

Two months and 3 days after I ordered Mandrake 9.0, it was finally delivered. - I have installed 9.0 on one of my systems and I am now in a + +

Two months and 3 days after I ordered Mandrake 9.0, it was finally delivered. + I have installed 9.0 on one of my systems and I am now in a position to support Shorewall users who run Mandrake 9.0.

- +

12/6/2002 - Debian 1.3.11a Packages Available
-

- - -

Apt-get sources listed at http://security.dsi.unimi.it/~lorenzo/debian.html.

- -

12/3/2002 - Shorewall 1.3.11a

- -

This is a bug-fix roll up which includes Roger Aich's fix for DNAT with - excluded subnets (e.g., "DNAT foo!bar ..."). Current 1.3.11 -users who don't need rules of this type need not upgrade to 1.3.11.

- -

11/24/2002 - Shorewall 1.3.11

- -

In this version:

- - - -

11/14/2002 - Shorewall Documentation in PDF Format

- -

Juraj Ontkanin has produced a PDF containing the Shorewall 1.3.10 documenation. - the PDF may be downloaded from

- -

    ftp://slovakia.shorewall.net/mirror/shorewall/pdf/
-     http://slovakia.shorewall.net/pub/shorewall/pdf/
-

- -

11/09/2002 - Shorewall is Back at SourceForge -

- - -

The main Shorewall 1.3 web site is now back at SourceForge at http://shorewall.sf.net.
-

+

-

11/09/2002 - Shorewall 1.3.10

+

Apt-get sources listed at http://security.dsi.unimi.it/~lorenzo/debian.html.

+ +

12/3/2002 - Shorewall 1.3.11a

+ +

This is a bug-fix roll up which includes Roger Aich's fix for DNAT with + excluded subnets (e.g., "DNAT foo!bar ..."). Current 1.3.11 + users who don't need rules of this type need not upgrade to 1.3.11.

+ +

11/24/2002 - Shorewall 1.3.11

In this version:

+

11/14/2002 - Shorewall Documentation in PDF Format

+ +

Juraj Ontkanin has produced a PDF containing the Shorewall 1.3.10 documenation. + the PDF may be downloaded from

+ +

    ftp://slovakia.shorewall.net/mirror/shorewall/pdf/
+     http://slovakia.shorewall.net/pub/shorewall/pdf/
+

+ +

11/09/2002 - Shorewall is Back at SourceForge +

+ + +

The main Shorewall 1.3 web site is now back at SourceForge at http://shorewall.sf.net.
+

+ + +

11/09/2002 - Shorewall 1.3.10

+ +

In this version:

+ + +

10/24/2002 - Shorewall is now in Gentoo Linux
-

- Alexandru Hartmann reports that his Shorewall - package is now a part of the - Gentoo Linux distribution. Thanks Alex!
- +

+ Alexandru Hartmann reports that his +Shorewall package is now a part of the Gentoo Linux distribution. + Thanks Alex!
+ +

10/23/2002 - Shorewall 1.3.10 Beta 1

- In this version:
+ In this version:
+ + + + You may download the Beta from:
+ + + + +

10/10/2002 -  Debian 1.3.9b Packages Available
+

+ + +

Apt-get sources listed at http://security.dsi.unimi.it/~lorenzo/debian.html.

+ +

10/9/2002 - Shorewall 1.3.9b

+ This release rolls up fixes to the +installer and to the firewall script.
+ + +

10/6/2002 - Shorewall.net now running on RH8.0
+

+ The firewall and server here at shorewall.net + are now running RedHat release 8.0.
+
+ 9/30/2002 - Shorewall 1.3.9a

+ Roles up the fix for broken tunnels.
+ + +

9/30/2002 - TUNNELS Broken in 1.3.9!!!

+ There is an updated firewall script + at ftp://www.shorewall.net/pub/shorewall/errata/1.3.9/firewall + -- copy that file to /usr/lib/shorewall/firewall.
+ + +

9/28/2002 - Shorewall 1.3.9

+ + +

In this version:
+

- You may download the Beta from:
- - - - -

10/10/2002 -  Debian 1.3.9b Packages Available
-

- - -

Apt-get sources listed at http://security.dsi.unimi.it/~lorenzo/debian.html.

- -

10/9/2002 - Shorewall 1.3.9b

- This release rolls up fixes to the installer - and to the firewall script.
- -

10/6/2002 - Shorewall.net now running on RH8.0
-

- The firewall and server here at shorewall.net - are now running RedHat release 8.0.
-
- 9/30/2002 - Shorewall 1.3.9a

- Roles up the fix for broken tunnels.
- -

9/30/2002 - TUNNELS Broken in 1.3.9!!!

- There is an updated firewall script -at ftp://www.shorewall.net/pub/shorewall/errata/1.3.9/firewall - -- copy that file to /usr/lib/shorewall/firewall.
- - -

9/28/2002 - Shorewall 1.3.9

- - -

In this version:
-

- - - - -

9/23/2002 - Full Shorewall Site/Mailing List Archive Search Capability - Restored
-

- 9/23/2002 - Full Shorewall Site/Mailing List Archive Search Capability + Restored
+

+ Brown Paper Bag - A couple of recent configuration - changes at www.shorewall.net broke the Search facility:
+ A couple of recent configuration + changes at www.shorewall.net broke the Search facility:
- -
+ +
+
    -
  1. Mailing List Archive Search - was not available.
  2. -
  3. The Site Search index was - incomplete
  4. -
  5. Only one page of matches - was presented.
  6. - - - -
-
- Hopefully these problems are - now corrected. -

9/23/2002 - Full Shorewall Site/Mailing List Archive Search Capability - Restored
-

- A couple of recent configuration - changes at www.shorewall.net had the negative effect of - breaking the Search facility:
- - -
    -
  1. Mailing List Archive Search - was not available.
  2. -
  3. The Site Search index was - incomplete
  4. -
  5. Only one page of matches -was presented.
  6. - - -
- Hopefully these problems are now - corrected.
- - -

9/18/2002 -  Debian 1.3.8 Packages Available
-

- - -

Apt-get sources listed at http://security.dsi.unimi.it/~lorenzo/debian.html.

- - -

9/16/2002 - Shorewall 1.3.8

- - -

In this version:
-

- - -
+ Hopefully these problems +are now corrected. +

9/23/2002 - Full Shorewall Site/Mailing List Archive Search Capability + Restored
+

+ A couple of recent configuration + changes at www.shorewall.net had the negative effect + of breaking the Search facility:
+ + +
    +
  1. Mailing List Archive +Search was not available.
  2. +
  3. The Site Search index +was incomplete
  4. +
  5. Only one page of matches + was presented.
  6. + + +
+ Hopefully these problems are + now corrected.
+ + +

9/18/2002 -  Debian 1.3.8 Packages Available
+

+ + +

Apt-get sources listed at http://security.dsi.unimi.it/~lorenzo/debian.html.

+ + +

9/16/2002 - Shorewall 1.3.8

+ + +

In this version:
+

+ + + - + - +

9/11/2002 - Debian 1.3.7c Packages Available

- +

Apt-get sources listed at http://security.dsi.unimi.it/~lorenzo/debian.html.

- +

9/2/2002 - Shorewall 1.3.7c

- -

This is a role up of a fix for "DNAT" rules where the source zone is $FW - (fw).

+ +

This is a role up of a fix for "DNAT" rules where the source zone is $FW + (fw).

- +

8/31/2002 - I'm not available

- -

I'm currently on vacation  -- please respect my need for a couple of -weeks free of Shorewall problem reports.

+ +

I'm currently on vacation  -- please respect my need for a couple of + weeks free of Shorewall problem reports.

- +

-Tom

- +

8/26/2002 - Shorewall 1.3.7b

- -

This is a role up of the "shorewall refresh" bug fix and the change which - reverses the order of "dhcp" and "norfc1918" checking.

+ +

This is a role up of the "shorewall refresh" bug fix and the change which + reverses the order of "dhcp" and "norfc1918" checking.

- +

8/26/2002 - French FTP Mirror is Operational

- +

ftp://france.shorewall.net/pub/mirrors/shorewall - is now available.

+ href="ftp://france.shorewall.net/pub/mirrors/shorewall">ftp://france.shorewall.net/pub/mirrors/shorewall + is now available.

- +

8/25/2002 - Shorewall Mirror in France

- -

Thanks to a Shorewall user in Paris, the Shorewall web site is now mirrored - at Thanks to a Shorewall user in Paris, the Shorewall web site is now mirrored + at http://france.shorewall.net.

- +

8/25/2002 - Shorewall 1.3.7a Debian Packages Available

- -

Lorenzo Martignoni reports that the packages for version 1.3.7a are available - at Lorenzo Martignoni reports that the packages for version 1.3.7a are available + at http://security.dsi.unimi.it/~lorenzo/debian.html.

- -

8/22/2002 - Shorewall 1.3.7 Wins a Brown Paper Bag Award for its Author - -- Shorewall 1.3.7a released8/22/2002 - Shorewall 1.3.7 Wins a Brown Paper Bag Award for its Author + -- Shorewall 1.3.7a released -

+

- -

1.3.7a corrects problems occurring in rules file processing when starting - Shorewall 1.3.7.

+ +

1.3.7a corrects problems occurring in rules file processing when starting + Shorewall 1.3.7.

- +

8/22/2002 - Shorewall 1.3.7 Released 8/13/2002

- +

Features in this release include:

- + - -

I would like to thank John Distler for his valuable input regarding TCP - SYN and ICMP treatment in Shorewall. That input -has led to marked improvement in Shorewall in the last + +

I would like to thank John Distler for his valuable input regarding TCP + SYN and ICMP treatment in Shorewall. That input +has led to marked improvement in Shorewall in the last two releases.

- +

8/13/2002 - Documentation in the CVS Repository

- -

The Shorewall-docs project now contains just the HTML and image files -- the Frontpage files have been removed.

+ +

The Shorewall-docs project now contains just the HTML and image files - +the Frontpage files have been removed.

- +

8/7/2002 - STABLE branch added to CVS Repository

- -

This branch will only be updated after I release a new version of Shorewall - so you can always update from this branch to get -the latest stable tree.

+ +

This branch will only be updated after I release a new version of Shorewall + so you can always update from this branch to get + the latest stable tree.

- -

8/7/2002 - Upgrade Issues section -added to the Errata Page

+ +

8/7/2002 - Upgrade Issues section added + to the Errata Page

- -

Now there is one place to go to look for issues involved with upgrading - to recent versions of Shorewall.

+ +

Now there is one place to go to look for issues involved with upgrading + to recent versions of Shorewall.

- +

8/7/2002 - Shorewall 1.3.6

- +

This is primarily a bug-fix rollup with a couple of new features:

- + - +

7/30/2002 - Shorewall 1.3.5b Released

- +

This interim release:

- + - +

7/29/2002 - New Shorewall Setup Guide Available

- +

The first draft of this guide is available at http://www.shorewall.net/shorewall_setup_guide.htm. - The guide is intended for use by people who are -setting up Shorewall to manage multiple public IP addresses -and by people who want to learn more about Shorewall than -is described in the single-address guides. Feedback on the -new guide is welcome.

+ href="http://www.shorewall.net/shorewall_setup_guide.htm"> http://www.shorewall.net/shorewall_setup_guide.htm. + The guide is intended for use by people who are +setting up Shorewall to manage multiple public IP addresses + and by people who want to learn more about Shorewall than + is described in the single-address guides. Feedback on the + new guide is welcome.

- +

7/28/2002 - Shorewall 1.3.5 Debian Package Available

- -

Lorenzo Martignoni reports that the packages are version 1.3.5a and are - available at Lorenzo Martignoni reports that the packages are version 1.3.5a and are + available at http://security.dsi.unimi.it/~lorenzo/debian.html.

- +

7/27/2002 - Shorewall 1.3.5a Released

- +

This interim release restores correct handling of REDIRECT rules.

- +

7/26/2002 - Shorewall 1.3.5 Released

- -

This will be the last Shorewall release for a while. I'm going to be -focusing on rewriting a lot of the documentation.

+ +

This will be the last Shorewall release for a while. I'm going to be + focusing on rewriting a lot of the documentation.

- +

 In this version:

- + - +

7/16/2002 - New Mirror in Argentina

- -

Thanks to Arturo "Buanzo" Busleiman, there is now a Shorewall mirror in - Argentina. Thanks Buanzo!!!

+ +

Thanks to Arturo "Buanzo" Busleiman, there is now a Shorewall mirror in + Argentina. Thanks Buanzo!!!

- +

7/16/2002 - Shorewall 1.3.4 Released

- +

In this version:

- + - +

7/8/2002 - Shorewall 1.3.3 Debian Package Available

- +

Lorenzo Marignoni reports that the packages are available at http://security.dsi.unimi.it/~lorenzo/debian.html.

- +

7/6/2002 - Shorewall 1.3.3 Released

- +

In this version:

- + - +

6/25/2002 - Samples Updated for 1.3.2

- -

The comments in the sample configuration files have been updated to reflect - new features introduced in Shorewall 1.3.2.

+ +

The comments in the sample configuration files have been updated to reflect + new features introduced in Shorewall 1.3.2.

- +

6/25/2002 - Shorewall 1.3.1 Debian Package Available

- +

Lorenzo Marignoni reports that the package is available at http://security.dsi.unimi.it/~lorenzo/debian.html.

- +

6/19/2002 - Documentation Available in PDF Format

- -

Thanks to Mike Martinez, the Shorewall Documentation is now available -for download in Adobe PDF format.

+ +

Thanks to Mike Martinez, the Shorewall Documentation is now available for + download in Adobe + PDF format.

- +

6/16/2002 - Shorewall 1.3.2 Released

- +

In this version:

- + - +

6/6/2002 - Why CVS Web access is Password Protected

- -

Last weekend, I installed the CVS Web package to provide brower-based -access to the Shorewall CVS repository. Since then, I have had several -instances where my server was almost unusable due to the high load generated -by website copying tools like HTTrack and WebStripper. These mindless tools:

+ +

Last weekend, I installed the CVS Web package to provide brower-based access + to the Shorewall CVS repository. Since then, I have had several instances +where my server was almost unusable due to the high load generated by website +copying tools like HTTrack and WebStripper. These mindless tools:

- + - -

These tools/weapons are particularly damaging when combined with CVS Web - because they doggedly follow every link in the cgi-generated - HTML resulting in 1000s of executions of the cvsweb.cgi - script. Yesterday, I spend several hours implementing - measures to block these tools but unfortunately, these measures - resulted in my server OOM-ing under even moderate load.

+ +

These tools/weapons are particularly damaging when combined with CVS Web + because they doggedly follow every link in the cgi-generated + HTML resulting in 1000s of executions of the cvsweb.cgi + script. Yesterday, I spend several hours implementing + measures to block these tools but unfortunately, these measures + resulted in my server OOM-ing under even moderate load.

- -

Until I have the time to understand the cause of the OOM (or until I buy - more RAM if that is what is required), CVS Web access - will remain Password Protected.

+ +

Until I have the time to understand the cause of the OOM (or until I buy + more RAM if that is what is required), CVS Web access + will remain Password Protected.

- +

6/5/2002 - Shorewall 1.3.1 Debian Package Available

- +

Lorenzo Marignoni reports that the package is available at http://security.dsi.unimi.it/~lorenzo/debian.html.

- +

6/2/2002 - Samples Corrected

- -

The 1.3.0 samples configurations had several serious problems that prevented - DNS and SSH from working properly. These problems - have been corrected in the The 1.3.0 samples configurations had several serious problems that prevented + DNS and SSH from working properly. These problems + have been corrected in the 1.3.1 samples.

- +

6/1/2002 - Shorewall 1.3.1 Released

- +

Hot on the heels of 1.3.0, this release:

- + - +

5/29/2002 - Shorewall 1.3.0 Released

- -

In addition to the changes in Beta 1, Beta 2 and RC1, Shorewall 1.3.0 - includes:

+ +

In addition to the changes in Beta 1, Beta 2 and RC1, Shorewall 1.3.0 + includes:

- + - +

5/23/2002 - Shorewall 1.3 RC1 Available

- -

In addition to the changes in Beta 1 and Beta 2, RC1 (Version 1.2.92) - incorporates the following:

+ +

In addition to the changes in Beta 1 and Beta 2, RC1 (Version 1.2.92) + incorporates the following:

- + - +

5/19/2002 - Shorewall 1.3 Beta 2 Available

- -

In addition to the changes in Beta 1, this release which carries the -designation 1.2.91 adds:

+ +

In addition to the changes in Beta 1, this release which carries the + designation 1.2.91 adds:

- + - +

5/17/2002 - Shorewall 1.3 Beta 1 Available

- -

Beta 1 carries the version designation 1.2.90 and implements the following - features:

+ +

Beta 1 carries the version designation 1.2.90 and implements the following + features:

- + - +

5/4/2002 - Shorewall 1.2.13 is Available

- +

In this version:

- + - +

4/30/2002 - Shorewall Debian News

- -

Lorenzo Marignoni reports that Shorewall 1.2.12 is now in both the -Debian - Testing Branch and the Debian - Unstable Branch.

+ +

Lorenzo Marignoni reports that Shorewall 1.2.12 is now in both the Debian +Testing Branch and the Debian +Unstable Branch.

- +

4/20/2002 - Shorewall 1.2.12 is Available

- + - +

4/17/2002 - Shorewall Debian News

- +

Lorenzo Marignoni reports that:

- + - +

Thanks, Lorenzo!

- +

4/16/2002 - Shorewall 1.2.11 RPM Available for SuSE

- -

Thanks to Stefan Mohr, there - is now a Shorewall 1.2.11 - SuSE RPM available.

+ +

Thanks to Stefan Mohr, there + is now a Shorewall 1.2.11 + SuSE RPM available.

- +

4/13/2002 - Shorewall 1.2.11 Available

- +

In this version:

- + - +

4/13/2002 - Hamburg Mirror now has FTP

- +

Stefan now has an FTP mirror at ftp://germany.shorewall.net/pub/shorewall.  - Thanks Stefan!

+ href="ftp://germany.shorewall.net/pub/shorewall"> ftp://germany.shorewall.net/pub/shorewall.  + Thanks Stefan!

- +

4/12/2002 - New Mirror in Hamburg

- -

Thanks to Stefan Mohr, there - is now a mirror of the Shorewall website at http://germany.shorewall.net. -

+ +

Thanks to Stefan Mohr, there + is now a mirror of the Shorewall website at http://germany.shorewall.net. +

- +

4/10/2002 - Shorewall QuickStart Guide Version 1.1 Available

- -

Version 1.1 of the QuickStart - Guide is now available. Thanks to those who -have read version 1.0 and offered their suggestions. + +

Version 1.1 of the QuickStart + Guide is now available. Thanks to those who +have read version 1.0 and offered their suggestions. Corrections have also been made to the sample scripts.

- +

4/9/2002 - Shorewall QuickStart Guide Version 1.0 Available

- -

Version 1.0 of the QuickStart - Guide is now available. This Guide and its accompanying - sample configurations are expected to provide a replacement - for the recently withdrawn parameterized samples.

+ +

Version 1.0 of the QuickStart + Guide is now available. This Guide and its accompanying + sample configurations are expected to provide a replacement + for the recently withdrawn parameterized samples. +

- +

4/8/2002 - Parameterized Samples Withdrawn

- +

Although the parameterized - samples have allowed people to get a firewall - up and running quickly, they have unfortunately set -the wrong level of expectation among those who have used - them. I am therefore withdrawing support for the samples - and I am recommending that they not be used in new Shorewall -installations.

+ href="http://www.shorewall.net/pub/shorewall/samples-1.2.1/">parameterized + samples have allowed people to get a firewall + up and running quickly, they have unfortunately set +the wrong level of expectation among those who have used + them. I am therefore withdrawing support for the samples + and I am recommending that they not be used in new Shorewall installations.

- +

4/2/2002 - Updated Log Parser

- -

John Lodge has provided an updated - version of his CGI-based log parser - with corrected date handling.

+ +

John Lodge has provided an updated + version of his CGI-based log parser + with corrected date handling.

- +

3/30/2002 - Shorewall Website Search Improvements

- -

The quick search on the home page now excludes the mailing list archives. - The Extended Search - allows excluding the archives or restricting the search - to just the archives. An archive search form is also available - on the mailing + +

The quick search on the home page now excludes the mailing list archives. + The Extended Search + allows excluding the archives or restricting the search + to just the archives. An archive search form is also available + on the mailing list information page.

- +

3/28/2002 - Debian Shorewall News (From Lorenzo Martignoni)

- + - +

3/25/2002 - Log Parser Available

- +

John Lodge has provided a CGI-based log parser for Shorewall. Thanks - John.

+ href="pub/shorewall/parsefw/">CGI-based log parser for Shorewall. Thanks + John.

- +

3/20/2002 - Shorewall 1.2.10 Released

- +

In this version:

- + - +

3/11/2002 - Shorewall 1.2.9 Released

- +

In this version:

- + - +

3/1/2002 - 1.2.8 Debian Package is Available

- +

See http://security.dsi.unimi.it/~lorenzo/debian.html

- +

2/25/2002 - New Two-interface Sample

- -

I've enhanced the two interface sample to allow access from the firewall - to servers in the local zone - - http://www.shorewall.net/pub/shorewall/LATEST.samples/two-interfaces.tgz

+ +

I've enhanced the two interface sample to allow access from the firewall + to servers in the local zone - + http://www.shorewall.net/pub/shorewall/LATEST.samples/two-interfaces.tgz

- +

2/23/2002 - Shorewall 1.2.8 Released

- -

Do to a serious problem with 1.2.7, I am releasing 1.2.8. It corrects - problems associated with the lock file used to prevent multiple state-changing - operations from occuring simultaneously. My apologies - for any inconvenience my carelessness may have caused.

+ +

Do to a serious problem with 1.2.7, I am releasing 1.2.8. It corrects + problems associated with the lock file used to prevent multiple state-changing + operations from occuring simultaneously. My apologies + for any inconvenience my carelessness may have caused.

- +

2/22/2002 - Shorewall 1.2.7 Released

- +

In this version:

- + - +

2/18/2002 - 1.2.6 Debian Package is Available

- +

See http://security.dsi.unimi.it/~lorenzo/debian.html

- +

2/8/2002 - Shorewall 1.2.6 Released

- +

In this version:

- + - +

2/4/2002 - Shorewall 1.2.5 Debian Package Available

- +

see http://security.dsi.unimi.it/~lorenzo/debian.html

- +

2/1/2002 - Shorewall 1.2.5 Released

- -

Due to installation problems with Shorewall 1.2.4, I have released Shorewall - 1.2.5. Sorry for the rapid-fire development.

+ +

Due to installation problems with Shorewall 1.2.4, I have released Shorewall + 1.2.5. Sorry for the rapid-fire development.

- +

In version 1.2.5:

- + - +

1/28/2002 - Shorewall 1.2.4 Released

- + - +

1/27/2002 - Shorewall 1.2.3 Debian Package Available -- see http://security.dsi.unimi.it/~lorenzo/debian.html

- +

1/20/2002 - Corrected firewall script available 

- -

Corrects a problem with BLACKLIST_LOGLEVEL. See the - errata for details.

+ +

Corrects a problem with BLACKLIST_LOGLEVEL. See the + errata for details.

- +

1/19/2002 - Shorewall 1.2.3 Released

- +

This is a minor feature and bugfix release. The single new feature is:

- + - +

The following problems were corrected:

- + - +

1/18/2002 - Shorewall 1.2.2 packaged with new LEAF release

- -

Jacques Nilo and Eric Wolzak have released a kernel 2.4.16 LEAF distribution - that includes Shorewall 1.2.2. See http://leaf.sourceforge.net/devel/jnilo - for details.

+ +

Jacques Nilo and Eric Wolzak have released a kernel 2.4.16 LEAF distribution + that includes Shorewall 1.2.2. See http://leaf.sourceforge.net/devel/jnilo + for details.

- +

1/11/2002 - Debian Package (.deb) Now Available - Thanks to Lorenzo Martignoni, a 1.2.2 - Shorewall Debian package is now available. There is - a link to Lorenzo's site from the Lorenzo Martignoni, a 1.2.2 + Shorewall Debian package is now available. There is + a link to Lorenzo's site from the Shorewall download page.

- +

1/9/2002 - Updated 1.2.2 /sbin/shorewall available - This corrected version restores - the "shorewall status" command to health.

+ href="/pub/shorewall/errata/1.2.2/shorewall">This corrected version restores + the "shorewall status" command to health.

- +

1/8/2002 - Shorewall 1.2.2 Released

- +

In version 1.2.2

- - - - -

1/5/2002 - New Parameterized Samples (version 1.2.0) released. These are minor updates - to the previously-released samples. There are two -new rules added:

- - - - - -

See the README file for upgrade instructions.

- - -

1/1/2002 - Shorewall Mailing List Moving

- - -

The Shorewall mailing list hosted at - Sourceforge is moving to Shorewall.net. If you - are a current subscriber to the list at Sourceforge, please - see these instructions. - If you would like to subscribe to the new list, visit - http://www.shorewall.net/mailman/listinfo/shorewall-users.

- - -

12/31/2001 - Shorewall 1.2.1 Released

- - -

In version 1.2.1:

- - - - - -

12/21/2001 - Shorewall 1.2.0 Released! - I couldn't resist -releasing 1.2 on 12/21/2001

- - -

Version 1.2 contains the following new features:

- - - - - -

For the next month or so, I will continue to provide corrections to version - 1.1.18 as necessary so that current version 1.1.x -users will not be forced into a quick upgrade to 1.2.0 just -to have access to bug fixes.

- - -

For those of you who have installed one of the Beta RPMS, you will need - to use the "--oldpackage" option when upgrading to - 1.2.0:

- - -
- - -

rpm -Uvh --oldpackage shorewall-1.2-0.noarch.rpm

-
- - -

12/19/2001 - Thanks to Steve - Cowles, there is now a Shorewall mirror in Texas. - This web site is mirrored at http://www.infohiiway.com/shorewall - and the ftp site is at ftp://ftp.infohiiway.com/pub/mirrors/shorewall. 

- -

11/30/2001 - A new set of the parameterized Sample - Configurations has been released. In this version:

- - - - -

11/20/2001 - The current version of Shorewall is 1.1.18. 

- - -

In this version:

- - - - - -

11/19/2001 - Thanks to Juraj - Ontkanin, there is now a Shorewall mirror - in the Slovak Republic. The website is now mirrored -at http://www.nrg.sk/mirror/shorewall - and the FTP site is mirrored at ftp://ftp.nrg.sk/mirror/shorewall.

- - -

11/2/2001 - Announcing Shorewall Parameter-driven Sample Configurations. - There are three sample configurations:

- - - + + +
  • Use of TCP RST replies + has been expanded  + + + + +
  • +
  • A LOGFILE specification +has been added to /etc/shorewall/shorewall.conf. LOGFILE is used + to tell the /sbin/shorewall program where to look for Shorewall + messages.
  • + + + + + +

    1/5/2002 - New Parameterized Samples (version 1.2.0) released. These are minor updates + to the previously-released samples. There are two +new rules added:

    + + + + + +

    See the README file for upgrade instructions.

    + + +

    1/1/2002 - Shorewall Mailing List Moving

    + + +

    The Shorewall mailing list hosted at + Sourceforge is moving to Shorewall.net. If you + are a current subscriber to the list at Sourceforge, please + see these instructions. + If you would like to subscribe to the new list, visit + http://www.shorewall.net/mailman/listinfo/shorewall-users.

    + + +

    12/31/2001 - Shorewall 1.2.1 Released

    + + +

    In version 1.2.1:

    + + + + + +

    12/21/2001 - Shorewall 1.2.0 Released! - I couldn't resist releasing +1.2 on 12/21/2001

    + + +

    Version 1.2 contains the following new features:

    + + + + + +

    For the next month or so, I will continue to provide corrections to version + 1.1.18 as necessary so that current version 1.1.x + users will not be forced into a quick upgrade to 1.2.0 + just to have access to bug fixes.

    + + +

    For those of you who have installed one of the Beta RPMS, you will need + to use the "--oldpackage" option when upgrading to + 1.2.0:

    + + +
    + + +

    rpm -Uvh --oldpackage shorewall-1.2-0.noarch.rpm

    +
    + + +

    12/19/2001 - Thanks to Steve + Cowles, there is now a Shorewall mirror in Texas. + This web site is mirrored at http://www.infohiiway.com/shorewall + and the ftp site is at ftp://ftp.infohiiway.com/pub/mirrors/shorewall. 

    + + +

    11/30/2001 - A new set of the parameterized Sample +Configurations has been released. In this version:

    + + + + + +

    11/20/2001 - The current version of Shorewall is 1.1.18. 

    + + +

    In this version:

    + + + + + +

    11/19/2001 - Thanks to Juraj + Ontkanin, there is now a Shorewall mirror + in the Slovak Republic. The website is now mirrored + at http://www.nrg.sk/mirror/shorewall + and the FTP site is mirrored at ftp://ftp.nrg.sk/mirror/shorewall.

    + + +

    11/2/2001 - Announcing Shorewall Parameter-driven Sample Configurations. + There are three sample configurations:

    + + + + +

    Samples may be downloaded from ftp://ftp.shorewall.net/pub/shorewall/samples-1.1.17 - . See the README file for instructions.

    + href="ftp://ftp.shorewall.net/pub/shorewall/samples-1.1.17"> ftp://ftp.shorewall.net/pub/shorewall/samples-1.1.17 + . See the README file for instructions.

    - -

    11/1/2001 - The current version of Shorewall is 1.1.17.  I intend - this to be the last of the 1.1 Shorewall releases.

    + +

    11/1/2001 - The current version of Shorewall is 1.1.17.  I intend + this to be the last of the 1.1 Shorewall +releases.

    - +

    In this version:

    - + - -

    10/22/2001 - The current version of Shorewall is 1.1.16. In this - version:

    + +

    10/22/2001 - The current version of Shorewall is 1.1.16. In this + version:

    - + - -

    10/15/2001 - The current version of Shorewall is 1.1.15. In this - version:

    + +

    10/15/2001 - The current version of Shorewall is 1.1.15. In this + version:

    - + - -

    10/4/2001 - The current version of Shorewall is 1.1.14. In this - version

    + +

    10/4/2001 - The current version of Shorewall is 1.1.14. In this + version

    - + - -

    9/12/2001 - The current version of Shorewall is 1.1.13. In this - version

    + +

    9/12/2001 - The current version of Shorewall is 1.1.13. In this + version

    - + - -

    8/28/2001 - The current version of Shorewall is 1.1.12. In this - version

    + +

    8/28/2001 - The current version of Shorewall is 1.1.12. In this + version

    - + - -

    7/28/2001 - The current version of Shorewall is 1.1.11. In this - version

    + +

    7/28/2001 - The current version of Shorewall is 1.1.11. In this + version

    - + - -

    7/6/2001 - The current version of Shorewall is 1.1.10. In this -version

    + +

    7/6/2001 - The current version of Shorewall is 1.1.10. In this version

    - + - -

    6/23/2001 - The current version of Shorewall is 1.1.9. In this -version

    + +

    6/23/2001 - The current version of Shorewall is 1.1.9. In this version

    - + - -

    6/18/2001 - The current version of Shorewall is 1.1.8. In this -version

    + +

    6/18/2001 - The current version of Shorewall is 1.1.8. In this version

    - + - +

    6/2/2001 - The current version of Shorewall is 1.1.7. In this version

    - + - -

    5/25/2001 - The current version of Shorewall is 1.1.6. In this -version

    + +

    5/25/2001 - The current version of Shorewall is 1.1.6. In this version

    - + - -

    5/20/2001 - The current version of Shorewall is 1.1.5. In this -version

    + +

    5/20/2001 - The current version of Shorewall is 1.1.5. In this version

    - + - -

    5/10/2001 - The current version of Shorewall is 1.1.4. In this -version

    + +

    5/10/2001 - The current version of Shorewall is 1.1.4. In this version

    - + - -

    4/28/2001 - The current version of Shorewall is 1.1.3. In this -version

    + +

    4/28/2001 - The current version of Shorewall is 1.1.3. In this version

    - + - -

    4/12/2001 - The current version of Shorewall is 1.1.2. In this -version

    + +

    4/12/2001 - The current version of Shorewall is 1.1.2. In this version

    - + - +

    4/8/2001 - Shorewall is now affiliated with the Leaf Project -

    +

    - +

    4/5/2001 - The current version of Shorewall is 1.1.1. In this version:

    - + - +

    3/25/2001 - The current version of Shorewall is 1.1.0. In this version:

    - + - +

    3/19/2001 - The current version of Shorewall is 1.0.4. This version:

    - + - -

    3/13/2001 - The current version of Shorewall is 1.0.3. This is a bug-fix - release with no new features.

    + +

    3/13/2001 - The current version of Shorewall is 1.0.3. This is a bug-fix + release with no new features.

    - + - -

    3/8/2001 - The current version of Shorewall is 1.0.2. It supports an - additional "gw" (gateway) zone for tunnels and it - supports IPSEC tunnels with end-points on the firewall. - There is also a .lrp available now.

    + +

    3/8/2001 - The current version of Shorewall is 1.0.2. It supports an + additional "gw" (gateway) zone for tunnels and +it supports IPSEC tunnels with end-points on the firewall. + There is also a .lrp available now.

    - -

    Updated 2/21/2003 - Tom Eastep -

    + +

    Updated 3/7/2003 - Tom Eastep +

    - +

    Copyright © 2001, 2002 Thomas M. Eastep.
    -

    -
    -
    +

    diff --git a/STABLE/documentation/OPENVPN.html b/STABLE/documentation/OPENVPN.html index 08b40777a..4e2971c84 100755 --- a/STABLE/documentation/OPENVPN.html +++ b/STABLE/documentation/OPENVPN.html @@ -1,281 +1,283 @@ - + - GRE/IPIP Tunnels - + OpenVPN Tunnels + - + - + - - - + + - - - + + + +
    +

    OpenVPN Tunnels

    -
    - +


    -

    - -

    OpenVPN is a robust and highly configurable VPN (Virtual Private Network) -daemon which can be used to securely link two or more private networks using -an encrypted tunnel over the internet. OpenVPN is an Open Source project and -is licensed under the -GPL. OpenVPN can be downloaded from + +

    OpenVPN is a robust and highly configurable VPN (Virtual Private Network) + daemon which can be used to securely link two or more private networks using + an encrypted tunnel over the internet. OpenVPN is an Open Source project +and is licensed under +the GPL. OpenVPN can be downloaded from http://openvpn.sourceforge.net/.
    -

    - +

    +

    OpenVPN support was added to Shorewall in version 1.3.14.
    -

    - +

    +

    Bridging two Masqueraded Networks

    - +

    Suppose that we have the following situation:

    - +

    -

    - -

    We want systems in the 192.168.1.0/24 subnetwork to be able -to communicate with the systems in the 10.0.0.0/8 network. This is accomplished -through use of the /etc/shorewall/tunnels file and the /etc/shorewall/policy -file and OpenVPN.

    - -

    While it was possible to use the Shorewall start and stop -script to start and stop OpenVPN, I decided to use the init script of OpenVPN -to start and stop it.

    - -

    On each firewall, you will need to declare a zone to represent -the remote subnet. We'll assume that this zone is called 'vpn' and declare -it in /etc/shorewall/zones on both systems as follows.

    - -
    +

    + +

    We want systems in the 192.168.1.0/24 subnetwork to be able + to communicate with the systems in the 10.0.0.0/8 network. This is accomplished + through use of the /etc/shorewall/tunnels file and the /etc/shorewall/policy + file and OpenVPN.

    + +

    While it was possible to use the Shorewall start and stop + script to start and stop OpenVPN, I decided to use the init script of OpenVPN + to start and stop it.

    + +

    On each firewall, you will need to declare a zone to represent + the remote subnet. We'll assume that this zone is called 'vpn' and declare + it in /etc/shorewall/zones on both systems as follows.

    + +
    - - - - - - - - - - - - - + + + + + + + + + + + + + +
    ZONEDISPLAYCOMMENTS
    vpnVPNRemote Subnet
    ZONEDISPLAYCOMMENTS
    vpnVPNRemote Subnet
    +
    + +

    On system A, the 10.0.0.0/8 will comprise the vpn +zone. In /etc/shorewall/interfaces:

    + +
    + + + + + + + + + + + + + + + +
    ZONEINTERFACEBROADCASTOPTIONS
    vpntun0
    +
     
    - -

    On system A, the 10.0.0.0/8 will comprise the vpn zone. -In /etc/shorewall/interfaces:

    - -
    - - - - - - - - - - - - - - - - -
    ZONEINTERFACEBROADCASTOPTIONS
    vpntun0
    -
     
    -
    - +

    In /etc/shorewall/tunnels on system A, we need the following:

    - -
    + +
    - - - - - - - - - - - - - - - + + + + + + + + + + + + + + +
    TYPEZONEGATEWAYGATEWAY ZONE
    openvpnnet134.28.54.2 
    TYPEZONEGATEWAYGATEWAY ZONE
    openvpnnet134.28.54.2 
    -
    - -

    This entry in /etc/shorewall/tunnels opens the firewall so that OpenVPN -traffic on the default port 5000/udp will be accepted to/from the remote gateway. -If you change the port used by OpenVPN to 7777, you can define /etc/shorewall/tunnels -like this:
    +

    + +

    This entry in /etc/shorewall/tunnels opens the firewall so that OpenVPN + traffic on the default port 5000/udp will be accepted to/from the remote +gateway. If you change the port used by OpenVPN to 7777, you can define /etc/shorewall/tunnels + like this:
    +

    + +
    + + + + + + + + + + + + + + + + +
    TYPEZONEGATEWAYGATEWAY ZONE
    openvpn:7777net134.28.54.2 
    +
    + +

    This is the OpenVPN config on system A:

    + +
    +

    +
    + +
    +

    dev tun
    + local 206.162.148.9
    + remote 134.28.54.2
    + ifconfig 192.168.99.1 192.168.99.2
    + up ./route-a.up
    + tls-server
    + dh dh1024.pem
    + ca ca.crt
    + cert my-a.crt
    + key my-a.key
    + comp-lzo
    + verb 5
    +

    +
    + +

    Similarly, On system B the 192.168.1.0/24 subnet will comprise the vpn + zone. In /etc/shorewall/interfaces:

    + +
    + + + + + + + + + + + + + + + + +
    ZONEINTERFACEBROADCASTOPTIONS
    vpntun0192.168.1.255 
    +
    + +

    In /etc/shorewall/tunnels on system B, we have:

    + +
    + + + + + + + + + + + + + + + + +
    TYPEZONEGATEWAYGATEWAY ZONE
    openvpnnet206.191.148.9 
    +
    + +

    And in the OpenVPN config on system B:

    + +
    +

    dev tun
    + local 134.28.54.2
    + remote 206.162.148.9
    + ifconfig 192.168.99.2 192.168.99.1
    + up ./route-b.up
    + tls-client
    + ca ca.crt
    + cert my-b.crt
    + key my-b.key
    + comp-lzo
    + verb 5
    +

    +
    + +

    You will need to allow traffic between the "vpn" zone and + the "loc" zone on both systems -- if you simply want to admit all +traffic in both directions, you can use the policy file:

    + +
    + + + + + + + + + + + + + + + + + + + + + + +
    SOURCEDESTPOLICYLOG LEVEL
    locvpnACCEPT 
    vpnlocACCEPT 
    +
    + +

    On both systems, restart Shorewall and start OpenVPN. The systems in the + two masqueraded subnetworks can now talk to each other.

    + +

    Updated 2/4/2003 - Tom Eastep +and Simon Mater

    -
    - - - - - - - - - - - - - - - - -
    TYPEZONEGATEWAYGATEWAY ZONE
    openvpn:7777net134.28.54.2 
    -
    - -

    This is the OpenVPN config on system A:

    - -
    -

    -
    - -
    -

    dev tun
    - local 206.162.148.9
    - remote 134.28.54.2
    - ifconfig 192.168.99.1 192.168.99.2
    - up ./route-a.up
    - tls-server
    - dh dh1024.pem
    - ca ca.crt
    - cert my-a.crt
    - key my-a.key
    - comp-lzo
    - verb 5
    -

    -
    - -

    Similarly, On system B the 192.168.1.0/24 subnet will comprise the vpn -zone. In /etc/shorewall/interfaces:

    - -
    - - - - - - - - - - - - - - - - -
    ZONEINTERFACEBROADCASTOPTIONS
    vpntun0192.168.1.255 
    -
    - -

    In /etc/shorewall/tunnels on system B, we have:

    - -
    - - - - - - - - - - - - - - - - -
    TYPEZONEGATEWAYGATEWAY ZONE
    openvpnnet206.191.148.9 
    -
    - -

    And in the OpenVPN config on system B:

    - -
    -

    dev tun
    - local 134.28.54.2
    - remote 206.162.148.9
    - ifconfig 192.168.99.2 192.168.99.1
    - up ./route-b.up
    - tls-client
    - ca ca.crt
    - cert my-b.crt
    - key my-b.key
    - comp-lzo
    - verb 5
    -

    -
    - -

    You will need to allow traffic between the "vpn" zone and - the "loc" zone on both systems -- if you simply want to admit all traffic - in both directions, you can use the policy file:

    - -
    - - - - - - - - - - - - - - - - - - - - - - -
    SOURCEDESTPOLICYLOG LEVEL
    locvpnACCEPT 
    vpnlocACCEPT 
    -
    - -

    On both systems, restart Shorewall and start OpenVPN. The systems in the -two masqueraded subnetworks can now talk to each other.

    - -

    Updated 2/4/2003 - Tom Eastep -and Simon Mater
    -

    - -

    Copyright2003 Thomas M. Eastep. and Simon Mater
    -

    -
    + +

    Copyright + © 2003 Thomas M. Eastep. and Simon Mater
    +

    +
    +

    diff --git a/STABLE/documentation/ProxyARP.htm b/STABLE/documentation/ProxyARP.htm index e0021cd3d..58390156a 100644 --- a/STABLE/documentation/ProxyARP.htm +++ b/STABLE/documentation/ProxyARP.htm @@ -1,164 +1,179 @@ - + Shorewall Proxy ARP - + - + - + - + - - - + + - - - + + + +
    +

    Proxy ARP

    -
    - -

    Proxy ARP allows you to insert a firewall in front of a set of servers - without changing their IP addresses and without having to re-subnet. -Before you try to use this technique, I strongly recommend that you read -the Shorewall Setup Guide.

    - + +

    Proxy ARP allows you to insert a firewall in front of a set of servers + without changing their IP addresses and without having to re-subnet. +Before you try to use this technique, I strongly recommend that you read the +Shorewall Setup Guide.

    +

    The following figure represents a Proxy ARP environment.

    - -
    + +

    -

    - +

    +
    -
    - -

    Proxy ARP can be used to make the systems with addresses - 130.252.100.18 and 130.252.100.19 appear to be on the upper (130.252.100.*) - subnet.  Assuming that the upper firewall interface is eth0 and the - lower interface is eth1, this is accomplished using the following entries +

    + +

    Proxy ARP can be used to make the systems with addresses + 130.252.100.18 and 130.252.100.19 appear to be on the upper (130.252.100.*) + subnet.  Assuming that the upper firewall interface is eth0 and the + lower interface is eth1, this is accomplished using the following entries in /etc/shorewall/proxyarp:

    - -
    + +
    - - - - - - - + - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + +
    ADDRESSINTERFACEEXTERNALHAVEROUTE
    130.252.100.18eth1eth0no
    130.252.100.19eth1eth0no
    ADDRESSINTERFACEEXTERNALHAVEROUTE
    130.252.100.18eth1eth0no
    130.252.100.19eth1eth0no
    -
    - -

    Be sure that the internal systems (130.242.100.18 and 130.252.100.19  - in the above example) are not included in any specification in -/etc/shorewall/masq or /etc/shorewall/nat.

    - -

    Note that I've used an RFC1918 IP address for eth1 - that IP address is +

    + +

    Be sure that the internal systems (130.242.100.18 and 130.252.100.19  + in the above example) are not included in any specification in /etc/shorewall/masq +or /etc/shorewall/nat.

    + +

    Note that I've used an RFC1918 IP address for eth1 - that IP address is irrelevant.

    - -

    The lower systems (130.252.100.18 and 130.252.100.19) should have their - subnet mask and default gateway configured exactly the same way that + +

    The lower systems (130.252.100.18 and 130.252.100.19) should have their + subnet mask and default gateway configured exactly the same way that the Firewall system's eth0 is configured.

    - -
    -

    A word of warning is in order here. ISPs typically configure - their routers with a long ARP cache timeout. If you move a system from - parallel to your firewall to behind your firewall with Proxy ARP, it will - probably be HOURS before that system can communicate with the internet. + +

    +

    A word of warning is in order here. ISPs typically configure + their routers with a long ARP cache timeout. If you move a system from + parallel to your firewall to behind your firewall with Proxy ARP, it will + probably be HOURS before that system can communicate with the internet. There are a couple of things that you can try:
    -

    +

    +
      -
    1. (Courtesy of Bradey Honsinger) A reading of Stevens' TCP/IP Illustrated, +
    2. (Courtesy of Bradey Honsinger) A reading of Stevens' TCP/IP Illustrated, Vol 1 reveals that a
      -
      -"gratuitous" ARP packet should cause the ISP's router to refresh their ARP -cache (section 4.7). A gratuitous ARP is simply a host requesting the MAC -address for its own IP; in addition to ensuring that the IP address isn't +
      + "gratuitous" ARP packet should cause the ISP's router to refresh their ARP +cache (section 4.7). A gratuitous ARP is simply a host requesting the MAC +address for its own IP; in addition to ensuring that the IP address isn't a duplicate...
      -
      -"if the host sending the gratuitous ARP has just changed its hardware address..., -this packet causes any other host...that has an entry in its cache for the +
      + "if the host sending the gratuitous ARP has just changed its hardware address..., +this packet causes any other host...that has an entry in its cache for the old hardware address to update its ARP cache entry accordingly."
      -
      -Which is, of course, exactly what you want to do when you switch a host from -being exposed to the Internet to behind Shorewall using proxy ARP (or static -NAT for that matter). Happily enough, recent versions of Redhat's iputils -package include "arping", whose "-U" flag does just that:
      -
      -    arping -U -I <net if> <newly proxied +
      + Which is, of course, exactly what you want to do when you switch a host +from being exposed to the Internet to behind Shorewall using proxy ARP (or +static NAT for that matter). Happily enough, recent versions of Redhat's +iputils package include "arping", whose "-U" flag does just that:
      +
      +     arping -U -I <net if> <newly proxied IP>
      -    arping -U -I eth0 66.58.99.83 # for example
      -
      -Stevens goes on to mention that not all systems respond correctly to gratuitous -ARPs, but googling for "arping -U" seems to support the idea that it works +     arping -U -I eth0 66.58.99.83 # for example
      +
      + Stevens goes on to mention that not all systems respond correctly to gratuitous +ARPs, but googling for "arping -U" seems to support the idea that it works most of the time.

      +To use arping with Proxy ARP in the above example, you would have to:
      +
      +     shorewall clear
      +
          ip addr add 130.252.100.18 dev +eth0
      +    ip addr add 130.252.100.19 dev eth0

      +     arping -U -I eth0 130.252.100.18
      +    arping -U -I eth0 130.252.100.19
      +    ip addr del 130.252.100.18 dev eth0
      +    ip addr del 130.252.100.19 dev eth0
      +    shorewall start

      +
    3. -
    4. You can call your ISP and ask them to purge the stale ARP cache +
    5. You can call your ISP and ask them to purge the stale ARP cache entry but many either can't or won't purge individual entries.
    6. +
    -You can determine if your ISP's gateway ARP cache is stale using ping -and tcpdump. Suppose that we suspect that the gateway router has a stale + You can determine if your ISP's gateway ARP cache is stale using ping +and tcpdump. Suppose that we suspect that the gateway router has a stale ARP cache entry for 130.252.100.19. On the firewall, run tcpdump as follows:
    - -
    + +
    	tcpdump -nei eth0 icmp
    -
    - -
    -

    Now from 130.252.100.19, ping the ISP's gateway (which we +

    + +
    +

    Now from 130.252.100.19, ping the ISP's gateway (which we will assume is 130.252.100.254):

    -
    - -
    +
    + +
    	ping 130.252.100.254
    -
    - -
    +
    + +

    We can now observe the tcpdump output:

    -
    - -
    -
    	13:35:12.159321 0:4:e2:20:20:33 0:0:77:95:dd:19 ip 98: 130.252.100.19 > 130.252.100.254: icmp: echo request (DF)
    13:35:12.207615 0:0:77:95:dd:19 0:c0:a8:50:b2:57 ip 98: 130.252.100.254 > 130.252.100.177 : icmp: echo reply
    - -
    -

    Notice that the source MAC address in the echo request is - different from the destination MAC address in the echo reply!! In this -case 0:4:e2:20:20:33 was the MAC of the firewall's eth0 NIC while 0:c0:a8:50:b2:57 - was the MAC address of the system on the lower left. In other words, the -gateway's ARP cache still associates 130.252.100.19 with the NIC in that + +

    +
    	13:35:12.159321 0:4:e2:20:20:33 0:0:77:95:dd:19 ip 98: 130.252.100.19 > 130.252.100.254: icmp: echo request (DF)
    13:35:12.207615 0:0:77:95:dd:19 0:c0:a8:50:b2:57 ip 98: 130.252.100.254 > 130.252.100.177 : icmp: echo reply
    +
    + +
    +

    Notice that the source MAC address in the echo request is + different from the destination MAC address in the echo reply!! In this +case 0:4:e2:20:20:33 was the MAC of the firewall's eth0 NIC while 0:c0:a8:50:b2:57 + was the MAC address of the system on the lower left. In other words, the +gateway's ARP cache still associates 130.252.100.19 with the NIC in that system rather than with the firewall's eth0.

    -
    - -

    Last updated 1/11/2003 - + +

    Last updated 1/26/2003 - Tom Eastep

    - Copyright © Copyright © 2001, 2002, 2003 Thomas M. Eastep.
    +
    diff --git a/STABLE/documentation/Shorewall_index_frame.htm b/STABLE/documentation/Shorewall_index_frame.htm index 1c40f74ab..11e470a5c 100644 --- a/STABLE/documentation/Shorewall_index_frame.htm +++ b/STABLE/documentation/Shorewall_index_frame.htm @@ -2,166 +2,166 @@ - + - + - + - + Shorewall Index - - + + - + - - - + + + + + - - - - - - - -
    +
    + + + + +

    Shorewall

    +
    -

    Shorewall

    -
    +
    + + + + + + + +
    -
    - Note:
    Search is unavailable Daily - 0200-0330 GMT.
    - - +
    + Note:
    Search is unavailable + Daily 0200-0330 GMT.
    + +

    Quick Search
    -

    -
    - + +

    Extended Search

    - +

    Copyright © 2001-2003 Thomas M. Eastep.

    - +

    -
    -
    -

    -
    -
    -
    -
    -
    -
    +
    +


    -
    +
    +
    +

    diff --git a/STABLE/documentation/Shorewall_sfindex_frame.htm b/STABLE/documentation/Shorewall_sfindex_frame.htm index 37404fe88..e583fbd4e 100644 --- a/STABLE/documentation/Shorewall_sfindex_frame.htm +++ b/STABLE/documentation/Shorewall_sfindex_frame.htm @@ -2,165 +2,162 @@ - + - + - + - + Shorewall Index - - - + + - + - - - + + - - - + + + - + + - - + +
    +
    - + +

    Shorewall

    -
    +
    - + - + -
    - +
    -
    - Note:
    Search is unavailable Daily - 0200-0330 GMT.
    - - +
    + Note:
    Search is unavailable + Daily 0200-0330 GMT.
    + +

    Quick Search
    -

    -
    - + +

    Extended Search

    - +

    Copyright © 2001-2003 Thomas M. Eastep.

    - -


    -

    -
    -
    -
    -
    -
    -
    -
    -
    -
    +
    +
    +


    diff --git a/STABLE/documentation/download.htm b/STABLE/documentation/download.htm index 4b6be7b3e..482971210 100644 --- a/STABLE/documentation/download.htm +++ b/STABLE/documentation/download.htm @@ -1,390 +1,455 @@ - + - + - + - + Download - + - - - + + - - - + + + +
    +
    - +

    Shorewall Download

    -
    - +

    I strongly urge you to read and print a copy of the Shorewall QuickStart Guide for the configuration that most closely matches your own.
    -

    - +

    +

    The entire set of Shorewall documentation is available in PDF format at:

    - +

        ftp://slovakia.shorewall.net/mirror/shorewall/pdf/
    -     http://slovakia.shorewall.net/pub/shorewall/pdf/
    -     rsync://slovakia.shorewall.net/shorewall/pdf/ -

    - +     http://slovakia.shorewall.net/pub/shorewall/pdf/
    +     rsync://slovakia.shorewall.net/shorewall/pdf/ +

    +

    The documentation in HTML format is included in the .rpm and in the .tgz packages below.

    - -

    Once you've done that, download one of the modules:

    - + +

    Once you've printed the appropriate QuickStart Guide, download + one of the modules:

    + - +

    The documentation in HTML format is included in the .tgz and .rpm files - and there is an documentation .deb that also contains the documentation.

    - + and there is an documentation .deb that also contains the documentation.  The +.rpm will install the documentation in your default document directory which +can be obtained using the following command:
    +

    + +
    +

    rpm --eval '%{defaultdocdir}'

    +
    +

    Please verify the version that you have downloaded -- during the - release of a new version of Shorewall, the links below may -point to a newer or an older version than is shown below.

    - + release of a new version of Shorewall, the links below may + point to a newer or an older version than is shown below.

    +
      -
    • RPM - "rpm -qip LATEST.rpm"
    • -
    • TARBALL - "tar -ztf LATEST.tgz" (the directory name - will contain the version)
    • -
    • LRP - "mkdir Shorewall.lrp; cd Shorewall.lrp; tar - -zxf <downloaded .lrp>; cat var/lib/lrpkg/shorwall.version" -
    • - +
    • RPM - "rpm -qip LATEST.rpm"
    • +
    • TARBALL - "tar -ztf LATEST.tgz" (the directory + name will contain the version)
    • +
    • LRP - "mkdir Shorewall.lrp; cd Shorewall.lrp; tar + -zxf <downloaded .lrp>; cat var/lib/lrpkg/shorwall.version" +
    • +
    - +

    Once you have verified the version, check the errata to see -if there are updates that apply to the version that you have -downloaded.

    - + if there are updates that apply to the version that you have + downloaded.

    +

    WARNING - YOU CAN NOT SIMPLY INSTALL -THE RPM AND ISSUE A "shorewall start" COMMAND. SOME CONFIGURATION -IS REQUIRED BEFORE THE FIREWALL WILL START. Once you have completed configuration - of your firewall, you can enable startup by removing the file /etc/shorewall/startup_disabled.

    - + THE RPM AND ISSUE A "shorewall start" COMMAND. SOME CONFIGURATION + IS REQUIRED BEFORE THE FIREWALL WILL START. Once you have completed configuration + of your firewall, you can enable startup by removing the file /etc/shorewall/startup_disabled.

    +

    Download Latest Version (1.3.14): Remember that updates - to the mirrors occur 1-12 hours after an update to the Washington -State site.

    - -
    + to the mirrors occur 1-12 hours after an update to the Washington + State site.

    + +
    - - - - - - - - - - - + + + + + + + + + - - - - - - + + + + + - + - - - - - + + + + + - + - - - - - + + + + + - + - - - - - + + + + + - + - - - - - + + + + + - - - - - - + + + + + + - + - + .md5sums
    + Download .samples
    + + - - -
    SERVER LOCATIONDOMAINHTTPFTP
    SourceForge
    -
    sf.net
    -
    +
    SERVER LOCATIONDOMAINHTTPFTP
    SourceForge
    +
    sf.net
    +
    Download
    -

    -
    Slovak RepublicShorewall.net +
    +
    Slovak RepublicShorewall.netDownload .rpm
    - Download .tgz 
    - Download .lrp
    - - Download.md5sums
    + Download + .samples
    +
    Download - .rpm  
    -   
    +
    Download - .tgz 
    -  
    +
    Download - .rpm
    -
    +
    - Download.md5sums
    Texas, USAInfohiiway.com + Download + .samples
    +
    Texas, USAInfohiiway.comDownload - .rpm
    -
    +
    Download - .tgz 
    -  
    +
    Download - .lrp
    -
    +
    - Download.md5sums
    + Download + .samples
    +
    Download .rpm  
    - Download .tgz 
    - Download - .lrp
    -
    +
    - Download.md5sums
    Hamburg, GermanyShorewall.net + Download + .samples
    +
    Hamburg, GermanyShorewall.net Download - .rpm
    -
    +
    Download .tgz
    - Download .lrp
    - - Download.md5sums
    + Download + .samples
    +
    Download - .rpm  
    -   
    +
    Download .tgz 
    - Download .lrp
    - Download - .md5sums
    Martinez (Zona Norte - GBA), ArgentinaCorreofuego.com.ar + Download + .samples
    +
    Martinez (Zona Norte - GBA), ArgentinaCorreofuego.com.ar Download - .rpm  
    -   
    +
    Download - .tgz 
    -  
    +
    - Download .lrp
    -
    +
    Download - .md5sums
    + + Download .samples
    +
    Download - .rpm  
    -   
    +
    Download - .tgz 
    -  
    +
    - Download .lrp
    -
    +
    Download - .md5sums
    Paris, FranceShorewall.net + + Download .samples
    +
    Paris, FranceShorewall.netDownload .rpm
    - Download .tgz 
    - Download .lrp
    - Download - .md5sums
    Download - .rpm  
    - Download - .tgz 
    - Download - .lrp
    - Download - .md5sums
    Washington State, USA
    -
    Shorewall.net
    -
    Download .rpm
    Download + .md5sums
    +
    Download + .samples
    +
    Download + .rpm  
    + Download + .tgz 
    + Download + .lrp
    + Download + .md5sums
    +
    Download + .samples
    +
    Washington State, USA
    +
    Shorewall.net
    +
    Download .rpm
    + Download .tgz 
    - Download .lrp
    - Download - .md5sums
    -
    + Download + .samples
    +
    - Download .rpm 
    -  
    +
    Download - .tgz 
    -  
    +
    Download - .lrp
    -
    +
    Download - .md5sums
    -
    -
    - -

    Browse Download Sites:

    - -
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    SERVER LOCATIONDOMAINHTTPFTP
    SourceForge
    -
    sf.netBrowseN/A
    Slovak RepublicShorewall.netBrowse Browse
    Texas, USAInfohiiway.comBrowseBrowse
    Hamburg, GermanyShorewall.netBrowseBrowse
    Martinez (Zona Norte - GBA), ArgentinaCorreofuego.com.arBrowse Browse
    FranceShorewall.netBrowse Browse
    Washington State, USAShorewall.netBrowseBrowse
    -
    - -

    CVS:

    -
    + + +
    + +

    Browse Download Sites:

    + +
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    SERVER LOCATIONDOMAINHTTPFTP
    SourceForge
    +
    sf.netBrowseN/A
    Slovak RepublicShorewall.netBrowse Browse
    Texas, USAInfohiiway.comBrowseBrowse
    Hamburg, GermanyShorewall.netBrowseBrowse
    Martinez (Zona Norte - GBA), ArgentinaCorreofuego.com.arBrowse Browse
    FranceShorewall.netBrowse Browse
    Washington State, USAShorewall.netBrowseBrowse
    +
    + +

    CVS:

    + +

    The CVS repository -at cvs.shorewall.net contains the latest snapshots of the each - Shorewall component. There's no guarantee that what you find there -will work at all.
    -

    -
    - -

    Last Updated 2/7/2003 - contains the latest snapshots of the each + Shorewall component. There's no guarantee that what you find there + will work at all.
    +

    +
    + +

    Last Updated 3/6/2003 - Tom Eastep

    - +

    Copyright © 2001, 2002, 2003 Thomas M. Eastep.
    -

    +

    +
    +



    diff --git a/STABLE/documentation/mailing_list.htm b/STABLE/documentation/mailing_list.htm index ff74b41a7..d27d4d905 100644 --- a/STABLE/documentation/mailing_list.htm +++ b/STABLE/documentation/mailing_list.htm @@ -2,119 +2,121 @@ - + - + - + - + Shorewall Mailing Lists - + - + - - - + + - + - + - +
    +     

    + + + - - + +
    +
    - - +

    Vexira Logo -

    + - - - + +

     

    -
    - + +

    Shorewall Mailing Lists

    -
    (Postfix Logo) -
    - +
    (Postfix Logo) +
    + -
    - + +
    + +

    -
    - Powered by Postfix    

    -
    -
    - +

    REPORTING A PROBLEM OR ASKING FOR HELP? If you haven't already, please -read the Shorewall Support -Guide.
    -

    + read the Shorewall Support + Guide.
    + +

    If you experience problems with any of these lists, please - let me know

    - + let me know

    +

    Not able to Post Mail to shorewall.net?

    - +

    You can report such problems by sending mail to tom dot eastep - at hp dot com.

    - + at hp dot com.

    +

    A Word about SPAM Filters 

    - +

    Before subscribing please read my policy about list traffic that bounces. Also please note that the mail server - at shorewall.net checks incoming mail:
    -

    - + at shorewall.net checks incoming mail:
    +

    +
      -
    1. against Spamassassin - (including Vipul's Razor).
      -
    2. -
    3. to ensure that the sender address is fully qualified.
    4. -
    5. to verify that the sender's domain has an A or MX -record in DNS.
    6. -
    7. to ensure that the host name in the HELO/EHLO command - is a valid fully-qualified DNS name that resolves.
    8. - +
    9. against Spamassassin + (including Vipul's Razor).
      +
    10. +
    11. to ensure that the sender address is fully qualified.
    12. +
    13. to verify that the sender's domain has an A or +MX record in DNS.
    14. +
    15. to ensure that the host name in the HELO/EHLO command + is a valid fully-qualified DNS name that resolves.
    16. +
    - +

    Please post in plain text

    - A growing number of MTAs serving list subscribers are rejecting - all HTML traffic. At least one MTA has gone so far as to blacklist shorewall.net - "for continuous abuse" because it has been my policy to allow HTML in -list posts!!
    -
    - I think that blocking all HTML is a Draconian way to control -spam and that the ultimate losers here are not the spammers but the + A growing number of MTAs serving list subscribers are rejecting + all HTML traffic. At least one MTA has gone so far as to blacklist shorewall.net + "for continuous abuse" because it has been my policy to allow HTML in + list posts!!
    +
    + I think that blocking all HTML is a Draconian way to control + spam and that the ultimate losers here are not the spammers but the list subscribers whose MTAs are bouncing all shorewall.net mail. As one list subscriber wrote to me privately "These e-mail admin's need to get a (explitive deleted) life instead of trying to rid the planet @@ -122,36 +124,36 @@ of HTML based e-mail". Nevertheless, to allow subscribers to receive list posts as must as possible, I have now configured the list server at shorewall.net to strip all HTML from outgoing posts. This means that HTML-only posts will be bounced by the list server.
    - +

    Note: The list server limits posts to 120kb.
    -

    - -

    Other Mail Delivery Problems

    - If you find that you are missing an occasional list post, your -e-mail admin may be blocking mail whose Received: headers contain -the names of certain ISPs. Again, I believe that such policies hurt more -than they help but I'm not prepared to go so far as to start stripping Received: - headers to circumvent those policies.
    +

    +

    Other Mail Delivery Problems

    + If you find that you are missing an occasional list post, your + e-mail admin may be blocking mail whose Received: headers contain + the names of certain ISPs. Again, I believe that such policies hurt more + than they help but I'm not prepared to go so far as to start stripping +Received: headers to circumvent those policies.
    +

    Mailing Lists Archive Search

    - +
    - +

    Match: - + - Format: - + Format: + - Sort by: - + Sort by: + -
    - Search:

    -
    + Search:

    + - +

    Please do not try to download the entire Archive -- it is 75MB (and growing daily) and my slow DSL line simply won't stand the traffic. If I catch you, you will be blacklisted.
    -

    - +
    +

    Shorewall CA Certificate

    - If you want to trust X.509 certificates issued by Shoreline - Firewall (such as the one used on my web site), you may download and install my CA certificate - in your browser. If you don't wish to trust my certificates then - you can either use unencrypted access when subscribing to Shorewall - mailing lists or you can use secure access (SSL) and accept the server's - certificate when prompted by your browser.
    - + in your browser. If you don't wish to trust my certificates then + you can either use unencrypted access when subscribing to Shorewall + mailing lists or you can use secure access (SSL) and accept the server's + certificate when prompted by your browser.
    +

    Shorewall Users Mailing List

    - +

    The Shorewall Users Mailing list provides a way for users - to get answers to questions and to report problems. Information - of general interest to the Shorewall user community is also posted - to this list.

    - + to get answers to questions and to report problems. Information + of general interest to the Shorewall user community is also posted + to this list.

    +

    Before posting a problem report to this list, please see - the problem reporting - guidelines.

    - + the problem reporting + guidelines.

    +

    To subscribe to the mailing list:
    -

    - +

    + - +

    To post to the list, post to shorewall-users@lists.shorewall.net.

    - +

    The list archives are at http://lists.shorewall.net/pipermail/shorewall-users.

    - +

    Note that prior to 1/1/2002, the mailing list was hosted at Sourceforge. The archives from that list may be found at www.geocrawler.com/lists/3/Sourceforge/9327/0/.

    - +

    Shorewall Announce Mailing List

    - +

    This list is for announcements of general interest to the - Shorewall community. To subscribe:
    -

    - + Shorewall community. To subscribe:
    +

    +

    - + - +


    - The list archives are at http://lists.shorewall.net/pipermail/shorewall-announce.

    - +

    Shorewall Development Mailing List

    - +

    The Shorewall Development Mailing list provides a forum for - the exchange of ideas about the future of Shorewall and for coordinating - ongoing Shorewall Development.

    - + the exchange of ideas about the future of Shorewall and for coordinating + ongoing Shorewall Development.

    +

    To subscribe to the mailing list:
    -

    - +

    + - +

    To post to the list, post to shorewall-devel@lists.shorewall.net

    - +

    The list archives are at http://lists.shorewall.net/pipermail/shorewall-devel.

    - +

    How to Unsubscribe from one of - the Mailing Lists

    - + the Mailing Lists +

    There seems to be near-universal confusion about unsubscribing - from Mailman-managed lists although Mailman 2.1 has attempted -to make this less confusing. To unsubscribe:

    - + from Mailman-managed lists although Mailman 2.1 has attempted + to make this less confusing. To unsubscribe:

    +
      -
    • - +
    • + +

      Follow the same link above that you used to subscribe - to the list.

      -
    • -
    • - + to the list.

      +
    • +
    • + +

      Down at the bottom of that page is the following text: - " To unsubscribe from <list name>, get a + " To unsubscribe from <list name>, get a password reminder, or change your subscription options enter your subscription email address:". Enter your email address in the box and click on the "Unsubscribe or edit options" button.

      -
    • -
    • - +
    • +
    • + +

      There will now be a box where you can enter your password - and click on "Unsubscribe"; if you have forgotten your password, - there is another button that will cause your password to be emailed - to you.

      -
    • - + and click on "Unsubscribe"; if you have forgotten your password, + there is another button that will cause your password to be emailed + to you.

      + +
    - -
    + +

    Frustrated by having to Rebuild Mailman to use it with Postfix?

    - +

    Check out these instructions

    - +

    Last updated 2/24/2003 - Tom Eastep

    - +

    Copyright © 2001, 2002, 2003 Thomas M. Eastep.
    -

    -
    -
    -
    +

    diff --git a/STABLE/documentation/ports.htm b/STABLE/documentation/ports.htm index 4912c722f..8a5d0a8f0 100644 --- a/STABLE/documentation/ports.htm +++ b/STABLE/documentation/ports.htm @@ -1,202 +1,210 @@ - + Shorewall Port Information - + - + - + - - - - - - + + + + + +
    -

    Ports required for Various - Services/Applications

    -
    +

    Ports required for Various + Services/Applications

    +
    - +

    In addition to those applications described in the /etc/shorewall/rules documentation, here - are some other services/applications that you may need to configure your -firewall to accommodate.

    - + href="Documentation.htm">the /etc/shorewall/rules documentation, here + are some other services/applications that you may need to configure your + firewall to accommodate.

    +

    NTP (Network Time Protocol)

    - -
    + +

    UDP Port 123

    -
    - +
    +

    rdate

    - -
    -

    TCP Port 37

    -
    +
    +

    TCP Port 37

    +
    +

    UseNet (NNTP)

    - -
    + +

    TCP Port 119

    -
    - +
    +

    DNS

    - -
    -

    UDP Port 53. If you are configuring a DNS client, you will probably want -to open TCP Port 53 as well.
    - If you are configuring a server, only open TCP Port 53 if you will -return long replies to queries or if you need to enable ZONE transfers. In + +

    +

    UDP Port 53. If you are configuring a DNS client, you will probably +want to open TCP Port 53 as well.
    + If you are configuring a server, only open TCP Port 53 if you will +return long replies to queries or if you need to enable ZONE transfers. In the latter case, be sure that your server is properly configured.

    -
    - +
    +

    ICQ   

    - -
    -

    UDP Port 4000. You will also need to open a range of TCP ports which - you can specify to your ICQ client. By default, clients use 4000-4100.

    -
    - + +
    +

    UDP Port 4000. You will also need to open a range of TCP ports which + you can specify to your ICQ client. By default, clients use 4000-4100.

    +
    +

    PPTP

    - -
    + +

    Protocol 47 (NOT port 47) and TCP Port 1723 (Lots more information here).

    -
    - -

    IPSEC

    - -
    -

    Protocols 50 and 51 (NOT ports 50 and 51) and UDP Port - 500. These should be opened in both directions (Lots more information - here and here).

    -
    - -

    SMTP

    - -
    -

     TCP Port 25.

    -
    - -

    POP3

    - -
    -

    TCP Port 110.

    -
    - -

    TELNET

    - -
    -

    TCP Port 23.

    -
    - -

    SSH

    - -
    -

    TCP Port 22.

    -
    - -

    Auth (identd)

    - -
    -

    TCP Port 113

    -
    - -

    Web Access

    - -
    -

    TCP Ports 80 and 443.

    -
    +
    +

    IPSEC

    + +
    +

    Protocols 50 and 51 (NOT ports 50 and 51) and UDP Port + 500. These should be opened in both directions (Lots more information + here and here).

    +
    + +

    SMTP

    + +
    +

     TCP Port 25.

    +
    + +

    POP3

    + +
    +

    TCP Port 110.

    +
    + +

    TELNET

    + +
    +

    TCP Port 23.

    +
    + +

    SSH

    + +
    +

    TCP Port 22.

    +
    + +

    Auth (identd)

    + +
    +

    TCP Port 113

    +
    + +

    Web Access

    + +
    +

    TCP Ports 80 and 443.

    +
    +

    FTP

    - -
    + +

    Server configuration is covered on in the /etc/shorewall/rules documentation,

    - -

    For a client, you must open outbound TCP port 21 and be sure that your - kernel is compiled to support FTP connection tracking. If you build this - support as a module, Shorewall will automatically load the module from + +

    For a client, you must open outbound TCP port 21 and be sure that your + kernel is compiled to support FTP connection tracking. If you build this + support as a module, Shorewall will automatically load the module from /var/lib/<kernel version>/kernel/net/ipv4/netfilter. 
    -

    - -

    If you run an FTP server on a nonstandard port or you need to access - such a server, then you must specify that port in /etc/shorewall/modules. - For example, if you run an FTP server that listens on port 49 then you would +

    + +

    If you run an FTP server on a nonstandard port or you need to access + such a server, then you must specify that port in /etc/shorewall/modules. + For example, if you run an FTP server that listens on port 49 then you would have:
    -

    - -
    +

    + +

    loadmodule ip_conntrack_ftp ports=21,49
    - loadmodule ip_nat_ftp ports=21,49
    -

    -
    - -

    Note that you MUST include port 21 in the ports list or you may + loadmodule ip_nat_ftp ports=21,49
    +

    +
    + +

    Note that you MUST include port 21 in the ports list or you may have problems accessing regular FTP servers.

    - -

    If there is a possibility that these modules might be loaded before Shorewall -starts, then you should include the port list in /etc/modules.conf:
    -

    -
    +

    If there is a possibility that these modules might be loaded before +Shorewall starts, then you should include the port list in /etc/modules.conf:
    +

    + +

    options ip_conntrack_ftp ports=21,49
    - options ip_nat_ftp ports=21,49
    -

    -
    -
    - + options ip_nat_ftp ports=21,49
    +

    +
    +
    +

    SMB/NMB (Samba/Windows Browsing/File Sharing)

    - +
    - -
    + +

    TCP Ports 137, 139 and 445.
    - UDP Ports 137-139.
    -
    - Also, see this page.

    -
    - + UDP Ports 137-139.
    +
    + Also, see this page.

    +
    +

    Traceroute

    - -
    + +

    UDP ports 33434 through 33434+<max number of hops>-1

    -
    - +
    +

    NFS
    -

    -
    -

    I personally use the following rules for opening access from zone z1 +

    + +
    +

    I personally use the following rules for opening access from zone z1 to a server with IP address a.b.c.d in zone z2:
    -

    -
    ACCEPT	z1	z2:a.b.c.d	udp	111
    ACCEPT z1 z2:a.b.c.d udp 2049
    ACCEPT z1 z2:a.b.c.d udp 32700:
    -
    - -
    -

    Note that my rules only cover NFS using UDP (the normal case). There -is lots of additional information at  http://nfs.sourceforge.net/nfs-howto/security.html

    -
    +

    + +
    ACCEPT	z1	z2:a.b.c.d	udp	111
    ACCEPT z1 z2:a.b.c.d tcp 111
    ACCEPT z1 z2:a.b.c.d udp 2049
    ACCEPT z1 z2:a.b.c.d udp 32700:
    +
    -

    Didn't find what you are looking for -- have you looked in your own /etc/services -file?

    - +
    +

    Note that my rules only cover NFS using UDP (the normal case) and your +milage may vary depending on the software you are using (I'm using RH8.0 +on both ends). In particular, the local port range in my server starts at +32768 (It's 32768 - 61000; I could probably get away with just opening those +ports).
    +
    +There is lots of additional information at  http://nfs.sourceforge.net/nfs-howto/security.html

    +
    + +

    Didn't find what you are looking for -- have you looked in your own +/etc/services file?

    +

    Still looking? Try http://www.networkice.com/advice/Exploits/Ports

    - -

    Last updated 2/7/2003 - Last updated 2/25/2003 - Tom Eastep

    - Copyright © Copyright © 2001, 2002, 2003 Thomas M. Eastep.
    +



    diff --git a/STABLE/documentation/seattlefirewall_index.htm b/STABLE/documentation/seattlefirewall_index.htm index 844c6a6e2..ba241ba59 100644 --- a/STABLE/documentation/seattlefirewall_index.htm +++ b/STABLE/documentation/seattlefirewall_index.htm @@ -6,7 +6,7 @@ - + Shoreline Firewall (Shorewall) 1.3 @@ -15,22 +15,23 @@ - + - + - + - + - - - - - - - - - - - -
    + @@ -40,15 +41,15 @@ - +

    Shorwall Logo - Shorewall - 1.3 - "iptables - made easy"

    + Shorewall 1.3 - "iptables made easy" @@ -58,53 +59,54 @@ - + + - -
    - -
    - - - - -
    - -
    - - - - - - - - + + + +
    - + +
    +
    + + + + +
    + +
    + + + + + + + + + - - + - + - +
    + + + + + + + + + +

    What is it?

    @@ -117,7 +119,7 @@ - +

    The Shoreline Firewall, more commonly known as "Shorewall", is a Netfilter (iptables) based firewall that can be used on a dedicated firewall system, a multi-function @@ -133,29 +135,29 @@ - +

    This program is free software; you can redistribute it and/or modify - it under the terms of - Version 2 of - the GNU General Public License as published by the Free Software - Foundation.
    + it under the terms + of Version +2 of the GNU General Public License as published by the Free Software + Foundation.
    -
    +
    - This program is distributed - in the hope that it will be useful, but -WITHOUT ANY WARRANTY; without even the implied warranty - of MERCHANTABILITY or FITNESS FOR A PARTICULAR - PURPOSE. See the GNU General Public License - for more details.
    + This program is distributed + in the hope that it will be useful, but + WITHOUT ANY WARRANTY; without even the implied + warranty of MERCHANTABILITY or FITNESS FOR A +PARTICULAR PURPOSE. See the GNU General Public License + for more details.
    -
    +
    - You should have received a copy - of the GNU General Public License -along with this program; if not, write to the Free -Software Foundation, Inc., 675 Mass Ave, Cambridge, - MA 02139, USA

    + You should have received +a copy of the GNU General Public License + along with this program; if not, write to the + Free Software Foundation, Inc., 675 Mass +Ave, Cambridge, MA 02139, USA

    @@ -167,7 +169,7 @@ Software Foundation, Inc., 675 Mass Ave, Cambridge - +

    Copyright 2001, 2002, 2003 Thomas M. Eastep

    @@ -180,30 +182,32 @@ Software Foundation, Inc., 675 Mass Ave, Cambridge - +

    - Jacques Nilo and Eric - Wolzak have a LEAF (router/firewall/gateway on -a floppy, CD or compact flash) distribution called - Bering that features Shorewall-1.3.14 - and Kernel-2.4.20. You can find their work at: - http://leaf.sourceforge.net/devel/jnilo
    -

    + Jacques Nilo and + Eric Wolzak have a LEAF (router/firewall/gateway + on a floppy, CD or compact flash) distribution called + Bering that features Shorewall-1.3.14 + and Kernel-2.4.20. You can find their work at: + http://leaf.sourceforge.net/devel/jnilo
    +

    - + +

    Congratulations to Jacques and Eric on the recent release of Bering 1.1!!!
    -

    +

    - + +

    This is a mirror of the main Shorewall web site at SourceForge (http://shorewall.sf.net)

    @@ -219,7 +223,7 @@ a floppy, CD or compact flash) distribution called - +

    News

    @@ -231,259 +235,306 @@ a floppy, CD or compact flash) distribution called - -

    - - - - - - - - -

    2/21/2003 - Shorewall 1.4.0 Beta 1 (New) -  

    - Shorewall 1.4 represents the - next step in the evolution of Shorewall. The main thrust of the initial -release is simply to remove the cruft that has accumulated in Shorewall -over time.
    -
    - IMPORTANT: Shorewall 1.4.0 REQUIRES the iproute package - ('ip' utility).
    -
    - Function from 1.3 that has been omitted from this version include:
    - -
      -
    1. The MERGE_HOSTS variable in shorewall.conf is no longer supported. - Shorewall 1.4 behavior is the same as 1.3 with MERGE_HOSTS=Yes.
      -
      -
    2. -
    3. Interface names of the form <device>:<integer> in -/etc/shorewall/interfaces now generate an error.
      -
      -
    4. -
    5. Shorewall 1.4 implements behavior consistent with OLD_PING_HANDLING=No. - OLD_PING_HANDLING=Yes will generate an error at startup as will specification - of the 'noping' or 'filterping' interface options.
      -
      -
    6. -
    7. The 'routestopped' option in the /etc/shorewall/interfaces and -/etc/shorewall/hosts files is no longer supported and will generate an error -at startup if specified.
      -
      -
    8. -
    9. The Shorewall 1.2 syntax for DNAT and REDIRECT rules is no longer - accepted.
      -
      -
    10. -
    11. The ALLOWRELATED variable in shorewall.conf is no longer supported. - Shorewall 1.4 behavior is the same as 1.3 with ALLOWRELATED=Yes.
      -
      -
    12. -
    13. The icmp.def file has been removed.
      -
    14. - -
    - Changes for 1.4 include:
    - -
      -
    1. The /etc/shorewall/shorewall.conf file has been completely reorganized - into logical sections.
      -
      -
    2. -
    3. LOG is now a valid action for a rule (/etc/shorewall/rules).
      -
      -
    4. -
    5. The firewall script and version file are now installed in /usr/share/shorewall.
      -
      -
    6. -
    7. Late arriving DNS replies are now silently dropped in the common - chain by default.
      -
      -
    8. -
    9. In addition to behaving like OLD_PING_HANDLING=No, Shorewall -1.4 no longer unconditionally accepts outbound ICMP packets. So if you want -to 'ping' from the firewall, you will need the appropriate rule or policy. -
    10. - -
    - -

    2/8/2003 - Shorewall 1.3.14

    - -

    New features include

    - -
      -
    1. An OLD_PING_HANDLING option has been added to shorewall.conf. - When set to Yes, Shorewall ping handling is as it has always been (see - http://www.shorewall.net/ping.html).
      -
      - When OLD_PING_HANDLING=No, icmp echo (ping) is handled via rules - and policies just like any other connection request. The FORWARDPING=Yes - option in shorewall.conf and the 'noping' and 'filterping' options -in /etc/shorewall/interfaces will all generate an error.
      -
      -
    2. -
    3. It is now possible to direct Shorewall to create a "label" - such as  "eth0:0" for IP addresses that it creates under ADD_IP_ALIASES=Yes - and ADD_SNAT_ALIASES=Yes. This is done by specifying the label instead - of just the interface name:
      -  
      -    a) In the INTERFACE column of /etc/shorewall/masq
      -    b) In the INTERFACE column of /etc/shorewall/nat
      -  
    4. -
    5. Support for OpenVPN Tunnels.
      -
      -
    6. -
    7. Support for VLAN devices with names of the form $DEV.$VID - (e.g., eth0.0)
      -
      -
    8. -
    9. In /etc/shorewall/tcrules, the MARK value may be optionally - followed by ":" and either 'F' or 'P' to designate that the marking will -occur in the FORWARD or PREROUTING chains respectively. If this additional -specification is omitted, the chain used to mark packets will be determined -by the setting of the MARK_IN_FORWARD_CHAIN option in shorewall.conf.
      -
      -
    10. -
    11. When an interface name is entered in the SUBNET column -of the /etc/shorewall/masq file, Shorewall previously masqueraded traffic - from only the first subnet defined on that interface. It did not masquerade - traffic from:
      -  
      -    a) The subnets associated with other addresses on the interface.
      -    b) Subnets accessed through local routers.
      -  
      - Beginning with Shorewall 1.3.14, if you enter an interface name - in the SUBNET column, shorewall will use the firewall's routing table - to construct the masquerading/SNAT rules.
      -  
      - Example 1 -- This is how it works in 1.3.14.
      -   
      - - -
         [root@gateway test]# cat /etc/shorewall/masq
      #INTERFACE              SUBNET                  ADDRESS
      eth0                    eth2                    206.124.146.176
      #LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE
      - - -
         [root@gateway test]# ip route show dev eth2
      192.168.1.0/24  scope link
      192.168.10.0/24  proto kernel  scope link  src 192.168.10.254
      - - -
         [root@gateway test]# shorewall start
      ...
      Masqueraded Subnets and Hosts:
      To 0.0.0.0/0 from 192.168.1.0/24 through eth0 using 206.124.146.176
      To 0.0.0.0/0 from 192.168.10.0/24 through eth0 using 206.124.146.176
      Processing /etc/shorewall/tos...
      -  
      - When upgrading to Shorewall 1.3.14, if you have multiple local - subnets connected to an interface that is specified in the SUBNET column - of an /etc/shorewall/masq entry, your /etc/shorewall/masq file will -need changing. In most cases, you will simply be able to remove redundant -entries. In some cases though, you might want to change from using the -interface name to listing specific subnetworks if the change described -above will cause masquerading to occur on subnetworks that you don't wish -to masquerade.
      -  
      - Example 2 -- Suppose that your current config is as follows:
      -   
      - - -
         [root@gateway test]# cat /etc/shorewall/masq
      #INTERFACE              SUBNET                  ADDRESS
      eth0                    eth2                    206.124.146.176
      eth0                    192.168.10.0/24         206.124.146.176
      #LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE
      - - -
         [root@gateway test]# ip route show dev eth2
      192.168.1.0/24  scope link
      192.168.10.0/24  proto kernel  scope link  src 192.168.10.254
      [root@gateway test]#
      -  
      -    In this case, the second entry in /etc/shorewall/masq is no - longer required.
      -  
      - Example 3 -- What if your current configuration is like this?
      -  
      - - -
         [root@gateway test]# cat /etc/shorewall/masq
      #INTERFACE              SUBNET                  ADDRESS
      eth0                    eth2                    206.124.146.176
      #LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE
      - - -
         [root@gateway test]# ip route show dev eth2
      192.168.1.0/24  scope link
      192.168.10.0/24  proto kernel  scope link  src 192.168.10.254
      [root@gateway test]#
      -  
      -    In this case, you would want to change the entry in  /etc/shorewall/masq - to:
      - - -
         #INTERFACE              SUBNET                  ADDRESS
      eth0                    192.168.1.0/24          206.124.146.176
      #LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE
      -
    12. - -
    -
    - -

    2/5/2003 - Shorewall Support included in Webmin 1.060 -

    - Webmin version 1.060 now has Shorewall support included as standard. - See http://www.webmin.com. - -

    - - -

    - -
      - - - - - -
    - - - - - - - -

    More News

    - - - - - - - - - - +

    + + + + + + + + + +

    3/7/2003 - Shorewall 1.4.0 RC2 (New) +  

    + Shorewall 1.4 represents + the next step in the evolution of Shorewall. The main thrust of the initial + release is simply to remove the cruft that has accumulated in Shorewall + over time.
    +
    + IMPORTANT: Shorewall 1.4.0 requires the iproute package + ('ip' utility).
    +
    + Function from 1.3 that has been omitted from this version include:
    + +
      +
    1. The MERGE_HOSTS variable in shorewall.conf is no + longer supported. Shorewall 1.4 behavior is the same as 1.3 with MERGE_HOSTS=Yes.
      +
      +
    2. +
    3. Interface names of the form <device>:<integer> + in /etc/shorewall/interfaces now generate an error.
      +
      +
    4. +
    5. Shorewall 1.4 implements behavior consistent with OLD_PING_HANDLING=No. + OLD_PING_HANDLING=Yes will generate an error at startup as will specification + of the 'noping' or 'filterping' interface options.
      +
      +
    6. +
    7. The 'routestopped' option in the /etc/shorewall/interfaces + and /etc/shorewall/hosts files is no longer supported and will generate + an error at startup if specified.
      +
      +
    8. +
    9. The Shorewall 1.2 syntax for DNAT and REDIRECT rules is +no longer accepted.
      +
      +
    10. +
    11. The ALLOWRELATED variable in shorewall.conf is no longer +supported. Shorewall 1.4 behavior is the same as 1.3 with ALLOWRELATED=Yes.
      +
      +
    12. +
    13. The icmp.def file has been removed.
      +
    14. + +
    + Changes for 1.4 include:
    + +
      +
    1. The /etc/shorewall/shorewall.conf file has been completely + reorganized into logical sections.
      +
      +
    2. +
    3. LOG is now a valid action for a rule (/etc/shorewall/rules).
      +
      +
    4. +
    5. The firewall script, common functions file and version file +are now installed in /usr/share/shorewall.
      +
      +
    6. +
    7. Late arriving DNS replies are now silently dropped in the + common chain by default.
      +
      +
    8. +
    9. In addition to behaving like OLD_PING_HANDLING=No, Shorewall + 1.4 no longer unconditionally accepts outbound ICMP packets. So if you + want to 'ping' from the firewall, you will need the appropriate rule or +policy.
      +
      +
    10. +
    11. CONTINUE is now a valid action for a rule (/etc/shorewall/rules).
      +
      +
    12. +
    13. 802.11b devices with names of the form wlan<n> + now support the 'maclist' option.
      +
      +
    14. +
    15. Explicit Congestion Notification (ECN - RFC 3168) +may now be turned off on a host or network basis using the new /etc/shorewall/ecn + file. To use this facility:
      +
      +    a) You must be running kernel 2.4.20
      +    b) You must have applied the patch in
      +    http://www.shorewall/net/pub/shorewall/ecn/patch.
      +    c) You must have iptables 1.2.7a installed.
      +
      +
    16. +
    17. The /etc/shorewall/params file is now processed first so that + variables may be used in the /etc/shorewall/shorewall.conf file.
    18. + +
    + You may download the release candidate from:
    + +
    http://www.shorewall.net/pub/shorewall/Beta
    + ftp://ftp.shorewall.net/pub/shorewall/Beta
    +
    + +

    2/8/2003 - Shorewall 1.3.14

    + + +

    New features include

    + + +
      +
    1. An OLD_PING_HANDLING option has been added to shorewall.conf. + When set to Yes, Shorewall ping handling is as it has always been (see + http://www.shorewall.net/ping.html).
      +
      + When OLD_PING_HANDLING=No, icmp echo (ping) is handled via + rules and policies just like any other connection request. The FORWARDPING=Yes + option in shorewall.conf and the 'noping' and 'filterping' options + in /etc/shorewall/interfaces will all generate an error.
      +
      +
    2. +
    3. It is now possible to direct Shorewall to create a +"label" such as  "eth0:0" for IP addresses that it creates under ADD_IP_ALIASES=Yes + and ADD_SNAT_ALIASES=Yes. This is done by specifying the label instead + of just the interface name:
      +  
      +    a) In the INTERFACE column of /etc/shorewall/masq
      +    b) In the INTERFACE column of /etc/shorewall/nat
      +  
    4. +
    5. Support for OpenVPN Tunnels.
      +
      +
    6. +
    7. Support for VLAN devices with names of the form $DEV.$VID + (e.g., eth0.0)
      +
      +
    8. +
    9. In /etc/shorewall/tcrules, the MARK value may be optionally + followed by ":" and either 'F' or 'P' to designate that the marking will + occur in the FORWARD or PREROUTING chains respectively. If this additional + specification is omitted, the chain used to mark packets will be determined + by the setting of the MARK_IN_FORWARD_CHAIN option in shorewall.conf.
      +
      +
    10. +
    11. When an interface name is entered in the SUBNET column + of the /etc/shorewall/masq file, Shorewall previously masqueraded traffic + from only the first subnet defined on that interface. It did not masquerade + traffic from:
      +  
      +    a) The subnets associated with other addresses on the +interface.
      +    b) Subnets accessed through local routers.
      +  
      + Beginning with Shorewall 1.3.14, if you enter an interface + name in the SUBNET column, shorewall will use the firewall's routing + table to construct the masquerading/SNAT rules.
      +  
      + Example 1 -- This is how it works in 1.3.14.
      +   
      + + + +
         [root@gateway test]# cat /etc/shorewall/masq
      #INTERFACE              SUBNET                  ADDRESS
      eth0                    eth2                    206.124.146.176
      #LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE
      + + + +
         [root@gateway test]# ip route show dev eth2
      192.168.1.0/24  scope link
      192.168.10.0/24  proto kernel  scope link  src 192.168.10.254
      + + + +
         [root@gateway test]# shorewall start
      ...
      Masqueraded Subnets and Hosts:
      To 0.0.0.0/0 from 192.168.1.0/24 through eth0 using 206.124.146.176
      To 0.0.0.0/0 from 192.168.10.0/24 through eth0 using 206.124.146.176
      Processing /etc/shorewall/tos...
      +  
      + When upgrading to Shorewall 1.3.14, if you have multiple +local subnets connected to an interface that is specified in the +SUBNET column of an /etc/shorewall/masq entry, your /etc/shorewall/masq +file will need changing. In most cases, you will simply be able to remove +redundant entries. In some cases though, you might want to change from +using the interface name to listing specific subnetworks if the change +described above will cause masquerading to occur on subnetworks that you +don't wish to masquerade.
      +  
      + Example 2 -- Suppose that your current config is as follows:
      +   
      + + + +
         [root@gateway test]# cat /etc/shorewall/masq
      #INTERFACE              SUBNET                  ADDRESS
      eth0                    eth2                    206.124.146.176
      eth0                    192.168.10.0/24         206.124.146.176
      #LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE
      + + + +
         [root@gateway test]# ip route show dev eth2
      192.168.1.0/24  scope link
      192.168.10.0/24  proto kernel  scope link  src 192.168.10.254
      [root@gateway test]#
      +  
      +    In this case, the second entry in /etc/shorewall/masq +is no longer required.
      +  
      + Example 3 -- What if your current configuration is like this?
      +  
      + + + +
         [root@gateway test]# cat /etc/shorewall/masq
      #INTERFACE              SUBNET                  ADDRESS
      eth0                    eth2                    206.124.146.176
      #LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE
      + + + +
         [root@gateway test]# ip route show dev eth2
      192.168.1.0/24  scope link
      192.168.10.0/24  proto kernel  scope link  src 192.168.10.254
      [root@gateway test]#
      +  
      +    In this case, you would want to change the entry in  /etc/shorewall/masq + to:
      + + + +
         #INTERFACE              SUBNET                  ADDRESS
      eth0                    192.168.1.0/24          206.124.146.176
      #LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE
      +
    12. + + +
    +
    + + +

    2/5/2003 - Shorewall Support included in Webmin 1.060 +

    + Webmin version 1.060 now has Shorewall support included as +standard. See http://www.webmin.com. + + +

    + + + +

    + + +
      + + + + + + +
    + + + + + + + +

    More News

    + + + + + + + + + + + +

    Donations

    -
    M
    -
    +
    -
    +
    - + - + - + - + - + - - + +
    @@ -493,12 +544,12 @@ to masquerade.
    - +

    -  

    +  

    @@ -509,32 +560,32 @@ to masquerade.
    - +

    Shorewall is free but if you try it and find it useful, please consider making a donation - to Starlight Children's Foundation. Thanks!

    -
    - -

    Updated 2/21/2003 - Tom Eastep + +

    Updated 3/7/2003 - Tom Eastep -
    +



    diff --git a/STABLE/documentation/shoreline.htm b/STABLE/documentation/shoreline.htm index f1b1ba204..ee7d09311 100644 --- a/STABLE/documentation/shoreline.htm +++ b/STABLE/documentation/shoreline.htm @@ -1,126 +1,129 @@ - + About the Shorewall Author - + - - + + - + - - - + + - - - + + + +
    - +
    +

    Tom Eastep

    -
    - +

    Tom on the PCT - 1991 -

    - +

    +

    Tarry & Tom -- August 2002
    -
    -

    - +
    +

    + - -

    I am currently a member of the design team for the next-generation - operating system from the NonStop Enterprise Division of HP.

    - -

    I became interested in Internet Security when I established a home office - in 1999 and had DSL service installed in our home. I investigated - ipchains and developed the scripts which are now collectively known as - Seattle Firewall. Expanding - on what I learned from Seattle Firewall, I then designed and wrote - Shorewall.

    - -

    I telework from our home in Shoreline, - Washington where I live with my wife Tarry.

    - -

    Our current home network consists of:

    +
  • Tandem Computers, Incorporated + (now part of the The New HP) 1980 - + present
  • +
  • Married 1969 - no children.
  • -
      -
    • 1.2Gz Athlon, Windows XP Pro, 320MB RAM, 40GB & 20GB - IDE HDs and LNE100TX (Tulip) NIC - My personal Windows system. Serves -as a PPTP server for Road Warrior access. Dual boots Mandrake 9.0.
    • -
    • Celeron 1.4Gz, RH8.0, 384MB RAM, 60GB HD, LNE100TX(Tulip) - NIC - My personal Linux System which runs Samba configured as a -WINS server. This system also has VMware installed and can run both - Debian Woody and SuSE 8.1 in virtual machines.
    • -
    • K6-2/350, RH8.0, 384MB RAM, 8GB IDE HD, EEPRO100 NIC  -- Email (Postfix, Courier-IMAP and Mailman), HTTP (Apache), FTP (Pure_ftpd), -DNS server (Bind 9).
    • -
    • PII/233, RH8.0, 256MB MB RAM, 2GB SCSI HD - 3 LNE100TX  - (Tulip) and 1 TLAN NICs  - Firewall running Shorewall 1.3.14  and a DHCP - server.
    • -
    • Duron 750, Win ME, 192MB RAM, 20GB HD, RTL8139 NIC - -My wife's personal system.
    • -
    • PII/400 Laptop, WinXP SP1, 224MB RAM, 12GB HD, onboard - EEPRO100 and EEPRO100 in expansion base and LinkSys WAC11 - My main - work system.
    • -
    - + +

    I am currently a member of the design team for the next-generation + operating system from the NonStop Enterprise Division of HP.

    + +

    I became interested in Internet Security when I established a home office + in 1999 and had DSL service installed in our home. I investigated + ipchains and developed the scripts which are now collectively known +as Seattle Firewall. +Expanding on what I learned from Seattle Firewall, I then designed +and wrote Shorewall.

    + +

    I telework from our home in Shoreline, Washington +where I live with my wife Tarry. 

    + +

    Our current home network consists of:

    + +
      +
    • 1.2Gz Athlon, Windows XP Pro, 320MB RAM, 40GB & +20GB IDE HDs and LNE100TX (Tulip) NIC - My personal Windows system. +Serves as a PPTP server for Road Warrior access. Dual boots Mandrake 9.0.
    • +
    • Celeron 1.4Gz, RH8.0, 384MB RAM, 60GB HD, LNE100TX(Tulip) + NIC - My personal Linux System which runs Samba configured as +a WINS server. This system also has VMware installed and can run +both Debian Woody and SuSE 8.1 in virtual machines.
    • +
    • K6-2/350, RH8.0, 384MB RAM, 8GB IDE HD, EEPRO100 NIC  + - Email (Postfix, Courier-IMAP and Mailman), HTTP (Apache), FTP (Pure_ftpd), + DNS server (Bind 9).
    • +
    • PII/233, RH8.0, 256MB MB RAM, 2GB SCSI HD - 3 +LNE100TX  (Tulip) and 1 TLAN NICs  - Firewall running Shorewall 1.3.14  +and a DHCP server.
    • +
    • Duron 750, Win ME, 192MB RAM, 20GB HD, RTL8139 NIC - +My wife's personal system.
    • +
    • PII/400 Laptop, WinXP SP1, 224MB RAM, 12GB HD, onboard + EEPRO100 and EEPRO100 in expansion base and LinkSys WAC11 - My main + work system.
    • + +
    +

    For more about our network see my Shorewall Configuration.

    - +

    All of our other systems are made by Compaq (part of the new HP).. All of our Tulip NICs are Netgear FA310TXs.

    - +

    - - - - Powered by Mandrake - Protected by ShorewallProtected by Shorewall -

    - -

    Last updated 1/24/2003 -

    + +

    Last updated 3/7/2003 - Tom Eastep

    - Copyright © 2001, 2002, 2003 Thomas -M. Eastep.
    + Copyright © 2001, 2002, 2003 Thomas + M. Eastep.
    +

    diff --git a/STABLE/documentation/shorewall_mirrors.htm b/STABLE/documentation/shorewall_mirrors.htm index 9d1df357c..9926d876d 100644 --- a/STABLE/documentation/shorewall_mirrors.htm +++ b/STABLE/documentation/shorewall_mirrors.htm @@ -1,86 +1,87 @@ - + - + - + - + Shorewall Mirrors - + - - - + + - - - + + + +
    +

    Shorewall Mirrors

    -
    - -

    Remember that updates to the mirrors are often delayed - for 6-12 hours after an update to the primary site.

    - + +

    Remember that updates to the mirrors are often delayed + for 6-12 hours after an update to the primary rsync site. For HTML content, +the main web site (http://shorewall.sf.net) +is updated at the same time as the rsync site.

    +

    The main Shorewall Web Site is http://shorewall.sf.net -and is located in California, USA. It is mirrored at:

    - + href="http://shorewall.sf.net" target="_top">http://shorewall.sf.net + and is located in California, USA. It is mirrored at:

    + - -

    The main Shorewall FTP Site is ftp://ftp.shorewall.net/pub/shorewall/ - and is located in Washington State, USA.  It is mirrored at:

    - + +

    The rsync site is mirrored via FTP at:

    + -Search results and the mailing list archives are always fetched from the + Search results and the mailing list archives are always fetched from the site in Washington State.
    - -

    Last Updated 11/09/2002 - Last Updated 3/7/2003 - Tom Eastep

    - +

    Copyright © 2001, 2002 Thomas M. Eastep.

    -
    + size="2">Copyright
    © 2001, 2002, 2003 Thomas M. Eastep.

    +
    +


    diff --git a/STABLE/documentation/shorewall_quickstart_guide.htm b/STABLE/documentation/shorewall_quickstart_guide.htm index 5d90139ad..e2b34db40 100644 --- a/STABLE/documentation/shorewall_quickstart_guide.htm +++ b/STABLE/documentation/shorewall_quickstart_guide.htm @@ -1,299 +1,304 @@ - + - + - + - + Shorewall QuickStart Guide - + - + - - - + + - - - + +

    Shorewall QuickStart Guides + (HOWTO's)
    + Version 3.1

    + + + +
    +
    - -

    Shorewall QuickStart Guides - (HOWTO's)
    - Version 3.1

    -
    - -

    With thanks to Richard who reminded me once again that we -must all first walk before we can run.
    - The French Translations are courtesy of Patrice Vetsel
    -

    - + +

    With thanks to Richard who reminded me once again that +we must all first walk before we can run.
    + The French Translations are courtesy of Patrice Vetsel
    +

    +

    The Guides

    - -

    These guides provide step-by-step instructions for configuring Shorewall - in common firewall setups.

    - + +

    These guides provide step-by-step instructions for configuring Shorewall + in common firewall setups.

    +

    The following guides are for users who have a single public IP address:

    - + - -

    The above guides are designed to get your first firewall up and running - quickly in the three most common Shorewall configurations.

    - -

    The Shorewall Setup Guide outlines - the steps necessary to set up a firewall where there are multiple - public IP addresses involved or if you want to learn more about Shorewall - than is explained in the single-address guides above.

    - + +

    The above guides are designed to get your first firewall up and running + quickly in the three most common Shorewall configurations.

    + +

    The Shorewall Setup Guide outlines + the steps necessary to set up a firewall where there are multiple + public IP addresses involved or if you want to learn more about +Shorewall than is explained in the single-address guides above.

    + - -

    Documentation Index

    - -

    The following documentation covers a variety of topics and supplements - the QuickStart Guides - described above. Please review the appropriate guide before trying - to use this documentation directly.

    - - + +

    Documentation Index

    + +

    The following documentation covers a variety of topics and supplements + the QuickStart Guides + described above. Please review the appropriate guide before trying + to use this documentation directly.

    + + - +

    If you use one of these guides and have a suggestion for improvement please let me know.

    - -

    Last modified 2/4/2003 - Tom Eastep

    - -

    Copyright 2002, 2003 Thomas M. + +

    Last modified 3/5/2003 - Tom Eastep

    + +

    Copyright 2002, 2003 Thomas M. Eastep
    -

    +

    +



    diff --git a/STABLE/documentation/sourceforge_index.htm b/STABLE/documentation/sourceforge_index.htm index 40d2f62b4..fbd0c0545 100644 --- a/STABLE/documentation/sourceforge_index.htm +++ b/STABLE/documentation/sourceforge_index.htm @@ -6,7 +6,8 @@ - + + Shoreline Firewall (Shorewall) 1.3 @@ -15,23 +16,23 @@ - + + - + - + - + - - + + - + - +
    @@ -42,12 +43,13 @@ +

    Shorwall Logo - Shorewall 1.3 - "iptables made easy"

    @@ -61,35 +63,35 @@ - + -
    - +
    - +
    - + - + - + - + - + - + - + - +
    + @@ -100,7 +102,7 @@ - +

    What is it?

    @@ -113,12 +115,13 @@ - + +

    The Shoreline Firewall, more commonly known as  "Shorewall", is - a Netfilter (iptables) - based firewall that can be used on a dedicated firewall system, - a multi-function gateway/router/server or on a standalone GNU/Linux - system.

    + a Netfilter (iptables) + based firewall that can be used on a dedicated firewall system, + a multi-function gateway/router/server or on a standalone GNU/Linux + system.

    @@ -130,29 +133,30 @@ - + +

    This program is free software; you can redistribute it and/or modify - it under the terms - of Version - 2 of the GNU General Public License as published by the Free Software - Foundation.
    + it under the terms + of Version + 2 of the GNU General Public License as published by the Free Software + Foundation.
    -
    +
    - This program is distributed - in the hope that it will be useful, but - WITHOUT ANY WARRANTY; without even the implied - warranty of MERCHANTABILITY or FITNESS FOR A + This program is distributed + in the hope that it will be useful, but + WITHOUT ANY WARRANTY; without even the implied + warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License - for more details.
    + for more details.
    -
    +
    - You should have received - a copy of the GNU General Public License - along with this program; if not, write to - the Free Software Foundation, Inc., 675 Mass - Ave, Cambridge, MA 02139, USA

    + You should have received + a copy of the GNU General Public License + along with this program; if not, write to + the Free Software Foundation, Inc., 675 + Mass Ave, Cambridge, MA 02139, USA

    @@ -164,7 +168,8 @@ - + +

    Copyright 2001, 2002, 2003 Thomas M. Eastep

    @@ -177,23 +182,27 @@ - + +

    - Jacques Nilo and - Eric Wolzak have a LEAF (router/firewall/gateway - on a floppy, CD or compact flash) distribution called - Bering that features Shorewall-1.3.14 - and Kernel-2.4.20. You can find their work at: - http://leaf.sourceforge.net/devel/jnilo

    - Congratulations to Jacques - and Eric on the recent release of Bering 1.1!!!
    -
    + Jacques Nilo + and Eric Wolzak have a LEAF (router/firewall/gateway + on a floppy, CD or compact flash) distribution + called Bering that features + Shorewall-1.3.14 and Kernel-2.4.20. You can find + their work at: http://leaf.sourceforge.net/devel/jnilo

    + Congratulations to +Jacques and Eric on the recent release of Bering 1.1!!! +
    +
    - + +

    News

    @@ -208,180 +217,222 @@ - -

    2/21/2003 - Shorewall 1.4.0 Beta 1 3/7/2003 - Shorewall 1.4.0 RC2  (New) -  

    - Shorewall 1.4 represents -the next step in the evolution of Shorewall. The main thrust of the initial -release is simply to remove the cruft that has accumulated in Shorewall -over time.
    -
    - IMPORTANT: Shorewall 1.4.0 REQUIRES the iproute package - ('ip' utility).
    -
    - Function from 1.3 that has been omitted from this version include:
    - -
      -
    1. The MERGE_HOSTS variable in shorewall.conf is no longer supported. - Shorewall 1.4 behavior is the same as 1.3 with MERGE_HOSTS=Yes.
      -
      -
    2. -
    3. Interface names of the form <device>:<integer> in -/etc/shorewall/interfaces now generate an error.
      -
      -
    4. -
    5. Shorewall 1.4 implements behavior consistent with OLD_PING_HANDLING=No. - OLD_PING_HANDLING=Yes will generate an error at startup as will specification - of the 'noping' or 'filterping' interface options.
      -
      -
    6. -
    7. The 'routestopped' option in the /etc/shorewall/interfaces and -/etc/shorewall/hosts files is no longer supported and will generate an error -at startup if specified.
      -
      -
    8. -
    9. The Shorewall 1.2 syntax for DNAT and REDIRECT rules is no longer - accepted.
      -
      -
    10. -
    11. The ALLOWRELATED variable in shorewall.conf is no longer supported. - Shorewall 1.4 behavior is the same as 1.3 with ALLOWRELATED=Yes.
      +  

      + Shorewall 1.4 represents + the next step in the evolution of Shorewall. The main thrust of the initial + release is simply to remove the cruft that has accumulated in Shorewall + over time.

      -
    12. -
    13. The icmp.def file has been removed.
      -
    14. - -
    - Changes for 1.4 include:
    - + IMPORTANT: Shorewall 1.4.0 requires the iproute package + ('ip' utility).
    +
    + Function from 1.3 that has been omitted from this version include:
    +
      -
    1. The /etc/shorewall/shorewall.conf file has been completely reorganized - into logical sections.
      -
      -
    2. -
    3. LOG is now a valid action for a rule (/etc/shorewall/rules).
      -
      -
    4. -
    5. The firewall script and version file are now installed in /usr/share/shorewall.
      -
      -
    6. -
    7. Late arriving DNS replies are now silently dropped in the common - chain by default.
      -
      -
    8. -
    9. In addition to behaving like OLD_PING_HANDLING=No, Shorewall -1.4 no longer unconditionally accepts outbound ICMP packets. So if you want -to 'ping' from the firewall, you will need the appropriate rule or policy. -
    10. - -
    - -

    2/8/2003 - Shorewall 1.3.14

    - -

    New features include

    - -
      -
    1. An OLD_PING_HANDLING option has been added to shorewall.conf. - When set to Yes, Shorewall ping handling is as it has always been (see - http://www.shorewall.net/ping.html).
      -
      - When OLD_PING_HANDLING=No, icmp echo (ping) is handled via rules - and policies just like any other connection request. The FORWARDPING=Yes - option in shorewall.conf and the 'noping' and 'filterping' options in - /etc/shorewall/interfaces will all generate an error.
      -
      -
    2. -
    3. It is now possible to direct Shorewall to create a "label" - such as  "eth0:0" for IP addresses that it creates under ADD_IP_ALIASES=Yes - and ADD_SNAT_ALIASES=Yes. This is done by specifying the label instead - of just the interface name:
      -  
      -    a) In the INTERFACE column of /etc/shorewall/masq
      -    b) In the INTERFACE column of /etc/shorewall/nat
      -  
    4. -
    5. Support for OpenVPN Tunnels.
      -
      -
    6. -
    7. Support for VLAN devices with names of the form $DEV.$VID - (e.g., eth0.0)
      +
    8. The MERGE_HOSTS variable in shorewall.conf is no + longer supported. Shorewall 1.4 behavior is the same as 1.3 with MERGE_HOSTS=Yes.

    9. -
    10. In /etc/shorewall/tcrules, the MARK value may be optionally - followed by ":" and either 'F' or 'P' to designate that the marking will -occur in the FORWARD or PREROUTING chains respectively. If this additional -specification is omitted, the chain used to mark packets will be determined -by the setting of the MARK_IN_FORWARD_CHAIN option in shorewall.conf.
      -
      -
    11. -
    12. When an interface name is entered in the SUBNET column -of the /etc/shorewall/masq file, Shorewall previously masqueraded traffic - from only the first subnet defined on that interface. It did not masquerade - traffic from:
      -  
      -    a) The subnets associated with other addresses on the interface.
      -    b) Subnets accessed through local routers.
      -  
      - Beginning with Shorewall 1.3.14, if you enter an interface name - in the SUBNET column, shorewall will use the firewall's routing table - to construct the masquerading/SNAT rules.
      -  
      - Example 1 -- This is how it works in 1.3.14.
      -   
      +
    13. Interface names of the form <device>:<integer> + in /etc/shorewall/interfaces now generate an error.
      +
      +
    14. +
    15. Shorewall 1.4 implements behavior consistent with OLD_PING_HANDLING=No. + OLD_PING_HANDLING=Yes will generate an error at startup as will specification + of the 'noping' or 'filterping' interface options.
      +
      +
    16. +
    17. The 'routestopped' option in the /etc/shorewall/interfaces + and /etc/shorewall/hosts files is no longer supported and will generate + an error at startup if specified.
      +
      +
    18. +
    19. The Shorewall 1.2 syntax for DNAT and REDIRECT rules is +no longer accepted.
      +
      +
    20. +
    21. The ALLOWRELATED variable in shorewall.conf is no longer +supported. Shorewall 1.4 behavior is the same as 1.3 with ALLOWRELATED=Yes.
      +
      +
    22. +
    23. The icmp.def file has been removed.
      +
    24. + +
    + Changes for 1.4 include:
    + +
      +
    1. The /etc/shorewall/shorewall.conf file has been completely + reorganized into logical sections.
      +
      +
    2. +
    3. LOG is now a valid action for a rule (/etc/shorewall/rules).
      +
      +
    4. +
    5. The firewall script, common functions file and version file +are now installed in /usr/share/shorewall.
      +
      +
    6. +
    7. Late arriving DNS replies are now silently dropped in the + common chain by default.
      +
      +
    8. +
    9. In addition to behaving like OLD_PING_HANDLING=No, Shorewall + 1.4 no longer unconditionally accepts outbound ICMP packets. So if you + want to 'ping' from the firewall, you will need the appropriate rule or +policy.
      +
      +
    10. +
    11. CONTINUE is now a valid action for a rule (/etc/shorewall/rules).
      +
      +
    12. +
    13. 802.11b devices with names of the form wlan<n> + now support the 'maclist' option.
      +
      +
    14. +
    15. Explicit Congestion Notification (ECN - RFC 3168) +may now be turned off on a host or network basis using the new /etc/shorewall/ecn + file. To use this facility:
      +
      +    a) You must be running kernel 2.4.20
      +    b) You must have applied the patch in
      +    http://www.shorewall/net/pub/shorewall/ecn/patch.
      +    c) You must have iptables 1.2.7a installed.
      +
      +
    16. +
    17. The /etc/shorewall/params file is now processed first so that + variables may be used in the /etc/shorewall/shorewall.conf file.
    18. + +
    + You may download the Release Candidate from:
    + +
    http://www.shorewall.net/pub/shorewall/Beta
    + ftp://ftp.shorewall.net/pub/shorewall/Beta
    +
    + +

    2/8/2003 - Shorewall 1.3.14

    - + +

    New features include

    + + +
      +
    1. An OLD_PING_HANDLING option has been added to shorewall.conf. + When set to Yes, Shorewall ping handling is as it has always been +(see http://www.shorewall.net/ping.html).
      +
      + When OLD_PING_HANDLING=No, icmp echo (ping) is handled via +rules and policies just like any other connection request. The FORWARDPING=Yes + option in shorewall.conf and the 'noping' and 'filterping' options +in /etc/shorewall/interfaces will all generate an error.
      +
      +
    2. +
    3. It is now possible to direct Shorewall to create a +"label" such as  "eth0:0" for IP addresses that it creates under ADD_IP_ALIASES=Yes + and ADD_SNAT_ALIASES=Yes. This is done by specifying the label instead + of just the interface name:
      +  
      +    a) In the INTERFACE column of /etc/shorewall/masq
      +    b) In the INTERFACE column of /etc/shorewall/nat
      +  
    4. +
    5. Support for OpenVPN Tunnels.
      +
      +
    6. +
    7. Support for VLAN devices with names of the form $DEV.$VID + (e.g., eth0.0)
      +
      +
    8. +
    9. In /etc/shorewall/tcrules, the MARK value may be optionally + followed by ":" and either 'F' or 'P' to designate that the marking will + occur in the FORWARD or PREROUTING chains respectively. If this additional + specification is omitted, the chain used to mark packets will be determined + by the setting of the MARK_IN_FORWARD_CHAIN option in shorewall.conf.
      +
      +
    10. +
    11. When an interface name is entered in the SUBNET column + of the /etc/shorewall/masq file, Shorewall previously masqueraded traffic + from only the first subnet defined on that interface. It did not masquerade + traffic from:
      +  
      +    a) The subnets associated with other addresses on the interface.
      +    b) Subnets accessed through local routers.
      +  
      + Beginning with Shorewall 1.3.14, if you enter an interface +name in the SUBNET column, shorewall will use the firewall's routing +table to construct the masquerading/SNAT rules.
      +  
      + Example 1 -- This is how it works in 1.3.14.
      +   
      + + +
         [root@gateway test]# cat /etc/shorewall/masq
      #INTERFACE              SUBNET                  ADDRESS
      eth0                    eth2                    206.124.146.176
      #LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE
      - + +
         [root@gateway test]# ip route show dev eth2
      192.168.1.0/24  scope link
      192.168.10.0/24  proto kernel  scope link  src 192.168.10.254
      - -
         [root@gateway test]# shorewall start
      ...
      Masqueraded Subnets and Hosts:
      To 0.0.0.0/0 from 192.168.1.0/24 through eth0 using 206.124.146.176
      To 0.0.0.0/0 from 192.168.10.0/24 through eth0 using 206.124.146.176
      Processing /etc/shorewall/tos...
      -  
      - When upgrading to Shorewall 1.3.14, if you have multiple local -subnets connected to an interface that is specified in the SUBNET column -of an /etc/shorewall/masq entry, your /etc/shorewall/masq file will need -changing. In most cases, you will simply be able to remove redundant entries. -In some cases though, you might want to change from using the interface -name to listing specific subnetworks if the change described above will cause -masquerading to occur on subnetworks that you don't wish to masquerade.
      -  
      - Example 2 -- Suppose that your current config is as follows:
      -   
      - + +
         [root@gateway test]# shorewall start
      ...
      Masqueraded Subnets and Hosts:
      To 0.0.0.0/0 from 192.168.1.0/24 through eth0 using 206.124.146.176
      To 0.0.0.0/0 from 192.168.10.0/24 through eth0 using 206.124.146.176
      Processing /etc/shorewall/tos...
      +  
      + When upgrading to Shorewall 1.3.14, if you have multiple local + subnets connected to an interface that is specified in the SUBNET column + of an /etc/shorewall/masq entry, your /etc/shorewall/masq file will +need changing. In most cases, you will simply be able to remove redundant +entries. In some cases though, you might want to change from using the +interface name to listing specific subnetworks if the change described +above will cause masquerading to occur on subnetworks that you don't wish +to masquerade.
      +  
      + Example 2 -- Suppose that your current config is as follows:
      +   
      + + +
         [root@gateway test]# cat /etc/shorewall/masq
      #INTERFACE              SUBNET                  ADDRESS
      eth0                    eth2                    206.124.146.176
      eth0                    192.168.10.0/24         206.124.146.176
      #LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE
      - -
         [root@gateway test]# ip route show dev eth2
      192.168.1.0/24  scope link
      192.168.10.0/24  proto kernel  scope link  src 192.168.10.254
      [root@gateway test]#
      -  
      -    In this case, the second entry in /etc/shorewall/masq is no -longer required.
      -  
      - Example 3 -- What if your current configuration is like this?
      -  
      - + +
         [root@gateway test]# ip route show dev eth2
      192.168.1.0/24  scope link
      192.168.10.0/24  proto kernel  scope link  src 192.168.10.254
      [root@gateway test]#
      +  
      +    In this case, the second entry in /etc/shorewall/masq is + no longer required.
      +  
      + Example 3 -- What if your current configuration is like this?
      +  
      + + +
         [root@gateway test]# cat /etc/shorewall/masq
      #INTERFACE              SUBNET                  ADDRESS
      eth0                    eth2                    206.124.146.176
      #LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE
      - -
         [root@gateway test]# ip route show dev eth2
      192.168.1.0/24  scope link
      192.168.10.0/24  proto kernel  scope link  src 192.168.10.254
      [root@gateway test]#
      -  
      -    In this case, you would want to change the entry in  /etc/shorewall/masq - to:
      - + +
         [root@gateway test]# ip route show dev eth2
      192.168.1.0/24  scope link
      192.168.10.0/24  proto kernel  scope link  src 192.168.10.254
      [root@gateway test]#
      +  
      +    In this case, you would want to change the entry in  /etc/shorewall/masq + to:
      + + +
         #INTERFACE              SUBNET                  ADDRESS
      eth0                    192.168.1.0/24          206.124.146.176
      #LAST LINE -- ADD YOUR ENTRIES ABOVE THIS LINE -- DO NOT REMOVE
      -
    12. - + + +
    - + +

    2/5/2003 - Shorewall Support included in Webmin 1.060 -

    - Webmin version 1.060 now has Shorewall support included as standard. - See http://www.webmin.com - +

    + Webmin version 1.060 now has Shorewall support included as +standard. See http://www.webmin.com + +

    @@ -391,7 +442,7 @@ longer required.
    - +
      @@ -400,7 +451,7 @@ longer required.
      - +
    @@ -409,7 +460,7 @@ longer required.
    - +

    More News

    @@ -422,31 +473,34 @@ longer required.
    - + +

    - + +

    SourceForge Logo -

    + - + +

    - +

    This site is hosted by the generous folks at SourceForge.net

    @@ -454,43 +508,44 @@ longer required.
    - + +

    Donations

    -

    -
    -
    + -
    +
    - + - + - + - + - + - + - +
    @@ -501,12 +556,12 @@ longer required.
    - +

    -

    +

    @@ -518,32 +573,32 @@ longer required.
    - +

    Shorewall is free but if you try it and find it useful, please consider making a donation - to Starlight Children's Foundation. Thanks!

    -
    - -

    Updated 2/19/2003 - Tom Eastep + +

    Updated 3/7/2003 - Tom Eastep -
    +



    diff --git a/STABLE/documentation/support.htm b/STABLE/documentation/support.htm index 9dbdce6a8..f5b99a6f1 100644 --- a/STABLE/documentation/support.htm +++ b/STABLE/documentation/support.htm @@ -2,131 +2,139 @@ - + + - + + - + + - + + - Support + Shorewall Support Guide - + - + - - - + + - + + + - - + + +
    +
    - -

    Shorewall SupportShorewall Support Guide -

    -
    - -

    While I don't answer Shorewall  questions - emailed directly to me, I try to spend some time each day answering questions - on the Shorewall Users Mailing List. While I don't answer Shorewall  questions + emailed directly to me, I try to spend some time each day answering questions + on the Shorewall Users Mailing List and on the Support Forum.

    - +

    -Tom Eastep

    - +

    Before Reporting a Problem

    - "Well at least you tried to read the documentation, which is a lot more - than some people on this list appear to do."
    -
    - + "Well at least you tried to read the documentation, which is a lot + more than some people on this list appear to do."
    +
    +
    - Wietse Venema - On the Postfix mailing list
    -
    -
    - There are a number of sources for - problem solution information. Please try these before you post. - +
    +
    + There are a number of sources + for problem solution information. Please try these before you +post.

    - +

    - + - +

    - +
      -
    • The Troubleshooting Information contains - a number of tips to help you solve common problems.
    • - +
    • The Troubleshooting Information contains + a number of tips to help you solve common problems.
    • +
    - +

    - +
      -
    • The Errata has links to download updated - components.
    • - +
    • The Errata has links to download updated + components.
    • +
    - +

    - +
      -
    • The Mailing List - Archives search facility can locate posts about similar -problems:
    • - +
    • The Mailing +List Archives search facility can locate posts about similar + problems:
    • +
    - +

    - -

    Mailing List Archive Search

    - -
    - -

    Match: - +

    Mailing List Archive Search

    + + + + +

    Match: + - Format: - + Format: + + - Sort by: - + Sort by: + + -
    - Search:

    - - + Search: +

    + +

    Problem Reporting Guidelines

    - "Let me see if I can translate your message into a real-world - example. It would be like saying that you have three rooms at home, - and when you walk into one of the rooms, you detect this strange smell. - Can anyone tell you what that strange smell is?
    -
    - Now, all of us could do some wonderful guessing as to the - smell and even what's causing it. You would be absolutely amazed -at the range and variety of smells we could come up with. Even more -amazing is that all of the explanations for the smells would be completely -plausible."
    -

    - + "Let me see if I can translate your message into a +real-world example. It would be like saying that you have three +rooms at home, and when you walk into one of the rooms, you detect +this strange smell. Can anyone tell you what that strange smell is?
    +
    + Now, all of us could do some wonderful guessing as to +the smell and even what's causing it. You would be absolutely amazed + at the range and variety of smells we could come up with. Even more + amazing is that all of the explanations for the smells would be completely + plausible."
    +

    +
    - Russell Mosemann on the Postfix mailing list
    -
    -
    + +
    - +

    - -
      -
    • Please remember we only know what is posted in your message. - Do not leave out any information that appears to be correct, or was -mentioned in a previous post. There have been countless posts by people -who were sure that some part of their configuration was correct when it -actually contained a small error. We tend to be skeptics where detail -is lacking.
      -
      -
    • -
    • Please keep in mind that you're asking for free - technical support. Any help we offer is an act of generosity, not an -obligation. Try to make it easy for us to help you. Follow good, courteous -practices in writing and formatting your e-mail. Provide details that -we need if you expect good answers. Exact quoting of error messages, -log entries, command output, and other output is better than a paraphrase -or summary.
      -
      -
    • -
    • Please don't describe -your environment and then ask us to send you custom -configuration files. We're here to answer your questions but we - can't do your job for you.
      -
      -
    • -
    • When reporting a problem, ALWAYS include - this information:
    • - -
    - -
      - -
        -
      • the exact version of Shorewall you are running.
        -
        - shorewall version
        -

        -
      • - -
      - -
        -
      • the exact kernel version you are running
        -
        - uname -a
        -
        -
      • - -
      - -
        -
      • the complete, exact output of
        -
        - ip addr show
        -
        -
      • - -
      - -
        -
      • the complete, exact output of
        -
        - ip route show
        -
        -
      • - -
      - -
        -
      • If your kernel is modularized, the exact output from
        -
        - lsmod
        -
        -
      • -
      • the exact wording of any ping failure responses
        -
        -
      • -
      • If you installed Shorewall using one of the QuickStart Guides, -please indicate which one.
        -
        -
      • -
      • If you are running Shorewall under Mandrake using the Mandrake - installation of Shorewall, please say so.
        -
        -
      • - -
      - -
    - -
      -
    • NEVER include the output of "iptables -L". Instead, if you are having connection problems of -any kind then:
      -
      -1. /sbin/shorewall/reset
      -
      -2. Try the connection that is failing.
      -
      -3. /sbin/shorewall status > /tmp/status.txt
      -
      -4. Post the /tmp/status.txt file as an attachment.
      -
      -
    • -
    • As a general matter, please do not edit the diagnostic - information in an attempt to conceal your IP address, netmask, - nameserver addresses, domain name, etc. These aren't secrets, and concealing - them often misleads us (and 80% of the time, a hacker could derive them - anyway from information contained in the SMTP headers of your post).
    • - -
    - -
      - -
    - -

    - -
      -
    - -

    -
      -
    • Do you see any -"Shorewall" messages ("/sbin/shorewall show -log") when you exercise the function that is giving -you problems? If so, include the message(s) in your post along with a -copy of your /etc/shorewall/interfaces file.
      -
      -
    • -
    • Please include any of the Shorewall configuration files - (especially the /etc/shorewall/hosts file if you have modified - that file) that you think are relevant. If you include /etc/shorewall/rules, - please include /etc/shorewall/policy as well (rules are meaningless unless - one also knows the policies).
    • - +
    • Please remember we only know what is posted in your message. + Do not leave out any information that appears to be correct, or was + mentioned in a previous post. There have been countless posts by people + who were sure that some part of their configuration was correct when + it actually contained a small error. We tend to be skeptics where detail + is lacking.
      +
      +
    • +
    • Please keep in mind that you're asking for free + technical support. Any help we offer is an act of generosity, not +an obligation. Try to make it easy for us to help you. Follow good, +courteous practices in writing and formatting your e-mail. Provide +details that we need if you expect good answers. Exact quoting +of error messages, log entries, command output, and other output is better +than a paraphrase or summary.
      +
      +
    • +
    • Please don't describe + your environment and then ask us to send you custom + configuration files. We're here to answer your questions but + we can't do your job for you.
      +
      +
    • +
    • When reporting a problem, ALWAYS include + this information:
    • +
    - -

    - +
      - + +
        +
      • the exact version of Shorewall you are running.
        +
        + shorewall version
        +

        +
      • + +
      + +
        +
      • the exact kernel version you are running
        +
        + uname -a
        +
        +
      • + +
      + +
        +
      • the complete, exact output of
        +
        + ip addr show
        +
        +
      • + +
      + +
        +
      • the complete, exact output of
        +
        + ip route show
        +
        +
      • + +
      + +
        +
      • If your kernel is modularized, the exact output from
        +
        + lsmod
        +
        +
      • +
      • the exact wording of any ping failure responses
        +
        +
      • +
      • If you installed Shorewall using one of the QuickStart Guides, + please indicate which one.
        +
        +
      • +
      • If you are running Shorewall under Mandrake using the Mandrake + installation of Shorewall, please say so.
        +
        +
      • + +
      +
    - -

    - +
      -
    • If an error occurs - when you try to "shorewall start", - include a trace (See the Troubleshooting - section for instructions).
    • - +
    • NEVER include the output of "iptables -L". Instead, if you are having connection problems of + any kind then:
      +
      + 1. /sbin/shorewall/reset
      +
      + 2. Try the connection that is failing.
      +
      + 3. /sbin/shorewall status > /tmp/status.txt
      +
      + 4. Post the /tmp/status.txt file as an attachment.
      +
      +
    • +
    • As a general matter, please do not edit the diagnostic + information in an attempt to conceal your IP address, netmask, + nameserver addresses, domain name, etc. These aren't secrets, and concealing + them often misleads us (and 80% of the time, a hacker could derive +them anyway from information contained in the SMTP headers of your post).
    • +
    - -

    - +
      -
    • -

      The list server limits posts to 120kb so don't post GIFs of - your network layout, etc. to the Mailing List -- your - post will be rejected.

      -
    • -
    - The author gratefully acknowleges that the above list was heavily - plagiarized from the excellent LEAF document by Ray Olszewski - found at http://leaf-project.org/pub/doc/docmanager/docid_1891.html.
    - -

    Please post in plain text

    - -
    - A growing number of MTAs serving list subscribers are rejecting - all HTML traffic. At least one MTA has gone so far as to blacklist -shorewall.net "for continuous abuse" because it has been my policy to -allow HTML in list posts!!
    -
    - I think that blocking all HTML is a Draconian way to control - spam and that the ultimate losers here are not the spammers but the -list subscribers whose MTAs are bouncing all shorewall.net mail. As -one list subscriber wrote to me privately "These e-mail admin's need -to get a (expletive deleted) life instead of trying to rid the -planet of HTML based e-mail". Nevertheless, to allow subscribers to receive -list posts as must as possible, I have now configured the list server -at shorewall.net to strip all HTML from outgoing posts.
    + +

    + +
      + +
    + +

    + +
      +
    • Do you see +any "Shorewall" messages ("/sbin/shorewall +show log") when you exercise the function that +is giving you problems? If so, include the message(s) in your post +along with a copy of your /etc/shorewall/interfaces file.
      +
      +
    • +
    • Please include any of the Shorewall configuration files + (especially the /etc/shorewall/hosts file if you have +modified that file) that you think are relevant. If you +include /etc/shorewall/rules, please include /etc/shorewall/policy +as well (rules are meaningless unless one also knows the policies). +
    • + +
    + +

    + +
      +
    + +

    + +
      +
    • If an error occurs + when you try to "shorewall start", + include a trace (See the Troubleshooting + section for instructions).
    • + +
    + +

    + +
      +
    • + +

      The list server limits posts to 120kb so don't post GIFs of + your network layout, etc. to the Mailing List -- your + post will be rejected.

      +
    • + +
    + The author gratefully acknowleges that the above list was heavily + plagiarized from the excellent LEAF document by Ray Olszewski + found at http://leaf-project.org/pub/doc/docmanager/docid_1891.html.
    + +

    Please post in plain text

    + +
    + A growing number of MTAs serving list subscribers are rejecting + all HTML traffic. At least one MTA has gone so far as to blacklist +shorewall.net "for continuous abuse" because it has been my policy to +allow HTML in list posts!!
    +
    + I think that blocking all HTML is a Draconian way to control + spam and that the ultimate losers here are not the spammers but the + list subscribers whose MTAs are bouncing all shorewall.net mail. As + one list subscriber wrote to me privately "These e-mail admin's need +to get a (expletive deleted) life instead of trying to rid the planet +of HTML based e-mail". Nevertheless, to allow subscribers to receive list +posts as must as possible, I have now configured the list server at shorewall.net +to strip all HTML from outgoing posts.
    +

    Where to Send your Problem Report or to Ask for Help

    - -
    -

    If you run Shorewall under Bering -- please post your question or problem - to the LEAF Users - mailing list.

    - If you run Shorewall under MandrakeSoft Multi Network -Firewall (MNF) and you have not purchased an MNF license from MandrakeSoft -then you can post non MNF-specific Shorewall questions to the Shorewall users mailing - list. Do not expect to get free MNF support on the list.
    - -

    Otherwise, please post your question or problem to the Shorewall users mailing - list.

    -
    - - - - -

    To Subscribe to the mailing list go to http://lists.shorewall.net/mailman/listinfo/shorewall-users - .

    - - -

    Last Updated 2/22/2003 - Tom Eastep

    +
    + +

    If you run Shorewall under Bering -- please post your question or problem + to the LEAF Users + mailing list.

    + If you run Shorewall under MandrakeSoft Multi Network + Firewall (MNF) and you have not purchased an MNF license from MandrakeSoft + then you can post non MNF-specific Shorewall questions to the Shorewall users mailing + list or to the Shorewall Support +Forum. Do not expect to get free MNF support on the list or forum.
    + + +

    Otherwise, please post your question or problem to the Shorewall users mailing + list or to the Shorewall Support +Forum.

    +
    + + + + +

    The Shorewall List Server provides additional information about Shorewall Mailing Lists.
    +

    + + +

    Last Updated 3/6/2003 - Tom Eastep

    + +

    Copyright © 2001, 2002, 2003 Thomas M. Eastep.
    -

    -
    -
    -
    -
    -
    +



    diff --git a/STABLE/firewall b/STABLE/firewall index 3be57778f..efdd3a5be 100755 --- a/STABLE/firewall +++ b/STABLE/firewall @@ -3500,9 +3500,9 @@ add_common_rules() { logdisp() # $1 = Chain Name { if [ "$RFC1918_LOG_LEVEL" = ULOG ]; then - echo "ULOG --ulog-prefix Shorewall:${1}:DROP:" + echo "ULOG $LOGPARMS --ulog-prefix Shorewall:${1}:DROP:" else - echo "LOG --log-prefix Shorewall:${1}:DROP: --log-level $RFC1918_LOG_LEVEL" + echo "LOG $LOGPARMS --log-prefix Shorewall:${1}:DROP: --log-level $RFC1918_LOG_LEVEL" fi } #