Update for Shorewall 2.0.14

git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@1882 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
teastep 2005-01-03 18:49:26 +00:00
parent 2ce6fd2f3e
commit d0512ba6d2
8 changed files with 19 additions and 17 deletions

View File

@ -29,7 +29,7 @@
#
# BROADCAST The broadcast address for the subnetwork to which the
# interface belongs. For P-T-P interfaces, this
# column is left black.If the interface has multiple
# column is left blank.If the interface has multiple
# addresses on multiple subnets then list the broadcast
# addresses as a comma-separated list.
#

View File

@ -1226,7 +1226,7 @@ setup_forwarding() {
# Disable IPV6
#
disable_ipv6() {
local foo=$(ip -f inet6 addr ls 2> /dev/null)
local foo="$(ip -f inet6 addr ls 2> /dev/null)"
if [ -n "$foo" ]; then
if qt which ip6tables; then
@ -1241,7 +1241,7 @@ disable_ipv6() {
}
disable_ipv6_1() {
local foo=$(ip -f inet6 addr ls 2> /dev/null)
local foo="$(ip -f inet6 addr ls 2> /dev/null)"
if [ -n "$foo" ]; then
if qt which ip6tables; then
@ -1844,8 +1844,9 @@ setup_mac_lists() {
setup_syn_flood_chain ()
# $1 = policy chain
# $2 = synparams
# $3 = loglevel
{
local chain=$1
local chain=@$1
local limit=$2
local limit_burst=
@ -1856,9 +1857,11 @@ setup_syn_flood_chain ()
;;
esac
run_iptables -N @$chain
run_iptables -A @$chain -m limit --limit $limit $limit_burst -j RETURN
run_iptables -A @$chain -j DROP
run_iptables -N $chain
run_iptables -A $chain -m limit --limit $limit $limit_burst -j RETURN
[ -n "$3" ] && \
log_rule_limit $3 $chain $chain DROP "-m limit --limit 5/min --limit-burst 5" "" ""
run_iptables -A $chain -j DROP
}
#
@ -5248,7 +5251,7 @@ apply_policy_rules() {
eval loglevel=\$${chain}_loglevel
eval synparams=\$${chain}_synparams
[ -n "$synparams" ] && setup_syn_flood_chain $chain $synparams
[ -n "$synparams" ] && setup_syn_flood_chain $chain $synparams $loglevel
if havechain $chain; then
[ -n "$synparams" ] && \

View File

@ -1 +1 @@
2.0.13
2.0.14

View File

@ -28,7 +28,7 @@
# shown below. Simply run this script to revert to your prior version of
# Shoreline Firewall.
VERSION=2.0.13
VERSION=2.0.14
usage() # $1 = exit status
{

View File

@ -22,7 +22,7 @@
# Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA
#
VERSION=2.0.13
VERSION=2.0.14
usage() # $1 = exit status
{

View File

@ -1,4 +1,4 @@
Shorewall 2.0.13
Shorewall 2.0.14
----------------------------------------------------------------------
Problems Corrected in version 2.0.4
@ -264,6 +264,3 @@ Problems corrected in 2.0.14
"shorewall clear" have been eliminated.
3) A misleading typo in /etc/shorewall/tunnels has been corrected.

View File

@ -1,5 +1,5 @@
%define name shorewall
%define version 2.0.13
%define version 2.0.14
%define release 1
%define prefix /usr
@ -141,6 +141,8 @@ fi
%doc COPYING INSTALL changelog.txt releasenotes.txt tunnel
%changelog
* Mon Jan 03 2005 Tom Eastep tom@shorewall.net
- Updated to 2.0.14-1
* Thu Dec 02 2004 Tom Eastep tom@shorewall.net
- Updated to 2.0.13-1
* Wed Dec 01 2004 Tom Eastep tom@shorewall.net

View File

@ -26,7 +26,7 @@
# You may only use this script to uninstall the version
# shown below. Simply run this script to remove Seattle Firewall
VERSION=2.0.13
VERSION=2.0.14
usage() # $1 = exit status
{