mirror of
https://gitlab.com/shorewall/code.git
synced 2025-06-20 01:37:59 +02:00
Fix '\!' in hosts file
git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@2017 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
parent
8933f61524
commit
e6e9fccab4
@ -125,3 +125,5 @@ Changes in 2.0.17
|
|||||||
1) Fix rejNotSyn.
|
1) Fix rejNotSyn.
|
||||||
|
|
||||||
2) Fix port numbers in action.AllowPCA
|
2) Fix port numbers in action.AllowPCA
|
||||||
|
|
||||||
|
3) Fix "!" in hosts file's HOST column.
|
||||||
|
@ -28,7 +28,7 @@
|
|||||||
# shown below. Simply run this script to revert to your prior version of
|
# shown below. Simply run this script to revert to your prior version of
|
||||||
# Shoreline Firewall.
|
# Shoreline Firewall.
|
||||||
|
|
||||||
VERSION=2.0.16
|
VERSION=2.0.17
|
||||||
|
|
||||||
usage() # $1 = exit status
|
usage() # $1 = exit status
|
||||||
{
|
{
|
||||||
|
@ -5323,7 +5323,7 @@ activate_rules()
|
|||||||
shift
|
shift
|
||||||
|
|
||||||
if havenatchain $destchain ; then
|
if havenatchain $destchain ; then
|
||||||
run_iptables -t nat -A $sourcechain $@ -j $destchain
|
run_iptables2 -t nat -A $sourcechain $@ -j $destchain
|
||||||
elif [ -n "$BRIDGING" -a -f $TMP_DIR/physdev ]; then
|
elif [ -n "$BRIDGING" -a -f $TMP_DIR/physdev ]; then
|
||||||
rm -f #TMP_DIR/physdev
|
rm -f #TMP_DIR/physdev
|
||||||
fi
|
fi
|
||||||
@ -5340,7 +5340,7 @@ activate_rules()
|
|||||||
shift
|
shift
|
||||||
|
|
||||||
if havenatchain $destchain; then
|
if havenatchain $destchain; then
|
||||||
eval run_iptables -t nat -I $sourcechain \
|
eval run_iptables2 -t nat -I $sourcechain \
|
||||||
\$${sourcechain}_rule $@ -j $destchain
|
\$${sourcechain}_rule $@ -j $destchain
|
||||||
eval ${sourcechain}_rule=\$\(\(\$${sourcechain}_rule + 1\)\)
|
eval ${sourcechain}_rule=\$\(\(\$${sourcechain}_rule + 1\)\)
|
||||||
elif [ -n "$BRIDGING" -a -f $TMP_DIR/physdev ]; then
|
elif [ -n "$BRIDGING" -a -f $TMP_DIR/physdev ]; then
|
||||||
@ -5393,7 +5393,7 @@ activate_rules()
|
|||||||
interface=${host%%:*}
|
interface=${host%%:*}
|
||||||
networks=${host#*:}
|
networks=${host#*:}
|
||||||
|
|
||||||
run_iptables -A OUTPUT -o $interface $(match_dest_hosts $networks) -j $chain1
|
run_iptables2 -A OUTPUT -o $interface $(match_dest_hosts $networks) -j $chain1
|
||||||
|
|
||||||
#
|
#
|
||||||
# Add jumps from the builtin chains for DNAT and SNAT rules
|
# Add jumps from the builtin chains for DNAT and SNAT rules
|
||||||
@ -5401,10 +5401,10 @@ activate_rules()
|
|||||||
addrulejump PREROUTING $(dnat_chain $zone) -i $interface $(match_source_hosts $networks)
|
addrulejump PREROUTING $(dnat_chain $zone) -i $interface $(match_source_hosts $networks)
|
||||||
addrulejump POSTROUTING $(snat_chain $zone) -o $interface $(match_dest_hosts $networks)
|
addrulejump POSTROUTING $(snat_chain $zone) -o $interface $(match_dest_hosts $networks)
|
||||||
|
|
||||||
run_iptables -A $(input_chain $interface) $(match_source_hosts $networks) -j $chain2
|
run_iptables2 -A $(input_chain $interface) $(match_source_hosts $networks) -j $chain2
|
||||||
|
|
||||||
[ -n "$complex" ] && \
|
[ -n "$complex" ] && \
|
||||||
run_iptables -A $(forward_chain $interface) $(match_source_hosts $networks) -j $frwd_chain
|
run_iptables2 -A $(forward_chain $interface) $(match_source_hosts $networks) -j $frwd_chain
|
||||||
|
|
||||||
case $networks in
|
case $networks in
|
||||||
*.*.*.*)
|
*.*.*.*)
|
||||||
@ -5469,7 +5469,7 @@ activate_rules()
|
|||||||
# routeback was specified for this host group
|
# routeback was specified for this host group
|
||||||
#
|
#
|
||||||
if [ $zone != $zone1 -o $num_ifaces -gt 1 ] || list_search $host1 $routeback ; then
|
if [ $zone != $zone1 -o $num_ifaces -gt 1 ] || list_search $host1 $routeback ; then
|
||||||
run_iptables -A $frwd_chain -o $interface1 $(match_dest_hosts $networks1) -j $chain
|
run_iptables2 -A $frwd_chain -o $interface1 $(match_dest_hosts $networks1) -j $chain
|
||||||
fi
|
fi
|
||||||
done
|
done
|
||||||
else
|
else
|
||||||
@ -5484,7 +5484,7 @@ activate_rules()
|
|||||||
networks1=${host1#*:}
|
networks1=${host1#*:}
|
||||||
|
|
||||||
if [ "$host" != "$host1" ] || list_search $host $routeback; then
|
if [ "$host" != "$host1" ] || list_search $host $routeback; then
|
||||||
run_iptables -A $chain1 $(match_source_hosts $networks) -o $interface1 $(match_dest_hosts $networks1) -j $chain
|
run_iptables2 -A $chain1 $(match_source_hosts $networks) -o $interface1 $(match_dest_hosts $networks1) -j $chain
|
||||||
fi
|
fi
|
||||||
done
|
done
|
||||||
done
|
done
|
||||||
|
@ -22,7 +22,7 @@
|
|||||||
# Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA
|
# Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA
|
||||||
#
|
#
|
||||||
|
|
||||||
VERSION=2.0.16
|
VERSION=2.0.17
|
||||||
|
|
||||||
usage() # $1 = exit status
|
usage() # $1 = exit status
|
||||||
{
|
{
|
||||||
|
@ -307,3 +307,7 @@ Problems corrected in 2.0.17
|
|||||||
2) The UDP and TCP port numbers in /usr/share/shorewall/action.AllowPCA
|
2) The UDP and TCP port numbers in /usr/share/shorewall/action.AllowPCA
|
||||||
were reversed.
|
were reversed.
|
||||||
|
|
||||||
|
3) If a zone is defined in /etc/shorewall/hosts using
|
||||||
|
<interface>:!<network> in the HOSTS column then startup errors occur
|
||||||
|
on "shorewall [re]start".
|
||||||
|
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
%define name shorewall
|
%define name shorewall
|
||||||
%define version 2.0.16
|
%define version 2.0.17
|
||||||
%define release 1
|
%define release 1
|
||||||
%define prefix /usr
|
%define prefix /usr
|
||||||
|
|
||||||
@ -141,6 +141,8 @@ fi
|
|||||||
%doc COPYING INSTALL changelog.txt releasenotes.txt tunnel
|
%doc COPYING INSTALL changelog.txt releasenotes.txt tunnel
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Thu Mar 31 2005 Tom Eastep tom@shorewall.net
|
||||||
|
- Updated to 2.0.17-1
|
||||||
* Tue Feb 01 2005 Tom Eastep tom@shorewall.net
|
* Tue Feb 01 2005 Tom Eastep tom@shorewall.net
|
||||||
- Updated to 2.0.16-1
|
- Updated to 2.0.16-1
|
||||||
* Wed Jan 12 2005 Tom Eastep tom@shorewall.net
|
* Wed Jan 12 2005 Tom Eastep tom@shorewall.net
|
||||||
|
@ -26,7 +26,7 @@
|
|||||||
# You may only use this script to uninstall the version
|
# You may only use this script to uninstall the version
|
||||||
# shown below. Simply run this script to remove Seattle Firewall
|
# shown below. Simply run this script to remove Seattle Firewall
|
||||||
|
|
||||||
VERSION=2.0.16
|
VERSION=2.0.17
|
||||||
|
|
||||||
usage() # $1 = exit status
|
usage() # $1 = exit status
|
||||||
{
|
{
|
||||||
|
Loading…
x
Reference in New Issue
Block a user