mirror of
https://gitlab.com/shorewall/code.git
synced 2024-11-14 11:44:01 +01:00
Fix capability report -- Simon Matter
git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@622 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
parent
06e38b587d
commit
fc1cc9b0eb
@ -25,3 +25,4 @@ Changes since 1.4.5
|
||||
|
||||
10) Added the SHOREWALL_SHELL configuraiton parameter.
|
||||
|
||||
11) Fixed capability reporting (thanks to Simon Matter).
|
||||
|
@ -3364,7 +3364,7 @@ report_capability() # $1 = Capability Name, $2 Capability Setting (if any)
|
||||
{
|
||||
local setting=
|
||||
|
||||
[ $1 = "Yes" ] && { setting="Available"; shift; } || setting="Not available"
|
||||
[ x$1 = "xYes" ] && { setting="Available"; shift; } || setting="Not available"
|
||||
|
||||
echo " " $@: $setting
|
||||
}
|
||||
|
@ -13,7 +13,11 @@ Problems Corrected:
|
||||
|
||||
Example:
|
||||
|
||||
ACCEPT fw net:206.124.146.0/24 tcp pop3
|
||||
ACCEPT fw net:206.124.146.0/24 tcp pop3
|
||||
|
||||
3) A problem introduced in Snapshot 20030629 has been corrected whereby
|
||||
the output of the capabilities report was corrupted in the case
|
||||
where the capability was not available.
|
||||
|
||||
New Features:
|
||||
|
||||
@ -86,4 +90,4 @@ New Features:
|
||||
|
||||
7) The shell used to interpret the firewall script
|
||||
(/usr/share/shorewall/firewall) may now be specified using the
|
||||
SHOREWALL_SHELL parameter in shorewall.conf.
|
||||
SHOREWALL_SHELL parameter in shorewall.conf.
|
||||
|
@ -417,7 +417,7 @@ MUTEX_TIMEOUT=60
|
||||
#
|
||||
# NEWNOTSYN
|
||||
#
|
||||
# If this variable is set to "No" or "no", then When a TCP packet that does
|
||||
# If this variable is set to "No" or "no", then when a TCP packet that does
|
||||
# not have the SYN flag set and the ACK and RST flags clear then unless the
|
||||
# packet is part of an established connection, it will be dropped by the
|
||||
# firewall
|
||||
|
Loading…
Reference in New Issue
Block a user