forked from extern/shorewall_code
Updates for Shorewall 2.0.10
git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@1721 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
parent
c4f88160da
commit
e334d06609
@ -69,3 +69,5 @@ Changes in 2.0.10
|
||||
|
||||
4) Apply part of Ian Allen's fix for down interface in the SUBNET
|
||||
column of /etc/shorewall/masq.
|
||||
|
||||
5) Add key /proc settings to "shorewall status" output.
|
||||
|
@ -28,7 +28,7 @@
|
||||
# shown below. Simply run this script to revert to your prior version of
|
||||
# Shoreline Firewall.
|
||||
|
||||
VERSION=2.0.9
|
||||
VERSION=2.0.10
|
||||
|
||||
usage() # $1 = exit status
|
||||
{
|
||||
|
@ -22,7 +22,7 @@
|
||||
# Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA
|
||||
#
|
||||
|
||||
VERSION=2.0.9
|
||||
VERSION=2.0.10
|
||||
|
||||
usage() # $1 = exit status
|
||||
{
|
||||
|
@ -145,4 +145,33 @@ Problems corrected in version 2.0.10
|
||||
through an interface named in the SUBNET column of
|
||||
/etc/shorewall/masq was less than helpful since it didn't include
|
||||
the interface name.
|
||||
-----------------------------------------------------------------------
|
||||
New Features in 2.0.10
|
||||
|
||||
The "shorewall status" command has been enhanced to include the values
|
||||
of key /proc settings:
|
||||
|
||||
Example from a two-interface firewall:
|
||||
|
||||
/proc
|
||||
|
||||
/proc/sys/net/ipv4/ip_forward = 1
|
||||
/proc/sys/net/ipv4/conf/all/proxy_arp = 0
|
||||
/proc/sys/net/ipv4/conf/all/arp_filter = 0
|
||||
/proc/sys/net/ipv4/conf/all/rp_filter = 0
|
||||
/proc/sys/net/ipv4/conf/default/proxy_arp = 0
|
||||
/proc/sys/net/ipv4/conf/default/arp_filter = 0
|
||||
/proc/sys/net/ipv4/conf/default/rp_filter = 0
|
||||
/proc/sys/net/ipv4/conf/eth0/proxy_arp = 0
|
||||
/proc/sys/net/ipv4/conf/eth0/arp_filter = 0
|
||||
/proc/sys/net/ipv4/conf/eth0/rp_filter = 0
|
||||
/proc/sys/net/ipv4/conf/eth1/proxy_arp = 0
|
||||
/proc/sys/net/ipv4/conf/eth1/arp_filter = 0
|
||||
/proc/sys/net/ipv4/conf/eth1/rp_filter = 0
|
||||
/proc/sys/net/ipv4/conf/lo/proxy_arp = 0
|
||||
/proc/sys/net/ipv4/conf/lo/arp_filter = 0
|
||||
/proc/sys/net/ipv4/conf/lo/rp_filter = 0
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -599,6 +599,10 @@ show_reset() {
|
||||
echo
|
||||
}
|
||||
|
||||
show_proc() {
|
||||
[ -f $1 ] && echo " $1 = $(cat $1)"
|
||||
}
|
||||
|
||||
#
|
||||
# Execution begins here
|
||||
#
|
||||
@ -796,7 +800,7 @@ case "$1" in
|
||||
[ $# -gt 2 ] && usage 1
|
||||
echo "Shorewall-$version Connections at $HOSTNAME - $(date)"
|
||||
echo
|
||||
cat /proc/net/ip_conntrack
|
||||
cat /pro/net/ip_conntrack
|
||||
;;
|
||||
nat)
|
||||
[ $# -gt 2 ] && usage 1
|
||||
@ -893,6 +897,18 @@ case "$1" in
|
||||
brctl show
|
||||
fi
|
||||
|
||||
echo
|
||||
echo "/proc"
|
||||
echo
|
||||
|
||||
show_proc /proc/sys/net/ipv4/ip_forward
|
||||
|
||||
for directory in /proc/sys/net/ipv4/conf/*; do
|
||||
for file in proxy_arp arp_filter rp_filter; do
|
||||
show_proc $directory/$file
|
||||
done
|
||||
done
|
||||
|
||||
echo
|
||||
echo "Routing Rules"
|
||||
echo
|
||||
|
@ -1,5 +1,5 @@
|
||||
%define name shorewall
|
||||
%define version 2.0.9
|
||||
%define version 2.0.10
|
||||
%define release 1
|
||||
%define prefix /usr
|
||||
|
||||
@ -141,6 +141,8 @@ fi
|
||||
%doc COPYING INSTALL changelog.txt releasenotes.txt tunnel
|
||||
|
||||
%changelog
|
||||
* Mon Oct 25 2004 Tom Eastep tom@shorewall.net
|
||||
- Updated to 2.0.10-1
|
||||
* Thu Sep 23 2004 Tom Eastep tom@shorewall.net
|
||||
- Updated to 2.0.9-1
|
||||
* Sun Aug 22 2004 Tom Eastep tom@shorewall.net
|
||||
|
@ -26,7 +26,7 @@
|
||||
# You may only use this script to uninstall the version
|
||||
# shown below. Simply run this script to remove Seattle Firewall
|
||||
|
||||
VERSION=2.0.9
|
||||
VERSION=2.0.10
|
||||
|
||||
usage() # $1 = exit status
|
||||
{
|
||||
|
Loading…
Reference in New Issue
Block a user