Configuration Files

Warning: If you copy or edit your configuration files on a system running Microsoft Windows, you must run them through dos2unix before you use them with Shorewall.

Files

Shorewall's configuration files are in the directory /etc/shorewall.

Comments

You may place comments in configuration files by making the first non-whitespace character a pound sign ("#"). You may also place comments at the end of any line, again by delimiting the comment from the rest of the line with a pound sign.

Examples:

# This is a comment
ACCEPT	net	fw	tcp	www	#This is an end-of-line comment

Line Continuation

You may continue lines in the configuration files using the usual backslash ("\") followed immediately by a new line character.

Example:

ACCEPT	net	fw	tcp \
smtp,www,pop3,imap #Services running on the firewall

Using DNS Names

WARNING: I personally recommend strongly against using DNS names in Shorewall configuration files. If you use DNS names and you are called out of bed at 2:00AM because Shorewall won't start as a result of DNS problems then don't say that you were not forewarned.

    -Tom

Beginning with Shorwall 1.3.9, Host addresses in Shorewall configuration files may be specified as either IP addresses or DNS Names.

DNS names in iptables rules aren't nearly as useful as they first appear. When a DNS name appears in a rule, the iptables utility resolves the name to one or more IP addresses and inserts those addresses into the rule. So changes in the DNS->IP address relationship that occur after the firewall has started have absolutely no effect on the firewall's ruleset.

If your firewall rules include DNS names then:

Each DNS name much be fully qualified and include a minumum of two periods (although one may be trailing). This restriction is imposed by Shorewall to insure backward compatibility with existing configuration files.

Examples of valid DNS names:

Examples of invalid DNS names:
DNS names may not be used as:
These restrictions are not imposed by Shorewall simply for your inconvenience but are rather limitations of iptables.

Complementing an Address or Subnet

Where specifying an IP address, a subnet or an interface, you can precede the item with "!" to specify the complement of the item. For example, !192.168.1.4 means "any host but 192.168.1.4". There must be no white space following the "!".

Comma-separated Lists

Comma-separated lists are allowed in a number of contexts within the configuration files. A comma separated list:

Port Numbers/Service Names

Unless otherwise specified, when giving a port number you can use either an integer or a service name from /etc/services.

Port Ranges

If you need to specify a range of ports, the proper syntax is <low port number>:<high port number>. For example, if you want to forward the range of tcp ports 4000 through 4100 to local host 192.168.1.3, the entry in /etc/shorewall/rules is:

     DNAT	net	loc:192.168.1.3	tcp	4000:4100

Using Shell Variables

You may use the /etc/shorewall/params file to set shell variables that you can then use in some of the other configuration files.

It is suggested that variable names begin with an upper case letter to distinguish them from variables used internally within the Shorewall programs

Example:

NET_IF=eth0
NET_BCAST=130.252.100.255
NET_OPTIONS=noping,norfc1918


Example (/etc/shorewall/interfaces record):

net $NET_IF $NET_BCAST $NET_OPTIONS

The result will be the same as if the record had been written

net eth0 130.252.100.255 noping,norfc1918

Variables may be used anywhere in the other configuration files.

Using MAC Addresses

Media Access Control (MAC) addresses can be used to specify packet source in several of the configuration files. To use this feature, your kernel must have MAC Address Match support (CONFIG_IP_NF_MATCH_MAC) included.

MAC addresses are 48 bits wide and each Ethernet Controller has a unique MAC address.

In GNU/Linux, MAC addresses are usually written as a series of 6 hex numbers separated by colons. Example:

     [root@gateway root]# ifconfig eth0
     eth0 Link encap:Ethernet HWaddr 02:00:08:E3:FA:55
     inet addr:206.124.146.176 Bcast:206.124.146.255 Mask:255.255.255.0
     UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
     RX packets:2398102 errors:0 dropped:0 overruns:0 frame:0
     TX packets:3044698 errors:0 dropped:0 overruns:0 carrier:0
     collisions:30394 txqueuelen:100
     RX bytes:419871805 (400.4 Mb) TX bytes:1659782221 (1582.8 Mb)
     Interrupt:11 Base address:0x1800

Because Shorewall uses colons as a separator for address fields, Shorewall requires MAC addresses to be written in another way. In Shorewall, MAC addresses begin with a tilde ("~") and consist of 6 hex numbers separated by hyphens. In Shorewall, the MAC address in the example above would be written "~02-00-08-E3-FA-55".

Note: It is not necessary to use the special Shorewall notation in the /etc/shorewall/maclist file.

Logging

By default, Shorewall directs NetFilter to log using syslog (8). Syslog classifies log messages by a facility and a priority (using the notation facility.priority).

The facilities defined by syslog are auth, authpriv, cron, daemon, kern, lpr, mail, mark, news, syslog, user, uucp and local0 through local7.

Throughout the Shorewall documentation, I will use the term level rather than priority since level is the term used by NetFilter. The syslog documentation uses the term priority.

Syslog Levels

Syslog levels are a method of describing to syslog (8) the importance of a message and a number of Shorewall parameters have a syslog level as their value.

Valid levels are:

       7       debug
       6       info
       5       notice
       4       warning
       3       err
       2       crit
       1       alert
       0       emerg

For most Shorewall logging, a level of 6 (info) is appropriate. Shorewall log messages are generated by NetFilter and are logged using the kern facility and the level that you specify. If you are unsure of the level to choose, 6 (info) is a safe bet. You may specify levels by name or by number.

Syslogd writes log messages to files (typically in /var/log/*) based on their facility and level. The mapping of these facility/level pairs to log files is done in /etc/syslog.conf (5). If you make changes to this file, you must restart syslogd before the changes can take effect.

Configuring a Separate Log for Shorewall Messages

There are a couple of limitations to syslogd-based logging:
  1. If you give, for example, kern.info it's own log destination then that destination will also receive all kernel messages of levels 5 (notice) through 0 (emerg).
  2. All kernel.info messages will go to that destination and not just those from NetFilter.
Beginning with Shorewall version 1.3.12, if your kernel has ULOG target support (and most vendor-supplied kernels do), you may also specify a log level of ULOG (must be all caps). When ULOG is used, Shorewall will direct netfilter to log the related messages via the ULOG target which will send them to a process called 'ulogd'. The ulogd program is available from http://www.gnumonks.org/projects/ulogd and can be configured to log all Shorewall message to their own log file.

Download the ulod tar file and:
  1. cd /usr/local/src (or wherever you do your builds)
  2. tar -zxf source-tarball-that-you-downloaded
  3. cd ulogd-version
  4. ./configure
  5. make
  6. make install
If you are like me and don't have a development environment on your firewall, you can do the first five steps on another system then either NFS mount your /usr/local/src directory or tar up the /usr/local/src/ulogd-version directory and move it to your firewall system.

Now on the firewall system, edit /usr/local/etc/ulogd.conf and set:
  1. syslogfile <file that you wish to log to>
  2. syslogsync 1
I also copied the file /usr/local/src/ulogd-version/ulogd.init to /etc/init.d/ulogd. I had to edit the line that read "daemon /usr/local/sbin/ulogd" to read daemon /usr/local/sbin/ulogd -d". On a RedHat system, a simple "chkconfig --level 3 ulogd on" starts ulogd during boot up. Your init system may need something else done to activate the script.

Finally edit /etc/shorewall/shorewall.conf and set LOGFILE=<file that you wish to log to>. This tells the /sbin/shorewall program where to look for the log when processing its "show log", "logwatch" and "monitor" commands.

Shorewall Configurations

Shorewall allows you to have configuration directories other than /etc/shorewall. The shorewall start and restart commands allow you to specify an alternate configuration directory and Shorewall will use the files in the alternate directory rather than the corresponding files in /etc/shorewall. The alternate directory need not contain a complete configuration; those files not in the alternate directory will be read from /etc/shorewall.

This facility permits you to easily create a test or temporary configuration by:

  1. copying the files that need modification from /etc/shorewall to a separate directory;
  2. modify those files in the separate directory; and
  3. specifying the separate directory in a shorewall start or shorewall restart command (e.g., shorewall -c /etc/testconfig restart ).

Updated 12/20/2002 - Tom Eastep

Copyright © 2001, 2002 Thomas M. Eastep.