forked from extern/shorewall_code
Fix for mis-configured interfaces
This commit is contained in:
parent
c85eacb863
commit
6eb202666c
@ -191,7 +191,7 @@ restore_dynamic_rules() {
|
|||||||
#
|
#
|
||||||
get_all_bcasts()
|
get_all_bcasts()
|
||||||
{
|
{
|
||||||
$IP -f inet addr show 2> /dev/null | grep 'inet.*brd' | sed 's/inet.*brd //; s/scope.*//;' | sort -u
|
$IP -f inet addr show 2> /dev/null | grep 'inet.*brd' | grep -v '/32 ' | sed 's/inet.*brd //; s/scope.*//;' | sort -u
|
||||||
}
|
}
|
||||||
|
|
||||||
#
|
#
|
||||||
|
@ -1,3 +1,9 @@
|
|||||||
|
Changes in Shorewall 4.4.0-Beta3
|
||||||
|
|
||||||
|
1) Add new macros.
|
||||||
|
|
||||||
|
2) Work around mis-configured interfaces.
|
||||||
|
|
||||||
Changes in Shorewall 4.4.0-Beta2
|
Changes in Shorewall 4.4.0-Beta2
|
||||||
|
|
||||||
1) The 'find_first_interface_address()' and
|
1) The 'find_first_interface_address()' and
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
Shorewall 4.4.0 Beta 2
|
Shorewall 4.4.0 Beta 3
|
||||||
|
|
||||||
----------------------------------------------------------------------------
|
----------------------------------------------------------------------------
|
||||||
R E L E A S E 4 . 4 H I G H L I G H T S
|
R E L E A S E 4 . 4 H I G H L I G H T S
|
||||||
@ -110,24 +110,20 @@ Shorewall 4.4.0 Beta 2
|
|||||||
released.
|
released.
|
||||||
|
|
||||||
----------------------------------------------------------------------------
|
----------------------------------------------------------------------------
|
||||||
P R O B L E M S C O R R E C T E D I N 4 . 4 . 0 Beta 2
|
P R O B L E M S C O R R E C T E D I N 4 . 4 . 0 Beta 3
|
||||||
----------------------------------------------------------------------------
|
----------------------------------------------------------------------------
|
||||||
|
|
||||||
1) The find_first_interface_address() and
|
1) Previously, if Address Type Match was not available and an
|
||||||
find_first_interface_addresss_if_any() functions were not in scope when
|
interface on the firewall was (mis-)configured as follows, then
|
||||||
/etc/shorewall/params was processed.
|
REJECT policies in Shorewall-perl would drop packets addressed to
|
||||||
|
the interface rather than reject them.
|
||||||
|
|
||||||
2) The compiled script could fail with an error such as the following
|
3: venet0: <BROADCAST,POINTOPOINT,NOARP,UP,LOWER_UP> mtu 1500 ...
|
||||||
when the internal traffic shaper was enabled:
|
inet 127.0.0.1/32 scope host venet0
|
||||||
|
inet 206.124.146.176/32 brd 206.124.146.176 ...
|
||||||
|
|
||||||
ERROR: Command "tc qdisc add dev dsl0 root handle 1: htb
|
Note that a /32 should never be configured with a broadcast
|
||||||
default 0 r2q 5.5" Failed
|
address.
|
||||||
|
|
||||||
3) The help output from the install.sh scripts mentioned the '-n'
|
|
||||||
option but support for that option has been removed.
|
|
||||||
|
|
||||||
4) The 'continue' script is no longer used in Shorewall 4.4 but it was
|
|
||||||
still being released.
|
|
||||||
|
|
||||||
----------------------------------------------------------------------------
|
----------------------------------------------------------------------------
|
||||||
K N O W N P R O B L E M S R E M A I N I N G
|
K N O W N P R O B L E M S R E M A I N I N G
|
||||||
@ -136,54 +132,15 @@ Shorewall 4.4.0 Beta 2
|
|||||||
None.
|
None.
|
||||||
|
|
||||||
----------------------------------------------------------------------------
|
----------------------------------------------------------------------------
|
||||||
N E W F E A T U R E S I N 4 . 4 . 0 Beta 2
|
N E W F E A T U R E S I N 4 . 4 . 0 Beta 3
|
||||||
----------------------------------------------------------------------------
|
----------------------------------------------------------------------------
|
||||||
|
|
||||||
1) A 'upnpclient' option has been added to
|
1) Three new macros have been contributed by Alex Wilms.
|
||||||
/etc/shorewall/interfaces. This option is intended for laptop users
|
|
||||||
who always run Shorewall on their system yet need to run
|
|
||||||
UPnP-enabled client apps such as Transmission (BitTorrent client).
|
|
||||||
|
|
||||||
The option causes Shorewall to detect the default gateway through
|
macro.BGP
|
||||||
the interface and to accept UDP packets from that gateway. Note
|
macro.Citrix
|
||||||
that, like all aspects of UPnP, this is a security hole so use this
|
macro.Razor
|
||||||
option at your own risk.
|
|
||||||
|
|
||||||
2) 'iptrace' and 'noiptrace' commands have been added to both
|
|
||||||
/sbin/shorewall and /sbin/shorewall6.
|
|
||||||
|
|
||||||
These are low-level debugging commands that cause
|
|
||||||
iptables/ip6tables TRACE log messages to be generated. See 'man
|
|
||||||
iptables' and 'man ip6tables' for details.
|
|
||||||
|
|
||||||
The syntax for the commands is:
|
|
||||||
|
|
||||||
iptrace <iptables/ip6tables match expression>
|
|
||||||
noiptrace <iptables/ip6tables match expression>
|
|
||||||
|
|
||||||
iptrace starts the trace; noiptrace turns it off.
|
|
||||||
|
|
||||||
The match expression must be an expression that is legal in both
|
|
||||||
the raw table OUTPUT and PREROUTING chains.
|
|
||||||
|
|
||||||
Examaple:
|
|
||||||
|
|
||||||
To trace all packets desinted for IP address 206.124.146.176:
|
|
||||||
|
|
||||||
shorewall iptrace -d 206.124.146.176
|
|
||||||
|
|
||||||
To turn that trace off:
|
|
||||||
|
|
||||||
shorewall noiptrace -d 206.124.146.176
|
|
||||||
|
|
||||||
3) A USER/GROUP column has been added to /etc/shorewall/masq. The
|
|
||||||
column works similarly to USER/GROUP columns in other Shorewall
|
|
||||||
configuration files. Only locally-generated traffic is matched.
|
|
||||||
|
|
||||||
4) A new extension script, 'lib.private' has been added. This file is
|
|
||||||
intended to include declarations of shell functions that will be
|
|
||||||
called by the other run-time extension scripts.
|
|
||||||
|
|
||||||
----------------------------------------------------------------------------
|
----------------------------------------------------------------------------
|
||||||
N E W F E A T U R E S IN 4 . 4
|
N E W F E A T U R E S IN 4 . 4
|
||||||
----------------------------------------------------------------------------
|
----------------------------------------------------------------------------
|
||||||
@ -773,3 +730,47 @@ None.
|
|||||||
23) Support for 'norfc1918' has been removed. See the Migration
|
23) Support for 'norfc1918' has been removed. See the Migration
|
||||||
Considerations above.
|
Considerations above.
|
||||||
|
|
||||||
|
22) A 'upnpclient' option has been added to
|
||||||
|
/etc/shorewall/interfaces. This option is intended for laptop users
|
||||||
|
who always run Shorewall on their system yet need to run
|
||||||
|
UPnP-enabled client apps such as Transmission (BitTorrent client).
|
||||||
|
|
||||||
|
The option causes Shorewall to detect the default gateway through
|
||||||
|
the interface and to accept UDP packets from that gateway. Note
|
||||||
|
that, like all aspects of UPnP, this is a security hole so use this
|
||||||
|
option at your own risk.
|
||||||
|
|
||||||
|
23) 'iptrace' and 'noiptrace' commands have been added to both
|
||||||
|
/sbin/shorewall and /sbin/shorewall6.
|
||||||
|
|
||||||
|
These are low-level debugging commands that cause
|
||||||
|
iptables/ip6tables TRACE log messages to be generated. See 'man
|
||||||
|
iptables' and 'man ip6tables' for details.
|
||||||
|
|
||||||
|
The syntax for the commands is:
|
||||||
|
|
||||||
|
iptrace <iptables/ip6tables match expression>
|
||||||
|
noiptrace <iptables/ip6tables match expression>
|
||||||
|
|
||||||
|
iptrace starts the trace; noiptrace turns it off.
|
||||||
|
|
||||||
|
The match expression must be an expression that is legal in both
|
||||||
|
the raw table OUTPUT and PREROUTING chains.
|
||||||
|
|
||||||
|
Examaple:
|
||||||
|
|
||||||
|
To trace all packets desinted for IP address 206.124.146.176:
|
||||||
|
|
||||||
|
shorewall iptrace -d 206.124.146.176
|
||||||
|
|
||||||
|
To turn that trace off:
|
||||||
|
|
||||||
|
shorewall noiptrace -d 206.124.146.176
|
||||||
|
|
||||||
|
24) A USER/GROUP column has been added to /etc/shorewall/masq. The
|
||||||
|
column works similarly to USER/GROUP columns in other Shorewall
|
||||||
|
configuration files. Only locally-generated traffic is matched.
|
||||||
|
|
||||||
|
25) A new extension script, 'lib.private' has been added. This file is
|
||||||
|
intended to include declarations of shell functions that will be
|
||||||
|
called by the other run-time extension scripts.
|
||||||
|
Loading…
Reference in New Issue
Block a user