Mention shorewall.conf security in the Shorewall Lite documentation

git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@5361 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
teastep 2007-02-04 17:47:55 +00:00
parent 4b479d2671
commit dc3a6c4110

View File

@ -115,7 +115,7 @@
<para>The <command>shorewall-lite call</command> command allows <para>The <command>shorewall-lite call</command> command allows
you to to call interactively any Shorewall function that you can you to to call interactively any Shorewall function that you can
call in an extension script. </para> call in an extension script.</para>
</listitem> </listitem>
</itemizedlist> </itemizedlist>
</listitem> </listitem>
@ -212,6 +212,21 @@
network. You need not configure Shorewall there and you may totally network. You need not configure Shorewall there and you may totally
disable startup of Shorewall in your init scripts. For ease of disable startup of Shorewall in your init scripts. For ease of
reference, we call this system the 'administrative system'.</para> reference, we call this system the 'administrative system'.</para>
<caution>
<para>If you want to be able to allow non-root users to manage
remote filewall systems, then the file
<filename>/etc/shorewall/shorewall.conf</filename> must be readable
by all users on the administrative system. Not all packages secure
the file that way and you may have to change the file permissions
yourself. /sbin/shorewall uses the SHOREWALL_SHELL setting from
<filename>/etc/shorewall/shorewall.conf</filename> to determine the
shell to use when compiling programs and it uses the VERBOSITY
setting for determining how much output the compiler generates. All
other settings are taken from the <filename>shorewall.conf
</filename>file in the remote systems <firstterm>export
directory</firstterm> (see below).</para>
</caution>
</listitem> </listitem>
<listitem> <listitem>