forked from extern/shorewall_code
Clean up release notes
Signed-off-by: Tom Eastep <teastep@shorewall.net>
This commit is contained in:
parent
54f9a0e671
commit
7c250cd5b3
@ -33,17 +33,18 @@ VI. PROBLEMS CORRECTED AND NEW FEATURES IN PRIOR RELEASES
|
|||||||
1) The implementation of the environmental variables LIBEXEC and
|
1) The implementation of the environmental variables LIBEXEC and
|
||||||
PERLLIB that was introduced in 4.4.19 has been changed
|
PERLLIB that was introduced in 4.4.19 has been changed
|
||||||
slightly. The installers now allow absolute path names to be
|
slightly. The installers now allow absolute path names to be
|
||||||
supplied so that the executables and/or Perl modules may be
|
supplied in these variables so that the executables and/or Perl
|
||||||
installed under a top-level directory other than /usr. The change
|
modules may be installed under a top-level directory other than
|
||||||
is compatible with 4.4.19 in that if a relative path name is
|
/usr. The change is compatible with 4.4.19 in that if a relative
|
||||||
supplied, then '/usr/' is prepended to the name.
|
path name is supplied, then '/usr/' is prepended to the supplied
|
||||||
|
name.
|
||||||
|
|
||||||
2) A new ACCOUNTING_TABLE option has been added to shorewall.conf and
|
2) A new ACCOUNTING_TABLE option has been added to shorewall.conf and
|
||||||
shorwall6.conf. The setting determines the Netfilter table (filter
|
shorewall6.conf. The setting determines the Netfilter table (filter
|
||||||
or mangle) where accounting rules are created.
|
or mangle) where accounting rules are created.
|
||||||
|
|
||||||
When ACCOUNTING_TABLE=mangle, the allowable sections in the
|
When ACCOUNTING_TABLE=mangle, the allowable accounting file
|
||||||
accounting file are as follows:
|
sections are:
|
||||||
|
|
||||||
PREROUTING
|
PREROUTING
|
||||||
INPUT
|
INPUT
|
||||||
@ -74,11 +75,13 @@ VI. PROBLEMS CORRECTED AND NEW FEATURES IN PRIOR RELEASES
|
|||||||
release.
|
release.
|
||||||
|
|
||||||
Use 'shorewall show capabilities' after installing this release
|
Use 'shorewall show capabilities' after installing this release
|
||||||
to see if your kernel/iptables support the AUDIT target.
|
to see if your kernel and iptables support the AUDIT target.
|
||||||
|
|
||||||
b) In /etc/shorewall/policy's POLICY column, the policy (and
|
b) In /etc/shorewall/policy's POLICY column, the policy (and
|
||||||
default action, if any) may be followed by ':audit' to cause
|
default action, if any) may be followed by ':audit' to cause
|
||||||
application of the policy to be audited.
|
applications of the policy to be audited. This means that any
|
||||||
|
NEW connection that does not match any rule in the rules file
|
||||||
|
or in the applicable 'default action' will be audited.
|
||||||
|
|
||||||
Only ACCEPT, DROP and REJECT policies may be audited.
|
Only ACCEPT, DROP and REJECT policies may be audited.
|
||||||
|
|
||||||
@ -111,7 +114,7 @@ VI. PROBLEMS CORRECTED AND NEW FEATURES IN PRIOR RELEASES
|
|||||||
BLACKLIST_DISPOSITION A_DROP or A_REJECT
|
BLACKLIST_DISPOSITION A_DROP or A_REJECT
|
||||||
MACLIST_DISPOSITION A_DROP
|
MACLIST_DISPOSITION A_DROP
|
||||||
A_REJECT, unless
|
A_REJECT, unless
|
||||||
MACLIST_TABLE=mangle
|
MACLIST_TABLE=mangle
|
||||||
TCP_FLAGS_DISPOSITION A_DROP or A_REJECT
|
TCP_FLAGS_DISPOSITION A_DROP or A_REJECT
|
||||||
|
|
||||||
e) A SMURF_DISPOSITION option has been added to
|
e) A SMURF_DISPOSITION option has been added to
|
||||||
@ -120,8 +123,8 @@ VI. PROBLEMS CORRECTED AND NEW FEATURES IN PRIOR RELEASES
|
|||||||
|
|
||||||
f) An 'audit' option has been added to the
|
f) An 'audit' option has been added to the
|
||||||
/etc/shorewall/blacklist file which causes the packets matching
|
/etc/shorewall/blacklist file which causes the packets matching
|
||||||
the entryto be audited. 'audit' may not be specified together
|
the entry to be audited. 'audit' may not be specified together
|
||||||
with 'accept'.
|
with 'whitelist'.
|
||||||
|
|
||||||
g) The builtin actions (dropBroadcast, rejNonSyn, etc.) now support
|
g) The builtin actions (dropBroadcast, rejNonSyn, etc.) now support
|
||||||
an 'audit' parameter which causes all ACCEPT, DROP and REJECTs
|
an 'audit' parameter which causes all ACCEPT, DROP and REJECTs
|
||||||
@ -130,14 +133,19 @@ VI. PROBLEMS CORRECTED AND NEW FEATURES IN PRIOR RELEASES
|
|||||||
(action.Drop and action.Reject).
|
(action.Drop and action.Reject).
|
||||||
|
|
||||||
Note: The builtin actions are those actions listed in the
|
Note: The builtin actions are those actions listed in the
|
||||||
output of 'shorewall show actions' whose names begin with a
|
output of 'shorewall show actions' with names begin with a
|
||||||
lower-case letter.
|
lower-case letter.
|
||||||
|
|
||||||
|
Example:
|
||||||
|
|
||||||
|
#ACTION SOURCE DEST
|
||||||
|
rejNonSyn(audit) net all
|
||||||
|
|
||||||
6) Up to this release, the behaviors of 'start -f' and 'restart -f'
|
6) Up to this release, the behaviors of 'start -f' and 'restart -f'
|
||||||
has been inconsistent with AUTOMAKE=Yes. The 'start -f' and
|
has been inconsistent. The 'start -f' command compares the
|
||||||
'restart -f' commands compares the modification times of
|
modification times of /etc/shorewall[6] with
|
||||||
/etc/shorewall[6] with /var/lib/shorewall[6]/restore while
|
/var/lib/shorewall[6]/restore while 'restart -f' compares with
|
||||||
AUTOMAKE compares with /var/lib/shorewall[6]/firewall.
|
/var/lib/shorewall[6]/firewall.
|
||||||
|
|
||||||
To make the two consistent, a new LEGACY_FASTSTART option has been
|
To make the two consistent, a new LEGACY_FASTSTART option has been
|
||||||
added. The default value when the option isn't specified is
|
added. The default value when the option isn't specified is
|
||||||
@ -217,6 +225,8 @@ VI. PROBLEMS CORRECTED AND NEW FEATURES IN PRIOR RELEASES
|
|||||||
17) A 'Universal' sample configuration is now availale for a
|
17) A 'Universal' sample configuration is now availale for a
|
||||||
'plug-and-play' firewall.
|
'plug-and-play' firewall.
|
||||||
|
|
||||||
|
18) Support for the AUDIT iptables target has been added.
|
||||||
|
|
||||||
----------------------------------------------------------------------------
|
----------------------------------------------------------------------------
|
||||||
V. M I G R A T I O N I S S U E S
|
V. M I G R A T I O N I S S U E S
|
||||||
----------------------------------------------------------------------------
|
----------------------------------------------------------------------------
|
||||||
|
Loading…
Reference in New Issue
Block a user