mirror of
https://gitlab.com/shorewall/code.git
synced 2024-11-15 04:04:10 +01:00
f7ea7cdd41
git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@678 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
35 lines
1.2 KiB
Plaintext
Executable File
35 lines
1.2 KiB
Plaintext
Executable File
This is a minor release of Shorewall.
|
|
|
|
Problems Corrected since version 1.4.6:
|
|
|
|
1) Corrected problem in 1.4.6 where the MANGLE_ENABLED variable was
|
|
being tested before it was set.
|
|
|
|
2) Corrected handling of MAC addresses in the SOURCE column of the
|
|
tcrules file. Previously, these addresses resulted in an invalid
|
|
iptables command.
|
|
|
|
None.
|
|
|
|
Migration Issues:
|
|
|
|
1) Once you have installed this version of Shorewall, you must
|
|
restart Shorewall before you may use the 'drop', 'reject', 'allow'
|
|
or 'save' commands.
|
|
|
|
2) To maintain strict compatibility with previous versions, current
|
|
uses of "shorewall drop" and "shorewall reject" should be replaced
|
|
with "shorewall dropall" and "shorewall rejectall".
|
|
|
|
New Features:
|
|
|
|
1) Shorewall now creates a dynamic blacklisting chain for each interface
|
|
defined in /etc/shorewall/interfaces. The 'drop' and 'reject'
|
|
commands use the routing table to determine which of these chains is
|
|
to be used for blacklisting the specified IP address(es).
|
|
|
|
Two new commands ('dropall' and 'rejectall') have been introduced
|
|
that do what 'drop' and 'reject' used to do; namely, when an address
|
|
is blacklisted using these new commands, it will be blacklisted on
|
|
all of your firewall's interfaces.
|