forked from extern/shorewall_code
Clean up rate limiting fixes (documentation)
Signed-off-by: Tom Eastep <teastep@shorewall.net>
This commit is contained in:
parent
6db2c5fbe3
commit
7eddb8310a
@ -192,8 +192,8 @@ Shorewall 4.4.7 Patch Release 5.
|
||||
but the CONTINUE action would not occur.
|
||||
|
||||
2) If multiple entries were present in /etc/shorewall/tcdevices and
|
||||
unique class numbers were not explicitly specified in
|
||||
/etc/shorewall/tc, then 'shorewall start' would fail with a
|
||||
globally unique class numbers were not explicitly specified in
|
||||
/etc/shorewall/tcclasses, then 'shorewall start' would fail with a
|
||||
diagnostic such as:
|
||||
|
||||
Setting up Traffic Control...
|
||||
@ -202,14 +202,22 @@ Shorewall 4.4.7 Patch Release 5.
|
||||
1500 limit 127 perturb 10" Failed
|
||||
Processing /etc/shorewall/stop ...
|
||||
|
||||
3) Previously, when per-IP rate limiting was specified with a low rate
|
||||
(such as 1/hour), the effective rate was much higher (once every 10
|
||||
seconds). The Shorewall compiler now configures the hashlimit table
|
||||
based on the rate such that the rate is more accurately enforced.
|
||||
3) Previously, when a low per-IP rate limit (such as 1/hour) was
|
||||
specified, the effective enforced rate was much higher
|
||||
(approximately 6/min). The Shorewall compiler now configures the
|
||||
hashlimit table idle timeout based on the rate units (min, hour,
|
||||
...) so that the rate is more accurately enforced.
|
||||
|
||||
As part of this change, a unique hash table name is assigned to
|
||||
each rule that does not specify a table name in the rule. The
|
||||
assigned names are of the form 'shorewallN' where N is an integer.
|
||||
each per-IP rate limiting rule that does not specify a table name
|
||||
in the rule. The assigned names are of the form 'shorewallN' where
|
||||
N is an integer. Previously, all such rules shared a single
|
||||
'shorewall' table which lead to unexpected results.
|
||||
|
||||
4) All prior versions of Shorewall-perl mishandle per-IP rate limiting
|
||||
in REDIRECT and DNAT rules. The effective rate and burst are 1/2 of
|
||||
the values given in the rule. This problem has been corrected so
|
||||
that the specified rate is now the effective rate.
|
||||
|
||||
----------------------------------------------------------------------------
|
||||
P R O B L E M S C O R R E C T E D I N 4 . 4 . 7 . 4
|
||||
|
@ -891,10 +891,10 @@
|
||||
respectively. The <replaceable>name</replaceable> may be chosen by
|
||||
the user and specifies a hash table to be used to count matching
|
||||
connections. If not give, the name <emphasis
|
||||
role="bold">shorewall</emphasis> is assumed. Where more than one
|
||||
rule specifies the same name, the connections counts for the rules
|
||||
are aggregated and the individual rates apply to the aggregated
|
||||
count.</para>
|
||||
role="bold">shorewallN</emphasis> (where N is a unique integer) is
|
||||
assumed. Where more than one rule specifies the same name, the
|
||||
connections counts for the rules are aggregated and the individual
|
||||
rates apply to the aggregated count.</para>
|
||||
|
||||
<para>Example: <emphasis role="bold">s:ssh:3/min:5</emphasis></para>
|
||||
</listitem>
|
||||
|
@ -692,10 +692,10 @@
|
||||
respectively. The <replaceable>name</replaceable> may be chosen by
|
||||
the user and specifies a hash table to be used to count matching
|
||||
connections. If not give, the name <emphasis
|
||||
role="bold">shorewall</emphasis> is assumed. Where more than one
|
||||
POLICY specifies the same name, the connections counts for the rules
|
||||
are aggregated and the individual rates apply to the aggregated
|
||||
count.</para>
|
||||
role="bold">shorewallN</emphasis> (where N is a unique integer) is
|
||||
assumed. Where more than one POLICY specifies the same name, the
|
||||
connections counts for the rules are aggregated and the individual
|
||||
rates apply to the aggregated count.</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user