forked from extern/shorewall_code
Update version
git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@8551 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
parent
5666833021
commit
8525c8ccdf
@ -2,6 +2,8 @@ Changes in 4.2.0-Beta2
|
|||||||
|
|
||||||
1) Only issue a warning on RFC 1918 violation.
|
1) Only issue a warning on RFC 1918 violation.
|
||||||
|
|
||||||
|
2) Implement 'save' user exit.
|
||||||
|
|
||||||
Changes in 4.2.0-Beta1
|
Changes in 4.2.0-Beta1
|
||||||
|
|
||||||
1) Fix handling of firewall marks.
|
1) Fix handling of firewall marks.
|
||||||
|
@ -28,7 +28,7 @@
|
|||||||
# shown below. Simply run this script to revert to your prior version of
|
# shown below. Simply run this script to revert to your prior version of
|
||||||
# Shoreline Firewall.
|
# Shoreline Firewall.
|
||||||
|
|
||||||
VERSION=4.2.0-Beta1
|
VERSION=4.2.0-Beta2
|
||||||
|
|
||||||
usage() # $1 = exit status
|
usage() # $1 = exit status
|
||||||
{
|
{
|
||||||
|
@ -22,7 +22,7 @@
|
|||||||
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||||
#
|
#
|
||||||
|
|
||||||
VERSION=4.2.0-Beta1
|
VERSION=4.2.0-Beta2
|
||||||
|
|
||||||
usage() # $1 = exit status
|
usage() # $1 = exit status
|
||||||
{
|
{
|
||||||
|
@ -290,7 +290,7 @@ save_config() {
|
|||||||
if $IPTABLES -L dynamic -n > ${VARDIR}/save; then
|
if $IPTABLES -L dynamic -n > ${VARDIR}/save; then
|
||||||
echo " Dynamic Rules Saved"
|
echo " Dynamic Rules Saved"
|
||||||
if [ -f ${VARDIR}/.restore ]; then
|
if [ -f ${VARDIR}/.restore ]; then
|
||||||
if iptables-save | iptablesbug > ${VARDIR}/restore-$$; then
|
if $iptables_save | iptablesbug > ${VARDIR}/restore-$$; then
|
||||||
cp -f ${VARDIR}/.restore $RESTOREPATH
|
cp -f ${VARDIR}/.restore $RESTOREPATH
|
||||||
mv -f ${VARDIR}/restore-$$ ${RESTOREPATH}-iptables
|
mv -f ${VARDIR}/restore-$$ ${RESTOREPATH}-iptables
|
||||||
chmod +x $RESTOREPATH
|
chmod +x $RESTOREPATH
|
||||||
@ -333,6 +333,8 @@ save_config() {
|
|||||||
echo " WARNING: Invalid value ($SAVE_IPSETS) for SAVE_IPSETS. Ipset contents not saved" >&2
|
echo " WARNING: Invalid value ($SAVE_IPSETS) for SAVE_IPSETS. Ipset contents not saved" >&2
|
||||||
;;
|
;;
|
||||||
esac
|
esac
|
||||||
|
|
||||||
|
run_user_exit save
|
||||||
else
|
else
|
||||||
rm -f ${VARDIR}/restore-$$
|
rm -f ${VARDIR}/restore-$$
|
||||||
echo " ERROR: Currently-running Configuration Not Saved" >&2
|
echo " ERROR: Currently-running Configuration Not Saved" >&2
|
||||||
@ -838,7 +840,7 @@ restore_command() {
|
|||||||
|
|
||||||
[ -n "$nolock" ] || mutex_off
|
[ -n "$nolock" ] || mutex_off
|
||||||
else
|
else
|
||||||
echo "File ${VARDIR}/$RESTOREFILE: file not found"
|
echo "File $RESTOREPATH: file not found"
|
||||||
[ -n "$nolock" ] || mutex_off
|
[ -n "$nolock" ] || mutex_off
|
||||||
exit 2
|
exit 2
|
||||||
fi
|
fi
|
||||||
|
@ -84,6 +84,36 @@ Problems Corrected in Shorewall 4.2.0 Beta 2
|
|||||||
|
|
||||||
Other Changes in Shoreall 4.2.0 Beta 2.
|
Other Changes in Shoreall 4.2.0 Beta 2.
|
||||||
|
|
||||||
|
1) A 'save' extension script is added. The script is run after
|
||||||
|
iptables-save has completed successfully.
|
||||||
|
|
||||||
|
The 'load' and 'reload' commands copy the save script (if any) to
|
||||||
|
/etc/shorewall-lite/ on the remove firewall system. The 'export'
|
||||||
|
command copies the file to the same directory as the 'firewall' and
|
||||||
|
'firewall.conf' scripts.
|
||||||
|
|
||||||
|
I have the following commands in my 'save' script:
|
||||||
|
|
||||||
|
[ -s /root/ipsets.save ] && cp -a /root/ipsets.save /root/ipsets.save.backup
|
||||||
|
ipset -S > /root/ipsets.save
|
||||||
|
|
||||||
|
These commands complement my 'init' script:
|
||||||
|
|
||||||
|
qt modprobe ifb numifbs=1
|
||||||
|
qt ip link set dev ifb0 up
|
||||||
|
|
||||||
|
if [ "$COMMAND" = start ]; then
|
||||||
|
ipset -U :all: :all:
|
||||||
|
ipset -U :all: :default:
|
||||||
|
ipset -F
|
||||||
|
ipset -X
|
||||||
|
ipset -R < /root/ipsets.save
|
||||||
|
fi
|
||||||
|
|
||||||
|
Those two scripts allow me to save and restore the contents of my
|
||||||
|
ipsets automatically under Shorewall-perl/Shorewall-lite (my
|
||||||
|
routestopped file does not use ipsets).
|
||||||
|
|
||||||
None.
|
None.
|
||||||
|
|
||||||
New Features in Shorewall 4.2.
|
New Features in Shorewall 4.2.
|
||||||
|
@ -1303,6 +1303,10 @@ reload_command() # $* = original arguments less the command.
|
|||||||
progress_message3 "Copying $file and ${file}.conf to ${system}:${LITEDIR}..." && \
|
progress_message3 "Copying $file and ${file}.conf to ${system}:${LITEDIR}..." && \
|
||||||
rcp_command "$directory/firewall $directory/firewall.conf" ${LITEDIR}
|
rcp_command "$directory/firewall $directory/firewall.conf" ${LITEDIR}
|
||||||
then
|
then
|
||||||
|
save=$(find_file save);
|
||||||
|
|
||||||
|
[ -f $save ] && progress_message3 "Copying $save to ${system}:/etc/shorewall-lite/" && rcp_command $save /etc/shorewall-lite/
|
||||||
|
|
||||||
progress_message3 "Copy complete"
|
progress_message3 "Copy complete"
|
||||||
if [ $COMMAND = reload ]; then
|
if [ $COMMAND = reload ]; then
|
||||||
rsh_command "/sbin/shorewall-lite $debugging $verbose $timestamp restart" && \
|
rsh_command "/sbin/shorewall-lite $debugging $verbose $timestamp restart" && \
|
||||||
@ -1394,6 +1398,10 @@ export_command() # $* = original arguments less the command.
|
|||||||
echo "Copying $file and ${file}.conf to ${target#*@}..." && \
|
echo "Copying $file and ${file}.conf to ${target#*@}..." && \
|
||||||
scp $directory/firewall $directory/firewall.conf $target
|
scp $directory/firewall $directory/firewall.conf $target
|
||||||
then
|
then
|
||||||
|
save=(find_file save);
|
||||||
|
|
||||||
|
[ -f $save ] && progress_message3 "Copying $save to ${target#*}..." && rcp_command $save $target
|
||||||
|
|
||||||
progress_message3 "Copy complete"
|
progress_message3 "Copy complete"
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
%define name shorewall-common
|
%define name shorewall-common
|
||||||
%define version 4.2.0
|
%define version 4.2.0
|
||||||
%define release 0Beta1
|
%define release 0Beta2
|
||||||
|
|
||||||
Summary: Shoreline Firewall is an iptables-based firewall for Linux systems.
|
Summary: Shoreline Firewall is an iptables-based firewall for Linux systems.
|
||||||
Name: %{name}
|
Name: %{name}
|
||||||
@ -175,6 +175,8 @@ fi
|
|||||||
%doc COPYING INSTALL changelog.txt releasenotes.txt tunnel ipsecvpn Samples
|
%doc COPYING INSTALL changelog.txt releasenotes.txt tunnel ipsecvpn Samples
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Mon Jun 02 2008 Tom Eastep tom@shorewall.net
|
||||||
|
- Updated to 4.2.0-0Beta2
|
||||||
* Wed May 07 2008 Tom Eastep tom@shorewall.net
|
* Wed May 07 2008 Tom Eastep tom@shorewall.net
|
||||||
- Updated to 4.2.0-0Beta1
|
- Updated to 4.2.0-0Beta1
|
||||||
* Mon Apr 28 2008 Tom Eastep tom@shorewall.net
|
* Mon Apr 28 2008 Tom Eastep tom@shorewall.net
|
||||||
|
@ -26,7 +26,7 @@
|
|||||||
# You may only use this script to uninstall the version
|
# You may only use this script to uninstall the version
|
||||||
# shown below. Simply run this script to remove Shorewall Firewall
|
# shown below. Simply run this script to remove Shorewall Firewall
|
||||||
|
|
||||||
VERSION=4.2.0-Beta1
|
VERSION=4.2.0-Beta2
|
||||||
|
|
||||||
usage() # $1 = exit status
|
usage() # $1 = exit status
|
||||||
{
|
{
|
||||||
|
@ -28,7 +28,7 @@
|
|||||||
# shown below. Simply run this script to revert to your prior version of
|
# shown below. Simply run this script to revert to your prior version of
|
||||||
# Shoreline Firewall.
|
# Shoreline Firewall.
|
||||||
|
|
||||||
VERSION=4.2.0-Beta1
|
VERSION=4.2.0-Beta2
|
||||||
|
|
||||||
usage() # $1 = exit status
|
usage() # $1 = exit status
|
||||||
{
|
{
|
||||||
|
@ -22,7 +22,7 @@
|
|||||||
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||||
#
|
#
|
||||||
|
|
||||||
VERSION=4.2.0-Beta1
|
VERSION=4.2.0-Beta2
|
||||||
|
|
||||||
usage() # $1 = exit status
|
usage() # $1 = exit status
|
||||||
{
|
{
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
%define name shorewall-lite
|
%define name shorewall-lite
|
||||||
%define version 4.2.0
|
%define version 4.2.0
|
||||||
%define release 0Beta1
|
%define release 0Beta2
|
||||||
|
|
||||||
Summary: Shoreline Firewall Lite is an iptables-based firewall for Linux systems.
|
Summary: Shoreline Firewall Lite is an iptables-based firewall for Linux systems.
|
||||||
Name: %{name}
|
Name: %{name}
|
||||||
@ -98,6 +98,8 @@ fi
|
|||||||
%doc COPYING changelog.txt releasenotes.txt
|
%doc COPYING changelog.txt releasenotes.txt
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Mon Jun 02 2008 Tom Eastep tom@shorewall.net
|
||||||
|
- Updated to 4.2.0-0Beta2
|
||||||
* Wed May 07 2008 Tom Eastep tom@shorewall.net
|
* Wed May 07 2008 Tom Eastep tom@shorewall.net
|
||||||
- Updated to 4.2.0-0Beta1
|
- Updated to 4.2.0-0Beta1
|
||||||
* Mon Apr 28 2008 Tom Eastep tom@shorewall.net
|
* Mon Apr 28 2008 Tom Eastep tom@shorewall.net
|
||||||
|
@ -26,7 +26,7 @@
|
|||||||
# You may only use this script to uninstall the version
|
# You may only use this script to uninstall the version
|
||||||
# shown below. Simply run this script to remove Shorewall Firewall
|
# shown below. Simply run this script to remove Shorewall Firewall
|
||||||
|
|
||||||
VERSION=4.2.0-Beta1
|
VERSION=4.2.0-Beta2
|
||||||
|
|
||||||
usage() # $1 = exit status
|
usage() # $1 = exit status
|
||||||
{
|
{
|
||||||
|
@ -652,13 +652,13 @@ sub use_input_chain($) {
|
|||||||
#
|
#
|
||||||
# Interface associated with a single zone -- use the zone's input chain if it has one
|
# Interface associated with a single zone -- use the zone's input chain if it has one
|
||||||
#
|
#
|
||||||
my $chainref = $filter_table->{zone_input_chain $interfaceref->{zone}};
|
my $chainref = $filter_table->{zone_input_chain $interfaceref->{zone4}};
|
||||||
|
|
||||||
return 0 if $chainref;
|
return 0 if $chainref;
|
||||||
#
|
#
|
||||||
# Use the '<zone>2fw' chain if it is referenced.
|
# Use the '<zone>2fw' chain if it is referenced.
|
||||||
#
|
#
|
||||||
$chainref = $filter_table->{join( '' , $interfaceref->{zone} , '2' , firewall_zone )};
|
$chainref = $filter_table->{join( '' , $interfaceref->{zone4} , '2' , firewall_zone )};
|
||||||
|
|
||||||
! $chainref->{referenced};
|
! $chainref->{referenced};
|
||||||
}
|
}
|
||||||
@ -696,13 +696,13 @@ sub use_output_chain($) {
|
|||||||
#
|
#
|
||||||
# Interface associated with a single zone -- use the zone's output chain if it has one
|
# Interface associated with a single zone -- use the zone's output chain if it has one
|
||||||
#
|
#
|
||||||
my $chainref = $filter_table->{zone_output_chain $interfaceref->{zone}};
|
my $chainref = $filter_table->{zone_output_chain $interfaceref->{zone4}};
|
||||||
|
|
||||||
return 0 if $chainref;
|
return 0 if $chainref;
|
||||||
#
|
#
|
||||||
# Use the 'fw2<zone>' chain if it is referenced.
|
# Use the 'fw2<zone>' chain if it is referenced.
|
||||||
#
|
#
|
||||||
$chainref = $filter_table->{join( '', firewall_zone , '2', $interfaceref->{zone} )};
|
$chainref = $filter_table->{join( '', firewall_zone , '2', $interfaceref->{zone4} )};
|
||||||
|
|
||||||
! $chainref->{referenced};
|
! $chainref->{referenced};
|
||||||
}
|
}
|
||||||
|
@ -265,7 +265,7 @@ sub initialize() {
|
|||||||
ORIGINAL_POLICY_MATCH => '',
|
ORIGINAL_POLICY_MATCH => '',
|
||||||
LOGPARMS => '',
|
LOGPARMS => '',
|
||||||
TC_SCRIPT => '',
|
TC_SCRIPT => '',
|
||||||
VERSION => "4.2.0-Beta1",
|
VERSION => "4.2.0-Beta2",
|
||||||
CAPVERSION => 40100 ,
|
CAPVERSION => 40100 ,
|
||||||
);
|
);
|
||||||
#
|
#
|
||||||
|
@ -127,7 +127,7 @@ our %reservedName = ( all => 1,
|
|||||||
# options => { <option1> = <val1> ,
|
# options => { <option1> = <val1> ,
|
||||||
# ...
|
# ...
|
||||||
# }
|
# }
|
||||||
# zone => <zone name>
|
# zone4 => <zone name>
|
||||||
# nets => <number of nets in interface/hosts records referring to this interface>
|
# nets => <number of nets in interface/hosts records referring to this interface>
|
||||||
# bridge => <bridge>
|
# bridge => <bridge>
|
||||||
# broadcasts => 'none', 'detect' or [ <addr1>, <addr2>, ... ]
|
# broadcasts => 'none', 'detect' or [ <addr1>, <addr2>, ... ]
|
||||||
@ -455,7 +455,7 @@ sub add_group_to_zone($$$$$)
|
|||||||
my $arrayref;
|
my $arrayref;
|
||||||
my $zoneref = $zones{$zone};
|
my $zoneref = $zones{$zone};
|
||||||
my $zonetype = $zoneref->{type};
|
my $zonetype = $zoneref->{type};
|
||||||
my $ifacezone = $interfaces{$interface}{zone};
|
my $ifacezone = $interfaces{$interface}{zone4};
|
||||||
|
|
||||||
$zoneref->{interfaces}{$interface} = 1;
|
$zoneref->{interfaces}{$interface} = 1;
|
||||||
|
|
||||||
@ -752,7 +752,7 @@ sub validate_interfaces_file( $ )
|
|||||||
|
|
||||||
add_group_to_zone( $zone, $zoneref->{type}, $interface, \@networks, $optionsref ) if $zone;
|
add_group_to_zone( $zone, $zoneref->{type}, $interface, \@networks, $optionsref ) if $zone;
|
||||||
|
|
||||||
$interfaces{$interface}{zone} = $zone; #Must follow the call to add_group_to_zone()
|
$interfaces{$interface}{zone4} = $zone; #Must follow the call to add_group_to_zone()
|
||||||
|
|
||||||
progress_message " Interface \"$currentline\" Validated";
|
progress_message " Interface \"$currentline\" Validated";
|
||||||
|
|
||||||
@ -1028,7 +1028,7 @@ sub find_hosts_by_option( $ ) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
for my $interface ( @interfaces ) {
|
for my $interface ( @interfaces ) {
|
||||||
if ( ! $interfaces{$interface}{zone} && $interfaces{$interface}{options}{$option} ) {
|
if ( ! $interfaces{$interface}{zone4} && $interfaces{$interface}{options}{$option} ) {
|
||||||
push @hosts, [ $interface, 'none', ALLIPv4 ];
|
push @hosts, [ $interface, 'none', ALLIPv4 ];
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -22,7 +22,7 @@
|
|||||||
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||||
#
|
#
|
||||||
|
|
||||||
VERSION=4.2.0-Beta1
|
VERSION=4.2.0-Beta2
|
||||||
|
|
||||||
usage() # $1 = exit status
|
usage() # $1 = exit status
|
||||||
{
|
{
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
%define name shorewall-perl
|
%define name shorewall-perl
|
||||||
%define version 4.2.0
|
%define version 4.2.0
|
||||||
%define release 0Beta1
|
%define release 0Beta2
|
||||||
|
|
||||||
Summary: Shoreline Firewall Perl-based compiler.
|
Summary: Shoreline Firewall Perl-based compiler.
|
||||||
Name: %{name}
|
Name: %{name}
|
||||||
@ -64,6 +64,8 @@ rm -rf $RPM_BUILD_ROOT
|
|||||||
%doc COPYING releasenotes.txt
|
%doc COPYING releasenotes.txt
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Mon Jun 02 2008 Tom Eastep tom@shorewall.net
|
||||||
|
- Updated to 4.2.0-0Beta2
|
||||||
* Wed May 07 2008 Tom Eastep tom@shorewall.net
|
* Wed May 07 2008 Tom Eastep tom@shorewall.net
|
||||||
- Updated to 4.2.0-0Beta1
|
- Updated to 4.2.0-0Beta1
|
||||||
* Mon Apr 28 2008 Tom Eastep tom@shorewall.net
|
* Mon Apr 28 2008 Tom Eastep tom@shorewall.net
|
||||||
|
@ -22,7 +22,7 @@
|
|||||||
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||||
#
|
#
|
||||||
|
|
||||||
VERSION=4.2.0-Beta1
|
VERSION=4.2.0-Beta2
|
||||||
|
|
||||||
usage() # $1 = exit status
|
usage() # $1 = exit status
|
||||||
{
|
{
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
%define name shorewall-shell
|
%define name shorewall-shell
|
||||||
%define version 4.2.0
|
%define version 4.2.0
|
||||||
%define release 0Beta1
|
%define release 0Beta2
|
||||||
|
|
||||||
Summary: Shoreline Firewall is an iptables-based firewall for Linux systems.
|
Summary: Shoreline Firewall is an iptables-based firewall for Linux systems.
|
||||||
Name: %{name}
|
Name: %{name}
|
||||||
@ -81,6 +81,8 @@ fi
|
|||||||
%doc COPYING INSTALL
|
%doc COPYING INSTALL
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Mon Jun 02 2008 Tom Eastep tom@shorewall.net
|
||||||
|
- Updated to 4.2.0-0Beta2
|
||||||
* Wed May 07 2008 Tom Eastep tom@shorewall.net
|
* Wed May 07 2008 Tom Eastep tom@shorewall.net
|
||||||
- Updated to 4.2.0-0Beta1
|
- Updated to 4.2.0-0Beta1
|
||||||
* Mon Apr 28 2008 Tom Eastep tom@shorewall.net
|
* Mon Apr 28 2008 Tom Eastep tom@shorewall.net
|
||||||
|
Loading…
Reference in New Issue
Block a user