From 0bfeb860a9e134f79fd14418e725475de8980046 Mon Sep 17 00:00:00 2001
From: teastep
Date: Sun, 1 May 2005 17:02:37 +0000
Subject: [PATCH] Web site udates
git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@2067 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
---
Shorewall-Website/News.htm | 766 ++++++++++++++-
Shorewall-Website/Shorewall_index_frame.htm | 5 +-
Shorewall-Website/Shorewall_sfindex_frame.htm | 7 +-
Shorewall-Website/download.htm | 7 +-
Shorewall-Website/index.htm | 6 +-
Shorewall-Website/shorewall_index.htm | 914 +++---------------
Shorewall-Website/useful_links.html | 4 +-
7 files changed, 910 insertions(+), 799 deletions(-)
diff --git a/Shorewall-Website/News.htm b/Shorewall-Website/News.htm
index ca8ceef97..2983efc12 100644
--- a/Shorewall-Website/News.htm
+++ b/Shorewall-Website/News.htm
@@ -18,11 +18,773 @@ Texts. A copy of the license is included in the section entitled “GNU Free
Documentation License”.
-
2005-02-01
+
2005-04-14
-01/17/2005 -
+02/15/2005
+Shorewall 2.2.1
+
+This release rolls up the fixes for bugs found in the first 2-3
+weeks of deployment of Shorewall 2.2.
+
+
+
The /etc/shorewall/policy file contained a misleading comment and
+both that file and the /etc/shorewall/zones file lacked examples.
+
Shorewall previously used root's default umask which could cause
+files in /var/lib/shorewall to be world-readable. Shorewall now uses
+umask 0177.
+
In log messages produced by logging a built-in action, the packet
+disposition was displayed incorrectly.
+
+ Example:
+
+
+rejNotSyn:ULOG
+all
+all
+tcp
+
+ produces the log message:
+
+ Feb
+12 23:57:08 server Shorewall:rejNotSyn:ULOG: ...
+
+ rather than
+
+ Feb
+12 23:57:08 server Shorewall:rejNotSyn:REJECT: ...
+
+
+
The comments regarding built-in actions in
+/usr/share/shorewall/actions.std have been corrected.
+
The /etc/shorewall/policy file in the LRP package was missing the
+'all->all' policy.
+
+
+02/05/2005
+End of Support for Shorewall 1.4
+
+Effective today, support for Shorewall 1.4 has been
+discontinued. See the link at the top of this article for upgrade
+information.
+
+02/01/2005
+Shorewall 2.0.16
+
+This release back-ports the DROPINVALID shorewall.conf option from
+2.2.0.
+
+
Recent 2.6 kernels include code that evaluates TCP packets based
+on TCP Window analysis. This can cause packets that were previously
+classified as NEW or ESTABLISHED to be classified as INVALID.
+
+The new kernel code can be disabled by including this command in your
+/etc/shorewall/init file:
+
+echo 1 > /proc/sys/net/ipv4/netfilter/ip_conntrack_tcp_be_liberal
+
+Additional kernel logging about INVALID TCP packets may be obtained by
+adding this command to /etc/shorewall/init:
+
+echo 1 > /proc/sys/net/ipv4/netfilter/ip_conntrack_log_invalid
+
+Traditionally, Shorewall has dropped INVALID TCP packets early. The new
+DROPINVALID option allows INVALID packets to be passed through the
+normal rules chains by setting DROPINVALID=No.
+
+If not specified or if specified as empty (e.g., DROPINVALID="") then
+DROPINVALID=Yes is assumed.
+
+
02/01/2005
+Shorewall 2.2.0
+
+New Features:
+
+
+
ICMP packets that are in the INVALID state are now dropped by the
+Reject and Drop default actions. They do so using the new 'dropInvalid'
+builtin action. An 'allowInvalid' builtin action is also provided which
+accepts packets in that state.
+
The /etc/shorewall/masq file INTERFACE column now allows
+additional options.
+
+Normally MASQUERADE/SNAT rules are evaluated after one-to-one NAT rules
+defined in the /etc/shorewall/nat file. If you preceed the interface
+name with a plus sign ("+") then the rule will be evaluated before
+one-to-one NAT.
+
+Examples:
+
++eth0
++eth1:192.0.2.32/27
+
+Also, the effect of ADD_SNAT_ALIASES=Yes can be negated for an entry by
+following the interface name by ":" but no digit.
+
+Examples:
+
+eth0:
+eth1::192.0.2.32/27
++eth3:
+
+
+
Similar to 2), the /etc/shorewall/nat file INTERFACE column now
+allows you to override the setting of ADD_IP_ALIASES=Yes by following
+the interface name with ":" but no digit.
+
All configuration files in the Shorewall distribution with the
+exception of shorewall.conf are now empty. In particular, the
+/etc/shorewall/zones, /etc/shorewall/policy and /etc/shorewall/tos
+files now have no active entries. Hopefully this will stop the
+questions on the support and development lists regarding why the
+default entries are the way they are.
+
Previously, including a log level (and optionally a log tag) on a
+rule that specified a user-defined (or Shorewall-defined) action would
+log all traffic passed to the action. Beginning with this release,
+specifying a log level in a rule that specifies a user- or
+Shorewall-defined action will cause each rule in the action to be
+logged with the specified level (and tag).
+
+The extent to which logging of action rules occurs is goverend by the
+following:
+
+
When you invoke an action and specify a log level, only those
+rules in the action that have no log level will be changed to log at
+the level specified at the action invocation.
+
+Example:
+
+/etc/shorewall/action.foo:
+
+ACCEPT - -
+tcp 22
+bar:info
+
+/etc/shorewall/rules:
+
+foo:debug fw net
+
+Logging in the invoked 'foo' action will be:
+
+ACCEPT:debug - -
+tcp 22
+bar:info
+
+
+
If you follow the log level with "!" then logging will be at
+that level for all rules recursively invoked by the action
+
+Example: /etc/shorewall/action.foo:
+
+ Update: I've been
+informed by Mandrake Development that this problem has been corrected
+in Mandrake 10.0 Final (the problem still exists in the 10.0
+Community release).
+ACCEPT - -
+tcp 22
+bar:info
+
+/etc/shorewall/rules:
+
+foo:debug! fw net
+
+Logging in the invoke 'foo' action will be:
+
+ACCEPT:debug - -
+tcp 22
+bar:debug!
+
+
+
+
+
This change has an effect on extension
+scripts used with user-defined actions. If you define an action 'acton'
+and you have an /etc/shorewall/acton script then when that script is
+invoked, the following three variables will be set for use by the
+script:
+
+
$CHAIN = the name of the chain where
+your rules are to be placed. When logging is used on an action
+invocation, Shorewall creates a chain with a slightly different name
+from the action itself.
+$LEVEL = Log level. If empty, no logging was specified.
+$TAG = Log Tag.
+
+
+Example:
+
+/etc/shorewall/rules:
+
+acton:info:test
+
+Your /etc/shorewall/acton file will be run with:
+
+
$CHAIN="%acton1
+$LEVEL="info"
+$TAG="test"
+
+
+
+
+
The /etc/shorewall/startup_disabled file is no longer created
+when
+Shorewall is first installed. Rather, the variable STARTUP_ENABLED is
+set to 'No' in /etc/shorewall/shorewall.conf. In order to get Shorewall
+to start, that variable's value must be set to 'Yes'. This change
+accomplishes two things:
+
+
It prevents Shorewall from being started prematurely by the
+user's initialization scripts.
+
It causes /etc/shorewall/shorewall.conf to be modified so that
+it won't be replaced by upgrades using RPM.
+
+
+
+
Support has been added for the 2.6 Kernel IPSEC implementation.
+To use this support, you must have installed the IPSEC policy match
+patch and the four IPSEC/Netfilter patches from Patch-0-Matic-ng. The
+policy match patch affects both your kernel and iptables. There are two
+ways to specify that IPSEC is to be used when communicating with a set
+of hosts; both methods involve the new /etc/shorewall/ipsec file:
+
+
If encrypted communication is used with all hosts in a zone,
+then you can designate the zone as an "ipsec" zone by placing 'Yes" in
+the IPSEC ONLY column in /etc/shorewall/ipsec:
+
+ #ZONE
+ IPSEC OPTIONS ...
+ #
+ ONLY
+ vpn
+ Yes
+
+The hosts in the zone (if any) must be specified in
+/etc/shorewall/hosts but you do not need to specify the 'ipsec' option
+on the entries in that file (see below). Dynamic zones involving IPSEC
+must use that technique.
+
+Example:Under 2.4 Kernel FreeS/Wan:
+
+/etc/shorewall/zones:
+
+ net
+Net The big bad Internet
+ vpn
+VPN Remote Network
+
+/etc/shorewall/interfaces:
+
+ net
+eth0 ...
+ vpn
+ipsec0 ...
+
+Under 2.6 Kernel with this new support:
+
+/etc/shorewall/zones:
+
+ net
+Net The big bad Internet
+ vpn
+VPN Remote Network
+
+/etc/shorewall/interfaces:
+
+ net
+eth0 ...
+
+/etc/shorewall/hosts:
+
+ vpn
+eth0:0.0.0.0/0
+
+/etc/shorewall/ipsec
+
+ vpn Yes
+
+
+
If only part of the hosts in a zone require encrypted
+communication, you may use of the new 'ipsec' option in
+/etc/shorewall/hosts to designate those hosts.
+
+Example:
+
+Under 2.4 Kernel FreeS/Wan:
+
+/etc/shorewall/zones:
+
net Net The big bad Internet loc Local Extended local zone
+/etc/shorewall/interfaces:
+
+ net
+eth0 ...
+ loc
+eth1 ...
+ loc
+ipsec0 ...
+
+Under 2.6 Kernel with this new support:
+
+/etc/shorewall/zones:
+
+ net
+ Net The big bad Internet
+ vpn
+ VPN Remote Network
+
+/etc/shorewall/interfaces:
+
+ net
+eth0 ...
+ loc
+eth1 ...
+
+/etc/shorewall/hosts:
+
+ vpn
+eth0:0.0.0.0/0 ipsec,...
+
+
+
Regardless of which technique you
+choose, you can specify additional SA options for the zone in the
+/etc/shorewall/ipsec entry.
+
+The OPTIONS, IN OPTIONS and OUT OPTIONS columns specify the
+input-output, input and output characteristics of the security
+associations to be used to decrypt (input) or encrypt (output) traffic
+to/from the zone.
+
+The available options are:
+
+
+
+
reqid[!]=<number> where <number> is specified using
+setkey(8) using the 'unique:<number>' option for the SPD level.
+
spi[!]=<number> where <number> is the SPI of the
+SA. Since different SAs are used to encrypt and decrypt traffic, this
+option should only be listed in the IN OPTIONS and OUT OPTIONS columns.
+
proto[!]=ah|esp|ipcomp
+
mss=<number> (sets the MSS value in TCP SYN packets and
+is not related to policy matching)
+
mode[!]=transport|tunnel
+
tunnel-src[!]=<address>[/<mask>] (only available
+with mode=tunnel)
+
tunnel-dst[!]=<address>[/<mask>] (only available
+with mode=tunnel). Because tunnel source and destination are dependent
+on the direction of the traffic, these options should only appear in
+the IN OPTIONS and OUT OPTIONS columns.
+
strict (if specified, packets must match all policies;
+policies are delimited by 'next').
+
next (only available with strict)
+
+
+
Examples:
+
+#ZONE
+IPSEC OPTIONS
+
+IN
+ OUT
+#
+ONLY
+
+OPTIONS OPTIONS
+vpn
+Yes mode=tunnel,proto=esp
+spi=1000 spi=1001
+loc
+No reqid=44,mode=transport
+
+The /etc/shorewall/masq file has a new IPSEC column added. If you
+specify Yes or yes in that column then the unencrypted packets will
+have their source address changed. Otherwise, the unencrypted packets
+will not have their source addresses changed. This column may also
+contain a comma-separated list of the options specified above in which
+case only those packets that will be encrypted by an SA matching the
+given options will have their source address changed.
+
+
+
To improve interoperability, tunnels of type 'ipsec' no longer
+enforce the use of source port 500 for ISAKMP and OpenVPN tunnels no
+longer enforce use of the specified port as both the source and
+destination ports.
+
A new 'allowBcast' builtin action has been added -- it silently
+allows broadcasts and multicasts.
+
The -c option in /sbin/shorewall commands is now deprecated. The
+commands where -c was previously allowed now permit you to specify a
+configuration directory after the command:
+
+ shorewall check [
+<configuration-directory> ]
+ shorewall restart [
+<configuration-directory> ]
+ shorewall start [
+<configuration-directory> ]
+
+
+
Normally, when SNAT or MASQUERADE is applied to a tcp or udp
+connection, Netfilter attempts to retain the source port number. If it
+has to change to port number to avoid <source
+address>,<source port> conflicts, it tries to do so within
+port ranges ( < 512, 512-1023, and > 1023). You may now specify
+an explicit range of source ports to be used by following the address
+or address range (if any) in the ADDRESS column with ":" and a port
+range in the format <low-port>-<high-port>. You must
+specify either "tcp" or "udp" in the PROTO column.
+
+Examples 1 -- MASQUERADE with tcp source ports 4000-5000:
+
+ #INTERFACE
+SUBNET
+ADDRESS PROTO
+
+eth0 192.168.1.0/24
+:4000-5000 tcp
+
+Example 2 -- SNAT with udp source ports 7000-8000:
+
+ #INTERFACE
+SUBNET
+ADDRESS
+
+PROTO
+
+eth0
+10.0.0.0/8
+192.0.2.44:7000-8000 udp
+
+
+
You may now account by user/group ID for outbound traffic from
+the firewall itself with entries in /etc/shorewall/accounting. Such
+accounting rules must be placed in the OUTPUT chain. See the comments
+at the top of /etc/shorewall/accounting for details.
+
Shorewall now verifies that your kernel and iptables have physdev
+match support if BRIDGING=Yes in shorewall.conf.
+
Beginning with this release, if your kernel and iptables have
+iprange match support (see the output from "shorewall check"), then
+with the exception of the /etc/shorewall/netmap file, anywhere that a
+network address may appear an IP address range of the form <low
+address>-<high address> may also appear.
+
Support has been added for the iptables CLASSIFY target. That
+target allows you to classify packets for traffic shaping directly
+rather than indirectly through fwmark. Simply enter the
+<major>:<minor> classification in the first column of
+/etc/shorewall/tcrules:
+
+Example:
+
+ #MARK/
+SOURCE
+DEST PROTO PORT(S)
+ #CLASSIFY
+ 1:30
+ -
+ eth0 tcp
+ 25
+
+Note that when using this form of rule, it is acceptable to include the
+name of an interface in the DEST column.
+
+Marking using the CLASSIFY target always occurs in the POSTROUTING
+chain of the mangle table and is not affected by the setting of
+MARK_IN_FORWARD_CHAIN in shorewall.conf.
+
During "shorewall start", IP addresses to be added as a
+consequence of ADD_IP_ALIASES=Yes and ADD_SNAT_ALIASES=Yes are quietly
+deleted when /etc/shorewall/nat and /etc/shorewall/masq are processed
+then they are re-added later. This is done to help ensure that the
+addresses can be added with the specified labels but can have the
+undesirable side effect of causing routes to be quietly deleted. A new
+RETAIN_ALIASES option has been added to shorewall.conf; when this
+option is set to Yes, existing addresses will not be deleted.
+Regardless of the setting of RETAIN_ALIASES, addresses added during
+"shorewall start" are still deleted at a subsequent "shorewall stop" or
+"shorewall restart".
+
Users with a large black list (from /etc/shorewall/blacklist) may
+want to set the new DELAYBLACKLISTLOAD option in shorewall.conf. When
+DELAYBLACKLISTLOAD=Yes, Shorewall will enable new connections before
+loading the blacklist rules. While this may allow connections from
+blacklisted hosts to slip by during construction of the blacklist, it
+can substantially reduce the time that all new connections are disabled
+during "shorewall [re]start".
+
Using the default LOGFORMAT, chain names longer than 11
+characters (such as in user-defined actions) may result in log prefix
+truncation. A new shorewall.conf action LOGTAGONLY has been added
+to deal with this problem. When LOGTAGONLY=Yes, logging rules that
+specify a log tag will substitute the tag for the chain name in the log
+prefix.
+
+Example -- file /etc/shorewall/action.thisisaverylogactionname:
+
+ Rule:
+
+ DROP:info:ftp
+0.0.0.0/0 0.0.0.0/0
+tcp 21
+
+ Log prefix with LOGTAGONLY=No:
+
+ Shorewall:thisisaverylongacti
+
+ Log prefix with LOGTAGONLY=Yes:
+
+ Shorewall:ftp:DROP
+
+
+
Shorewall now resets the 'accept_source_route' flag for all
+interfaces. If you wish to accept source routing on an interface, you
+must specify the new 'sourceroute' interface option in
+/etc/shorewall/interfaces.
+
The default Drop and Reject actions now invoke the new standard
+action 'AllowICMPs'. This new action accepts critical ICMP types:
+
+ Type 3 code 4 (fragmentation needed)
+ Type 11 (TTL
+exceeded)
+
+
+
Explicit control over the kernel's Martian logging is now
+provided using the new 'logmartians' interface option. If you include
+'logmartians' in the interface option list then logging of Martian
+packets on will be enabled on the specified interface. If you wish to
+globally enable martian logging, you can set LOG_MARTIANS=Yes in
+shorewall.conf.
+
You may now cause Shorewall to use the '--set-mss' option of the
+TCPMSS target. In other words, you can cause Shorewall to set the MSS
+field of SYN packets passing through the firewall to the value you
+specify. This feature extends the existing CLAMPMSS option in
+/etc/shorewall/shorewall.conf by allowing that option to have a numeric
+value as well as the values "Yes" and "No".
+
+Example:
+
+ CLAMPMSS=1400
+
+
+
Shorewall now includes support for the ipp2p match facility. This
+is a departure from my usual policy in that the ipp2p match facility is
+included in Patch-O-Matic-NG and is unlikely to ever be included in the
+kernel.org source tree. Questions about how to install the patch or how
+to build your kernel and/or iptables should not be posted on the
+Shorewall mailing lists.
+
+In the following files, the "PROTO" or "PROTOCOL" column may contain
+"ipp2p":
+
+ /etc/shorewall/rules
+ /etc/shorewall/tcrules
+ /etc/shorewall/accounting
+
+When the PROTO or PROTOCOL column contains "ipp2p" then the DEST
+PORT(S) or PORT(S) column may contain a recognized ipp2p option; for a
+list of the options and their meaning, at a root prompt:
+
+ iptables -m ipp2p --help
+
+You must not include the leading "--" on the option; Shorewall will
+supply those characters for you. If you do not include an option then
+"ipp2p" is assumed (Shorewall will generate "-m ipp2p --ipp2p").
+
Shorewall now has support for the CONNMARK target from iptables.
+See the /etc/shorewall/tcrules file for details.
+
A new debugging option LOGALLNEW has been added to
+shorewall.conf. When set to a log level, this option causes Shorewall
+to generaate a logging rule as the first rule in each builtin chain.
+
+ - The table name is used as the chain name in the
+log prefix.
+ - The chain name is used as the target in the log
+prefix.
+
+Example: Using the default LOGFORMAT, the log prefix for logging from
+the nat table's PREROUTING chain is:
+
+ Shorewall:nat:PREROUTING
+
+IMPORTANT: There is no rate limiting on these logging rules so use
+LOGALLNEW at your own risk; it may cause high CPU and disk utilization
+and you may not be able to control your firewall after you enable this
+option.
+
+DANGER: DO NOT USE THIS OPTION IF THE RESULTING LOG MESSAGES WILL BE
+SENT TO ANOTHER SYSTEM.
+
+
+
The SUBNET column in /etc/shorewall/rfc1918 has been renamed
+SUBNETS and it is now possible to specify a list of addresses in that
+column.
+
The AllowNNTP action now also allows NNTP over SSL/TLS (NNTPS).
+
For consistency, the CLIENT PORT(S) column in the tcrules file
+has been renamed SOURCE PORT(S).
+
The contents of /proc/sys/net/ip4/icmp_echo_ignore_all is now
+shown in the output of "shorewall status".
+
A new IPTABLES option has been added to shorewall.conf. IPTABLES
+can be used to designate the iptables executable to be used by
+Shorewall. If not specified, the iptables executable determined by the
+PATH setting is used.
+
You can now use the "shorewall show zones" command to display the
+current contents of the zones. This is particularly useful if you use
+dynamic zones (DYNAMIC_ZONES=Yes in shorewall.conf).
+
+ Example:
+
+ ursa:/etc/shorewall
+# shorewall show zones
+
+Shorewall-2.2.0-Beta7 Zones at ursa - Sat Nov 27 11:18:25 PST 2004
+
+ loc
+
+ eth0:192.168.1.0/24
+
+ eth1:1.2.3.4
+
+net
+
+ eth0:0.0.0.0/0
+ WiFi
+
+ eth1:0.0.0.0/0
+ sec
+
+ eth1:0.0.0.0/0
+
+
+ursa:/etc/shorewall #
+
+
+
Variable expansion may now be used with the INCLUDE directive.
+
+ Example:
+
+ /etc/shorewall/params
+
+ FILE=/etc/foo/bar
+
+ Any other config file:
+
+ INCLUDE $FILE
+
+
+
The output of "shorewall status" now includes the results of "ip
+-stat link ls". This helps diagnose performance problems caused by link
+errors.
+
Previously, when rate-limiting was specified in
+/etc/shorewall/policy (LIMIT:BURST column), any traffic which exceeded
+the specified rate was silently dropped. Now, if a log level is given
+in the entry (LEVEL column) then drops are logged at that level at a
+rate of 5/min with a burst of 5.
+
Recent 2.6 kernels include code that evaluates TCP packets based
+on TCP Window analysis. This can cause packets that were previously
+classified as NEW or ESTABLISHED to be classified as INVALID.
+
+The new kernel code can be disabled by including this command in your
+/etc/shorewall/init file:
+
+ echo 1 >
+/proc/sys/net/ipv4/netfilter/ip_conntrack_tcp_be_liberal
+
+Additional kernel logging about INVALID TCP packets may be obtained by
+adding this command to /etc/shorewall/init:
+
+ echo 1 >
+/proc/sys/net/ipv4/netfilter/ip_conntrack_log_invalid
+
+Traditionally, Shorewall has dropped INVALID TCP packets early. The new
+DROPINVALID option allows INVALID packets to be passed through the
+normal rules chains by setting DROPINVALID=No.
+
+If not specified or if specified as empty (e.g., DROPINVALID="") then
+DROPINVALID=Yes is assumed.
+
+
+
The "shorewall add" and "shorewall delete" commands now accept a
+list of hosts to add or delete.
+
+Examples:
+
+ shorewall add
+eth1:1.2.3.4 eth1:2.3.4.5 z12
+ shorewall delete
+eth1:1.2.3.4 eth1:2.3.4.5 z12
+
+ The above commands may also be written:
+
+ shorewall add
+eth1:1.2.3.4,2.3.4.5 z12
+ shorewall delete
+eth1:1.2.3.4,2.3.4.5 z12
+
+
+
TCP OpenVPN tunnels are now supported using the 'openvpn' tunnel
+type. OpenVPN entries in /etc/shorewall/tunnels have this format:
+
+ openvpn[:{tcp|udp}][:<port>]
+<zone> <gateway>
+
+Examples:
+
+ openvpn:tcp
+ net
+1.2.3.4 # TCP tunnel on port 1194
+
+openvpn:3344 net
+1.2.3.4 # UDP on port 3344
+
+openvpn:tcp:4455 net
+1.2.3.4 # TCP on port 4455
+
+
+
A new 'ipsecvpn' script is included in the tarball and in the
+RPM. The RPM installs the file in the Documentation directory
+(/usr/share/doc/packages/shorewall-2.2.0-0RC1).
+
+This script is intended for use on Roadwarrior laptops for establishing
+an IPSEC SA to/from remote networks. The script has some limitations:
+
+
+
+
Only one instance of the script may be used at a time.
+
Only the first SPD accessed will be instantiated at the remote
+gateway. So while the script creates SPDs to/from the remote gateway
+and each network listed in the NETWORKS setting at the front of the
+script, only one of these may be used at a time.
+
+
+
+
The output of "shorewall status" now lists the loaded netfilter
+kernel modules.
+
The range of UDP ports opened by the AllowTrcrt action has been
+increased to 33434:33524.
+
The IANA has recently registered port 1194 for use by OpenVPN. In
+previous versions of Shorewall (and OpenVPN), the default port was 5000
+but has been changed to 1194 to conform to the new OpenVPN default.
+
+
01/17/2005 -
Shorewall 2.2.0 RC5
Problems Corrected:
diff --git a/Shorewall-Website/Shorewall_index_frame.htm b/Shorewall-Website/Shorewall_index_frame.htm
index 819fb8988..22f15783d 100644
--- a/Shorewall-Website/Shorewall_index_frame.htm
+++ b/Shorewall-Website/Shorewall_index_frame.htm
@@ -38,10 +38,7 @@ Repository Errata Features
-Mailing
-Lists
+ color="#ffffff"> Mirrors News Archive Errata Features
-Mailing
-Lists
+ color="#ffffff"> Mirrors News Archive
color="#ffffff"> What it
Cannot Do
-
+
Shorewall is not the easiest to use of
+the available iptables configuration tools but I believe that it is the
+most flexible and powerful. So if you are looking for a simple
+point-and-click set-and-forget Linux firewall solution that requires a
+minimum of networking knowledge, I would encourage you to check out the
+following alternatives:
On the other hand, if you are looking
+for a Linux firewall solution that can handle complex and fast changing
+network environments then Shorewall is a logical choice.
+
Getting Started with Shorewall
New to Shorewall? Start by selecting
the QuickStart Guide
@@ -129,7 +152,7 @@ step instructions.
Looking for Information?
The Documentation
Index is a good place to start as is the Site Search in the
-frame above.
+frame above. network
Running Shorewall on Mandrake® with a
two-interface setup?
If so, the documentation on this site
@@ -166,6 +189,96 @@ of the license is included in the section entitled "GNU Free
Documentation License".
News
+04/25/2005 Tom
+will Speak at LinuxFest NW 2005 -- Bellingham Technical College,
+Bellingham Washington
+
+Tom's presentation is entitled "Shorewall and Native IPSEC" and is
+available for download here (PDF Format).
+The presentation will be given Saturday April 30 at 10:00 AM in Haskell
+Hall, room 111.
+
+04/07/2005
+Shorewall 2.2.3
+
+Problems Corrected:
+
+
If a zone is defined in /etc/shorewall/hosts using
+<interface>:!<network> in the HOSTS column then startup
+errors occur on "shorewall [re]start".
+
Previously, if "shorewall status" was run on a system whose
+kernel lacked advanced routing support
+(CONFIG_IP_ADVANCED_ROUTER), then no routing information was
+displayed.
+
+New Features:
+
+
A new extension script "continue" has been added. This script is
+invoked after Shorewall has set the built-in filter chains policy to
+DROP, deleted any existing Netfilter rules and user chains and has
+enabled existing connections. It is useful for enabling certain
+communication while Shorewall is being [re]started. Be sure to delete
+any rules that you add here in your /etc/shorewall/start file.
+
There has been ongoing confusion about how the
+/etc/shorewall/routestopped file works. People understand how it works
+with the 'shorewall stop' command but when they read that 'shorewall
+restart' is logically equivalent to 'shorewall stop' followed by
+'shorewall start' then they erroneously conclude that
+/etc/shorewall/routestopped can be used to enable new connections
+during 'shorewall restart'. Up to now, it cannot -- that file is not
+processed during either 'shorewall start' or 'shorewall restart'.
+
+Beginning with Shorewall version 2.2.3, /etc/shorewall/routestopped
+will be processed TWICE during 'shorewall start' and during 'shorewall
+restart'. It will be processed early in the command execution to add
+rules allowing new connections while the command is running and it will
+be processed again when the command is complete to remove the rules
+added earlier.
+
+The result of this change will be that during most of [re]start, new
+connections will be allowed in accordance with the contents of
+/etc/shorewall/routestopped.
+
The performance of configurations with a large numbers of entries
+in /etc/shorewall/maclist can be improved by setting the new
+MACLIST_TTL variable in /etc/shorewall/shorewall.conf.
+
+If your iptables and kernel support the "Recent Match" (see the output
+of "shorewall check" near the top), you can cache the results of a
+'maclist' file lookup and thus reduce the overhead associated with MAC
+Verification.
+
+When a new connection arrives from a 'maclist' interface, the packet
+passes through then list of entries for that interface in
+/etc/shorewall/maclist. If there is a match then the source IP address
+is added to the 'Recent' set for that interface. Subsequent connection
+attempts from that IP address occuring within $MACLIST_TTL seconds will
+be accepted without having to scan all of the entries. After
+$MACLIST_TTL from the first accepted connection request from an IP
+address, the next connection request from that IP address will be
+checked against the entire list.
+
+If MACLIST_TTL is not specified or is specified as empty (e.g,
+MACLIST_TTL="" or is specified as zero then 'maclist' lookups will not
+be cached.
+
You can now specify QUEUE as a policy and you can designate a
+common action for QUEUE policies in /etc/shorewall/actions. This is
+useful for sending packets to something like Snort Inline.
+
Invoking the 'rejNotSyn' action results in an error at startup.
+
The UDP and TCP port numbers in
+/usr/share/shorewall/action.AllowPCA were reversed.
+
If a zone is defined in /etc/shorewall/hosts using <interface>:!<network> in the HOSTS column
+then startup errors occur on "shorewall [re]start".
+
+03/12/2005
Shorewall 2.2.2
@@ -241,768 +354,7 @@ WARNING: RFC1918_STRICT=Yes requires that your kernel and iptables
support 'Connection Tracking' match.
-02/15/2005
-Shorewall 2.2.1
-
-This release rolls up the fixes for bugs found in the first 2-3
-weeks of deployment of Shorewall 2.2.
-
-
The /etc/shorewall/policy file contained a misleading comment and
-both that file and the /etc/shorewall/zones file lacked examples.
-
Shorewall previously used root's default umask which could cause
-files in /var/lib/shorewall to be world-readable. Shorewall now uses
-umask 0177.
-
In log messages produced by logging a built-in action, the packet
-disposition was displayed incorrectly.
-
- Example:
-
-
-rejNotSyn:ULOG
-all
-all
-tcp
-
- produces the log message:
-
- Feb
-12 23:57:08 server Shorewall:rejNotSyn:ULOG: ...
-
- rather than
-
- Feb
-12 23:57:08 server Shorewall:rejNotSyn:REJECT: ...
-
-
-
The comments regarding built-in actions in
-/usr/share/shorewall/actions.std have been corrected.
-
The /etc/shorewall/policy file in the LRP package was missing the
-'all->all' policy.
-
Recent 2.6 kernels include code that evaluates TCP packets based
-on TCP Window analysis. This can cause packets that were previously
-classified as NEW or ESTABLISHED to be classified as INVALID.
-
-The new kernel code can be disabled by including this command in your
-/etc/shorewall/init file:
-
-echo 1 > /proc/sys/net/ipv4/netfilter/ip_conntrack_tcp_be_liberal
-
-Additional kernel logging about INVALID TCP packets may be obtained by
-adding this command to /etc/shorewall/init:
-
-echo 1 > /proc/sys/net/ipv4/netfilter/ip_conntrack_log_invalid
-
-Traditionally, Shorewall has dropped INVALID TCP packets early. The new
-DROPINVALID option allows INVALID packets to be passed through the
-normal rules chains by setting DROPINVALID=No.
-
-If not specified or if specified as empty (e.g., DROPINVALID="") then
-DROPINVALID=Yes is assumed.
-
ICMP packets that are in the INVALID state are now dropped by the
-Reject and Drop default actions. They do so using the new 'dropInvalid'
-builtin action. An 'allowInvalid' builtin action is also provided which
-accepts packets in that state.
-
The /etc/shorewall/masq file INTERFACE column now allows
-additional options.
-
-Normally MASQUERADE/SNAT rules are evaluated after one-to-one NAT rules
-defined in the /etc/shorewall/nat file. If you preceed the interface
-name with a plus sign ("+") then the rule will be evaluated before
-one-to-one NAT.
-
-Examples:
-
-+eth0
-+eth1:192.0.2.32/27
-
-Also, the effect of ADD_SNAT_ALIASES=Yes can be negated for an entry by
-following the interface name by ":" but no digit.
-
-Examples:
-
-eth0:
-eth1::192.0.2.32/27
-+eth3:
-
-
-
Similar to 2), the /etc/shorewall/nat file INTERFACE column now
-allows you to override the setting of ADD_IP_ALIASES=Yes by following
-the interface name with ":" but no digit.
-
All configuration files in the Shorewall distribution with the
-exception of shorewall.conf are now empty. In particular, the
-/etc/shorewall/zones, /etc/shorewall/policy and /etc/shorewall/tos
-files now have no active entries. Hopefully this will stop the
-questions on the support and development lists regarding why the
-default entries are the way they are.
-
Previously, including a log level (and optionally a log tag) on a
-rule that specified a user-defined (or Shorewall-defined) action would
-log all traffic passed to the action. Beginning with this release,
-specifying a log level in a rule that specifies a user- or
-Shorewall-defined action will cause each rule in the action to be
-logged with the specified level (and tag).
-
-The extent to which logging of action rules occurs is goverend by the
-following:
-
-
When you invoke an action and specify a log level, only those
-rules in the action that have no log level will be changed to log at
-the level specified at the action invocation.
-
-Example:
-
-/etc/shorewall/action.foo:
-
-ACCEPT - -
-tcp 22
-bar:info
-
-/etc/shorewall/rules:
-
-foo:debug fw net
-
-Logging in the invoked 'foo' action will be:
-
-ACCEPT:debug - -
-tcp 22
-bar:info
-
-
-
If you follow the log level with "!" then logging will be at
-that level for all rules recursively invoked by the action
-
-Example: /etc/shorewall/action.foo:
-
- Update: I've been
-informed by Mandrake Development that this problem has been corrected
-in Mandrake 10.0 Final (the problem still exists in the 10.0
-Community release).
-ACCEPT - -
-tcp 22
-bar:info
-
-/etc/shorewall/rules:
-
-foo:debug! fw net
-
-Logging in the invoke 'foo' action will be:
-
-ACCEPT:debug - -
-tcp 22
-bar:debug!
-
-
-
-
-
This change has an effect on extension
-scripts used with user-defined actions. If you define an action 'acton'
-and you have an /etc/shorewall/acton script then when that script is
-invoked, the following three variables will be set for use by the
-script:
-
-
$CHAIN = the name of the chain where
-your rules are to be placed. When logging is used on an action
-invocation, Shorewall creates a chain with a slightly different name
-from the action itself.
-$LEVEL = Log level. If empty, no logging was specified.
-$TAG = Log Tag.
-
-
-Example:
-
-/etc/shorewall/rules:
-
-acton:info:test
-
-Your /etc/shorewall/acton file will be run with:
-
-
$CHAIN="%acton1
-$LEVEL="info"
-$TAG="test"
-
-
-
-
-
The /etc/shorewall/startup_disabled file is no longer created
-when
-Shorewall is first installed. Rather, the variable STARTUP_ENABLED is
-set to 'No' in /etc/shorewall/shorewall.conf. In order to get Shorewall
-to start, that variable's value must be set to 'Yes'. This change
-accomplishes two things:
-
-
It prevents Shorewall from being started prematurely by the
-user's initialization scripts.
-
It causes /etc/shorewall/shorewall.conf to be modified so that
-it won't be replaced by upgrades using RPM.
-
-
-
-
Support has been added for the 2.6 Kernel IPSEC implementation.
-To use this support, you must have installed the IPSEC policy match
-patch and the four IPSEC/Netfilter patches from Patch-0-Matic-ng. The
-policy match patch affects both your kernel and iptables. There are two
-ways to specify that IPSEC is to be used when communicating with a set
-of hosts; both methods involve the new /etc/shorewall/ipsec file:
-
-
If encrypted communication is used with all hosts in a zone,
-then you can designate the zone as an "ipsec" zone by placing 'Yes" in
-the IPSEC ONLY column in /etc/shorewall/ipsec:
-
- #ZONE
- IPSEC OPTIONS ...
- #
- ONLY
- vpn
- Yes
-
-The hosts in the zone (if any) must be specified in
-/etc/shorewall/hosts but you do not need to specify the 'ipsec' option
-on the entries in that file (see below). Dynamic zones involving IPSEC
-must use that technique.
-
-Example:Under 2.4 Kernel FreeS/Wan:
-
-/etc/shorewall/zones:
-
- net
-Net The big bad Internet
- vpn
-VPN Remote Network
-
-/etc/shorewall/interfaces:
-
- net
-eth0 ...
- vpn
-ipsec0 ...
-
-Under 2.6 Kernel with this new support:
-
-/etc/shorewall/zones:
-
- net
-Net The big bad Internet
- vpn
-VPN Remote Network
-
-/etc/shorewall/interfaces:
-
- net
-eth0 ...
-
-/etc/shorewall/hosts:
-
- vpn
-eth0:0.0.0.0/0
-
-/etc/shorewall/ipsec
-
- vpn Yes
-
-
-
If only part of the hosts in a zone require encrypted
-communication, you may use of the new 'ipsec' option in
-/etc/shorewall/hosts to designate those hosts.
-
-Example:
-
-Under 2.4 Kernel FreeS/Wan:
-
-/etc/shorewall/zones:
-
net Net The big bad Internet loc Local Extended local zone
-/etc/shorewall/interfaces:
-
- net
-eth0 ...
- loc
-eth1 ...
- loc
-ipsec0 ...
-
-Under 2.6 Kernel with this new support:
-
-/etc/shorewall/zones:
-
- net
- Net The big bad Internet
- vpn
- VPN Remote Network
-
-/etc/shorewall/interfaces:
-
- net
-eth0 ...
- loc
-eth1 ...
-
-/etc/shorewall/hosts:
-
- vpn
-eth0:0.0.0.0/0 ipsec,...
-
-
-
Regardless of which technique you
-choose, you can specify additional SA options for the zone in the
-/etc/shorewall/ipsec entry.
-
-The OPTIONS, IN OPTIONS and OUT OPTIONS columns specify the
-input-output, input and output characteristics of the security
-associations to be used to decrypt (input) or encrypt (output) traffic
-to/from the zone.
-
-The available options are:
-
-
-
-
reqid[!]=<number> where <number> is specified using
-setkey(8) using the 'unique:<number>' option for the SPD level.
-
spi[!]=<number> where <number> is the SPI of the
-SA. Since different SAs are used to encrypt and decrypt traffic, this
-option should only be listed in the IN OPTIONS and OUT OPTIONS columns.
-
proto[!]=ah|esp|ipcomp
-
mss=<number> (sets the MSS value in TCP SYN packets and
-is not related to policy matching)
-
mode[!]=transport|tunnel
-
tunnel-src[!]=<address>[/<mask>] (only available
-with mode=tunnel)
-
tunnel-dst[!]=<address>[/<mask>] (only available
-with mode=tunnel). Because tunnel source and destination are dependent
-on the direction of the traffic, these options should only appear in
-the IN OPTIONS and OUT OPTIONS columns.
-
strict (if specified, packets must match all policies;
-policies are delimited by 'next').
-
next (only available with strict)
-
-
-
Examples:
-
-#ZONE
-IPSEC OPTIONS
-
-IN
- OUT
-#
-ONLY
-
-OPTIONS OPTIONS
-vpn
-Yes mode=tunnel,proto=esp
-spi=1000 spi=1001
-loc
-No reqid=44,mode=transport
-
-The /etc/shorewall/masq file has a new IPSEC column added. If you
-specify Yes or yes in that column then the unencrypted packets will
-have their source address changed. Otherwise, the unencrypted packets
-will not have their source addresses changed. This column may also
-contain a comma-separated list of the options specified above in which
-case only those packets that will be encrypted by an SA matching the
-given options will have their source address changed.
-
-
-
To improve interoperability, tunnels of type 'ipsec' no longer
-enforce the use of source port 500 for ISAKMP and OpenVPN tunnels no
-longer enforce use of the specified port as both the source and
-destination ports.
-
A new 'allowBcast' builtin action has been added -- it silently
-allows broadcasts and multicasts.
-
The -c option in /sbin/shorewall commands is now deprecated. The
-commands where -c was previously allowed now permit you to specify a
-configuration directory after the command:
-
- shorewall check [
-<configuration-directory> ]
- shorewall restart [
-<configuration-directory> ]
- shorewall start [
-<configuration-directory> ]
-
-
-
Normally, when SNAT or MASQUERADE is applied to a tcp or udp
-connection, Netfilter attempts to retain the source port number. If it
-has to change to port number to avoid <source
-address>,<source port> conflicts, it tries to do so within
-port ranges ( < 512, 512-1023, and > 1023). You may now specify
-an explicit range of source ports to be used by following the address
-or address range (if any) in the ADDRESS column with ":" and a port
-range in the format <low-port>-<high-port>. You must
-specify either "tcp" or "udp" in the PROTO column.
-
-Examples 1 -- MASQUERADE with tcp source ports 4000-5000:
-
- #INTERFACE
-SUBNET
-ADDRESS PROTO
-
-eth0 192.168.1.0/24
-:4000-5000 tcp
-
-Example 2 -- SNAT with udp source ports 7000-8000:
-
- #INTERFACE
-SUBNET
-ADDRESS
-
-PROTO
-
-eth0
-10.0.0.0/8
-192.0.2.44:7000-8000 udp
-
-
-
You may now account by user/group ID for outbound traffic from
-the firewall itself with entries in /etc/shorewall/accounting. Such
-accounting rules must be placed in the OUTPUT chain. See the comments
-at the top of /etc/shorewall/accounting for details.
-
Shorewall now verifies that your kernel and iptables have physdev
-match support if BRIDGING=Yes in shorewall.conf.
-
Beginning with this release, if your kernel and iptables have
-iprange match support (see the output from "shorewall check"), then
-with the exception of the /etc/shorewall/netmap file, anywhere that a
-network address may appear an IP address range of the form <low
-address>-<high address> may also appear.
-
Support has been added for the iptables CLASSIFY target. That
-target allows you to classify packets for traffic shaping directly
-rather than indirectly through fwmark. Simply enter the
-<major>:<minor> classification in the first column of
-/etc/shorewall/tcrules:
-
-Example:
-
- #MARK/
-SOURCE
-DEST PROTO PORT(S)
- #CLASSIFY
- 1:30
- -
- eth0 tcp
- 25
-
-Note that when using this form of rule, it is acceptable to include the
-name of an interface in the DEST column.
-
-Marking using the CLASSIFY target always occurs in the POSTROUTING
-chain of the mangle table and is not affected by the setting of
-MARK_IN_FORWARD_CHAIN in shorewall.conf.
-
During "shorewall start", IP addresses to be added as a
-consequence of ADD_IP_ALIASES=Yes and ADD_SNAT_ALIASES=Yes are quietly
-deleted when /etc/shorewall/nat and /etc/shorewall/masq are processed
-then they are re-added later. This is done to help ensure that the
-addresses can be added with the specified labels but can have the
-undesirable side effect of causing routes to be quietly deleted. A new
-RETAIN_ALIASES option has been added to shorewall.conf; when this
-option is set to Yes, existing addresses will not be deleted.
-Regardless of the setting of RETAIN_ALIASES, addresses added during
-"shorewall start" are still deleted at a subsequent "shorewall stop" or
-"shorewall restart".
-
Users with a large black list (from /etc/shorewall/blacklist) may
-want to set the new DELAYBLACKLISTLOAD option in shorewall.conf. When
-DELAYBLACKLISTLOAD=Yes, Shorewall will enable new connections before
-loading the blacklist rules. While this may allow connections from
-blacklisted hosts to slip by during construction of the blacklist, it
-can substantially reduce the time that all new connections are disabled
-during "shorewall [re]start".
-
Using the default LOGFORMAT, chain names longer than 11
-characters (such as in user-defined actions) may result in log prefix
-truncation. A new shorewall.conf action LOGTAGONLY has been added
-to deal with this problem. When LOGTAGONLY=Yes, logging rules that
-specify a log tag will substitute the tag for the chain name in the log
-prefix.
-
-Example -- file /etc/shorewall/action.thisisaverylogactionname:
-
- Rule:
-
- DROP:info:ftp
-0.0.0.0/0 0.0.0.0/0
-tcp 21
-
- Log prefix with LOGTAGONLY=No:
-
- Shorewall:thisisaverylongacti
-
- Log prefix with LOGTAGONLY=Yes:
-
- Shorewall:ftp:DROP
-
-
-
Shorewall now resets the 'accept_source_route' flag for all
-interfaces. If you wish to accept source routing on an interface, you
-must specify the new 'sourceroute' interface option in
-/etc/shorewall/interfaces.
-
The default Drop and Reject actions now invoke the new standard
-action 'AllowICMPs'. This new action accepts critical ICMP types:
-
- Type 3 code 4 (fragmentation needed)
- Type 11 (TTL
-exceeded)
-
-
-
Explicit control over the kernel's Martian logging is now
-provided using the new 'logmartians' interface option. If you include
-'logmartians' in the interface option list then logging of Martian
-packets on will be enabled on the specified interface. If you wish to
-globally enable martian logging, you can set LOG_MARTIANS=Yes in
-shorewall.conf.
-
You may now cause Shorewall to use the '--set-mss' option of the
-TCPMSS target. In other words, you can cause Shorewall to set the MSS
-field of SYN packets passing through the firewall to the value you
-specify. This feature extends the existing CLAMPMSS option in
-/etc/shorewall/shorewall.conf by allowing that option to have a numeric
-value as well as the values "Yes" and "No".
-
-Example:
-
- CLAMPMSS=1400
-
-
-
Shorewall now includes support for the ipp2p match facility. This
-is a departure from my usual policy in that the ipp2p match facility is
-included in Patch-O-Matic-NG and is unlikely to ever be included in the
-kernel.org source tree. Questions about how to install the patch or how
-to build your kernel and/or iptables should not be posted on the
-Shorewall mailing lists.
-
-In the following files, the "PROTO" or "PROTOCOL" column may contain
-"ipp2p":
-
- /etc/shorewall/rules
- /etc/shorewall/tcrules
- /etc/shorewall/accounting
-
-When the PROTO or PROTOCOL column contains "ipp2p" then the DEST
-PORT(S) or PORT(S) column may contain a recognized ipp2p option; for a
-list of the options and their meaning, at a root prompt:
-
- iptables -m ipp2p --help
-
-You must not include the leading "--" on the option; Shorewall will
-supply those characters for you. If you do not include an option then
-"ipp2p" is assumed (Shorewall will generate "-m ipp2p --ipp2p").
-
Shorewall now has support for the CONNMARK target from iptables.
-See the /etc/shorewall/tcrules file for details.
-
A new debugging option LOGALLNEW has been added to
-shorewall.conf. When set to a log level, this option causes Shorewall
-to generaate a logging rule as the first rule in each builtin chain.
-
- - The table name is used as the chain name in the
-log prefix.
- - The chain name is used as the target in the log
-prefix.
-
-Example: Using the default LOGFORMAT, the log prefix for logging from
-the nat table's PREROUTING chain is:
-
- Shorewall:nat:PREROUTING
-
-IMPORTANT: There is no rate limiting on these logging rules so use
-LOGALLNEW at your own risk; it may cause high CPU and disk utilization
-and you may not be able to control your firewall after you enable this
-option.
-
-DANGER: DO NOT USE THIS OPTION IF THE RESULTING LOG MESSAGES WILL BE
-SENT TO ANOTHER SYSTEM.
-
-
-
The SUBNET column in /etc/shorewall/rfc1918 has been renamed
-SUBNETS and it is now possible to specify a list of addresses in that
-column.
-
The AllowNNTP action now also allows NNTP over SSL/TLS (NNTPS).
-
For consistency, the CLIENT PORT(S) column in the tcrules file
-has been renamed SOURCE PORT(S).
-
The contents of /proc/sys/net/ip4/icmp_echo_ignore_all is now
-shown in the output of "shorewall status".
-
A new IPTABLES option has been added to shorewall.conf. IPTABLES
-can be used to designate the iptables executable to be used by
-Shorewall. If not specified, the iptables executable determined by the
-PATH setting is used.
-
You can now use the "shorewall show zones" command to display the
-current contents of the zones. This is particularly useful if you use
-dynamic zones (DYNAMIC_ZONES=Yes in shorewall.conf).
-
- Example:
-
- ursa:/etc/shorewall
-# shorewall show zones
-
-Shorewall-2.2.0-Beta7 Zones at ursa - Sat Nov 27 11:18:25 PST 2004
-
- loc
-
- eth0:192.168.1.0/24
-
- eth1:1.2.3.4
-
-net
-
- eth0:0.0.0.0/0
- WiFi
-
- eth1:0.0.0.0/0
- sec
-
- eth1:0.0.0.0/0
-
-
-ursa:/etc/shorewall #
-
-
-
Variable expansion may now be used with the INCLUDE directive.
-
- Example:
-
- /etc/shorewall/params
-
- FILE=/etc/foo/bar
-
- Any other config file:
-
- INCLUDE $FILE
-
-
-
The output of "shorewall status" now includes the results of "ip
--stat link ls". This helps diagnose performance problems caused by link
-errors.
-
Previously, when rate-limiting was specified in
-/etc/shorewall/policy (LIMIT:BURST column), any traffic which exceeded
-the specified rate was silently dropped. Now, if a log level is given
-in the entry (LEVEL column) then drops are logged at that level at a
-rate of 5/min with a burst of 5.
-
Recent 2.6 kernels include code that evaluates TCP packets based
-on TCP Window analysis. This can cause packets that were previously
-classified as NEW or ESTABLISHED to be classified as INVALID.
-
-The new kernel code can be disabled by including this command in your
-/etc/shorewall/init file:
-
- echo 1 >
-/proc/sys/net/ipv4/netfilter/ip_conntrack_tcp_be_liberal
-
-Additional kernel logging about INVALID TCP packets may be obtained by
-adding this command to /etc/shorewall/init:
-
- echo 1 >
-/proc/sys/net/ipv4/netfilter/ip_conntrack_log_invalid
-
-Traditionally, Shorewall has dropped INVALID TCP packets early. The new
-DROPINVALID option allows INVALID packets to be passed through the
-normal rules chains by setting DROPINVALID=No.
-
-If not specified or if specified as empty (e.g., DROPINVALID="") then
-DROPINVALID=Yes is assumed.
-
-
-
The "shorewall add" and "shorewall delete" commands now accept a
-list of hosts to add or delete.
-
-Examples:
-
- shorewall add
-eth1:1.2.3.4 eth1:2.3.4.5 z12
- shorewall delete
-eth1:1.2.3.4 eth1:2.3.4.5 z12
-
- The above commands may also be written:
-
- shorewall add
-eth1:1.2.3.4,2.3.4.5 z12
- shorewall delete
-eth1:1.2.3.4,2.3.4.5 z12
-
-
-
TCP OpenVPN tunnels are now supported using the 'openvpn' tunnel
-type. OpenVPN entries in /etc/shorewall/tunnels have this format:
-
- openvpn[:{tcp|udp}][:<port>]
-<zone> <gateway>
-
-Examples:
-
- openvpn:tcp
- net
-1.2.3.4 # TCP tunnel on port 1194
-
-openvpn:3344 net
-1.2.3.4 # UDP on port 3344
-
-openvpn:tcp:4455 net
-1.2.3.4 # TCP on port 4455
-
-
-
A new 'ipsecvpn' script is included in the tarball and in the
-RPM. The RPM installs the file in the Documentation directory
-(/usr/share/doc/packages/shorewall-2.2.0-0RC1).
-
-This script is intended for use on Roadwarrior laptops for establishing
-an IPSEC SA to/from remote networks. The script has some limitations:
-
-
-
-
Only one instance of the script may be used at a time.
-
Only the first SPD accessed will be instantiated at the remote
-gateway. So while the script creates SPDs to/from the remote gateway
-and each network listed in the NETWORKS setting at the front of the
-script, only one of these may be used at a time.
-
-
-
-
The output of "shorewall status" now lists the loaded netfilter
-kernel modules.
-
The range of UDP ports opened by the AllowTrcrt action has been
-increased to 33434:33524.
-
The IANA has recently registered port 1194 for use by OpenVPN. In
-previous versions of Shorewall (and OpenVPN), the default port was 5000
-but has been changed to 1194 to conform to the new OpenVPN default.
-