From aed68c56e5a12e1bce1b5a977632a2af35137667 Mon Sep 17 00:00:00 2001 From: teastep Date: Tue, 6 Jul 2004 18:18:08 +0000 Subject: [PATCH] Shorewall 2.0.4 git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@1454 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb --- Shorewall-docs2/ReleaseModel.xml | 3 ++- Shorewall-docs2/errata.xml | 20 ++++++++++++++++++-- Shorewall-docs2/myfiles.xml | 16 ++++++++-------- 3 files changed, 28 insertions(+), 11 deletions(-) diff --git a/Shorewall-docs2/ReleaseModel.xml b/Shorewall-docs2/ReleaseModel.xml index dc37272b0..3b69d650f 100644 --- a/Shorewall-docs2/ReleaseModel.xml +++ b/Shorewall-docs2/ReleaseModel.xml @@ -135,7 +135,8 @@ New functionality was added in minor releases of the current - major release. + major release. There was no concept of Stable vs Development major + releases. diff --git a/Shorewall-docs2/errata.xml b/Shorewall-docs2/errata.xml index 68c5852c0..f513184fb 100644 --- a/Shorewall-docs2/errata.xml +++ b/Shorewall-docs2/errata.xml @@ -13,7 +13,7 @@ - 2004-07-02 + 2004-07-06 2001-2004 @@ -87,6 +87,22 @@
Problems in Version 2.0 +
+ Shorewall 2.0.2 and all Shorewall 2.0.3 Releases. + + + + DNAT rules with fw as the + source zone and that specify logging cause shorewall start + to fail with an iptables error. The problem is corrected for + Shorewall 2.0.3 users in this + firewall script which may be installed in + /usr/share/shorewall/firewall as described above. + + +
+
Shorewall 2.0.3a and 2.0.3b @@ -103,7 +119,7 @@ - These problems are corrected in Shorewall version 2.0.3c. + The above problems are corrected in Shorewall version 2.0.3c.
diff --git a/Shorewall-docs2/myfiles.xml b/Shorewall-docs2/myfiles.xml index 992f9fdfc..bcaf6eb32 100644 --- a/Shorewall-docs2/myfiles.xml +++ b/Shorewall-docs2/myfiles.xml @@ -15,7 +15,7 @@ - 2004-06-25 + 2004-07-04 2001-2004 @@ -42,12 +42,12 @@ address. If you have just a single public IP address, most of what you see here won't apply to your setup so beware of copying parts of this configuration and expecting them to work for you. What you copy may - or may not work in your configuration. + or may not work for you. The configuration shown here corresponds to Shorewall version - 2.0.1. My configuration uses features not available in earlier Shorewall + 2.0.3. My configuration uses features not available in earlier Shorewall releases. @@ -69,7 +69,7 @@ I use one-to-one NAT for EastepLaptop (My work system -- Windows - XP SP2). Internal address 192.168.1.7 and external address + XP SP1). Internal address 192.168.1.7 and external address 206.124.146.180. @@ -99,7 +99,7 @@ The firewall runs on a 256MB PII/233 with Debian Sarge (Testing). - Wookie and Ursa run Samba and the Wookie acts as a WINS server. + Wookie and Ursa run Samba and Wookie acts as a WINS server. The wireless network connects to Wookie's eth2 via a LinkSys WAP11.  In additional to using the rather weak WEP 40-bit @@ -124,7 +124,7 @@ desktop environment installed and that desktop environment is available via XDMCP from the local zone. For the most part though, X tunneled through SSH is used for server administration and the server runs at run - level 3 (multi-user console mode on RedHat). + level 3 (multi-user console mode on Fedora). I run an SNMP server on my firewall to serve MRTG running @@ -190,7 +190,7 @@ TCP_FLAGS_DISPOSITION=DROP
MIRRORS=<list of shorewall mirror ip addresses> NTPSERVERS=<list of the NTP servers I sync with> -TEXAS=<ip address of gateway in Dallas> +TEXAS=<ip address of gateway in Plano> LOG=info
@@ -203,7 +203,7 @@ LOG=info net Internet Internet dmz DMZ Demilitarized zone loc Local Local networks -tx Texas Peer Network in Dallas +tx Texas Peer Network in Plano #LAST LINE -- ADD YOUR ENTRIES ABOVE THIS ONE - DO NOT REMOVE