diff --git a/Shorewall/Perl/Shorewall/Config.pm b/Shorewall/Perl/Shorewall/Config.pm
index 4b21c9d19..e3222cb20 100644
--- a/Shorewall/Perl/Shorewall/Config.pm
+++ b/Shorewall/Perl/Shorewall/Config.pm
@@ -269,7 +269,7 @@ our %config;
#
# Entries in shorewall.conf that have been renamed
#
-our %renamed = ( AUTO_COMMENT => 'AUTOCOMMENT' );
+our %renamed = ( AUTO_COMMENT => 'AUTOCOMMENT', BLACKLIST_LOGLEVEL => 'BLACKLIST_LOG_LEVEL' );
#
# Config options and global settings that are to be copied to output script
#
@@ -665,7 +665,7 @@ sub initialize( $;$$) {
LOGRATE => undef,
LOGBURST => undef,
LOGALLNEW => undef,
- BLACKLIST_LOGLEVEL => undef,
+ BLACKLIST_LOG_LEVEL => undef,
RELATED_LOG_LEVEL => undef,
RFC1918_LOG_LEVEL => undef,
MACLIST_LOG_LEVEL => undef,
@@ -5286,13 +5286,13 @@ sub get_configuration( $$$$ ) {
require_capability 'AUDIT_TARGET', "SMURF_DISPOSITION=$val", 's' if $val =~ /^A_/;
- default_log_level 'BLACKLIST_LOGLEVEL', '';
- default_log_level 'MACLIST_LOG_LEVEL', '';
- default_log_level 'TCP_FLAGS_LOG_LEVEL', '';
- default_log_level 'RFC1918_LOG_LEVEL', '';
- default_log_level 'RELATED_LOG_LEVEL', '';
- default_log_level 'INVALID_LOG_LEVEL', '';
- default_log_level 'UNTRACKED_LOG_LEVEL', '';
+ default_log_level 'BLACKLIST_LOG_LEVEL', '';
+ default_log_level 'MACLIST_LOG_LEVEL', '';
+ default_log_level 'TCP_FLAGS_LOG_LEVEL', '';
+ default_log_level 'RFC1918_LOG_LEVEL', '';
+ default_log_level 'RELATED_LOG_LEVEL', '';
+ default_log_level 'INVALID_LOG_LEVEL', '';
+ default_log_level 'UNTRACKED_LOG_LEVEL', '';
warning_message "RFC1918_LOG_LEVEL=$config{RFC1918_LOG_LEVEL} ignored. The 'norfc1918' interface/host option is no longer supported" if $config{RFC1918_LOG_LEVEL};
diff --git a/Shorewall/Perl/Shorewall/Misc.pm b/Shorewall/Perl/Shorewall/Misc.pm
index 65c652fc2..6c17aa7bc 100644
--- a/Shorewall/Perl/Shorewall/Misc.pm
+++ b/Shorewall/Perl/Shorewall/Misc.pm
@@ -199,7 +199,7 @@ sub setup_blacklist() {
my $zones1 = find_zones_by_option 'blacklist', 'out';
my $chainref;
my $chainref1;
- my ( $level, $disposition ) = @config{'BLACKLIST_LOGLEVEL', 'BLACKLIST_DISPOSITION' };
+ my ( $level, $disposition ) = @config{'BLACKLIST_LOG_LEVEL', 'BLACKLIST_DISPOSITION' };
my $audit = $disposition =~ /^A_/;
my $target = $disposition eq 'REJECT' ? 'reject' : $disposition;
my $orig_target = $target;
@@ -379,7 +379,7 @@ sub remove_blacklist( $ ) {
sub convert_blacklist() {
my $zones = find_zones_by_option 'blacklist', 'in';
my $zones1 = find_zones_by_option 'blacklist', 'out';
- my ( $level, $disposition ) = @config{'BLACKLIST_LOGLEVEL', 'BLACKLIST_DISPOSITION' };
+ my ( $level, $disposition ) = @config{'BLACKLIST_LOG_LEVEL', 'BLACKLIST_DISPOSITION' };
my $audit = $disposition =~ /^A_/;
my $target = $disposition eq 'REJECT' ? 'reject' : $disposition;
my $orig_target = $target;
@@ -766,7 +766,7 @@ sub add_common_rules ( $ ) {
my @state = state_imatch( $globals{BLACKLIST_STATES} );
my $faststate = $config{RELATED_DISPOSITION} eq 'ACCEPT' && $config{RELATED_LOG_LEVEL} eq '' ? 'ESTABLISHED,RELATED' : 'ESTABLISHED';
- my $level = $config{BLACKLIST_LOGLEVEL};
+ my $level = $config{BLACKLIST_LOG_LEVEL};
my $rejectref = $filter_table->{reject};
if ( $config{DYNAMIC_BLACKLIST} ) {
diff --git a/Shorewall/Perl/Shorewall/Rules.pm b/Shorewall/Perl/Shorewall/Rules.pm
index 5ad8ca608..0d5c878e6 100644
--- a/Shorewall/Perl/Shorewall/Rules.pm
+++ b/Shorewall/Perl/Shorewall/Rules.pm
@@ -3143,7 +3143,7 @@ sub process_rules( $ ) {
if ( $fn ) {
first_entry( sub () {
- my ( $level, $disposition ) = @config{'BLACKLIST_LOGLEVEL', 'BLACKLIST_DISPOSITION' };
+ my ( $level, $disposition ) = @config{'BLACKLIST_LOG_LEVEL', 'BLACKLIST_DISPOSITION' };
my $audit = $disposition =~ /^A_/;
my $target = $disposition eq 'REJECT' ? 'reject' : $disposition;
diff --git a/Shorewall/Samples/Universal/shorewall.conf b/Shorewall/Samples/Universal/shorewall.conf
index b8470fcea..99aa50f0d 100644
--- a/Shorewall/Samples/Universal/shorewall.conf
+++ b/Shorewall/Samples/Universal/shorewall.conf
@@ -21,7 +21,7 @@ VERBOSITY=1
# L O G G I N G
###############################################################################
-BLACKLIST_LOGLEVEL=
+BLACKLIST_LOG_LEVEL=
INVALID_LOG_LEVEL=
diff --git a/Shorewall/Samples/one-interface/shorewall.conf b/Shorewall/Samples/one-interface/shorewall.conf
index ebd806ce7..860d6f746 100644
--- a/Shorewall/Samples/one-interface/shorewall.conf
+++ b/Shorewall/Samples/one-interface/shorewall.conf
@@ -32,7 +32,7 @@ VERBOSITY=1
# L O G G I N G
###############################################################################
-BLACKLIST_LOGLEVEL=
+BLACKLIST_LOG_LEVEL=
INVALID_LOG_LEVEL=
diff --git a/Shorewall/Samples/three-interfaces/shorewall.conf b/Shorewall/Samples/three-interfaces/shorewall.conf
index 46877f93e..25dac6b6d 100644
--- a/Shorewall/Samples/three-interfaces/shorewall.conf
+++ b/Shorewall/Samples/three-interfaces/shorewall.conf
@@ -30,7 +30,7 @@ VERBOSITY=1
# L O G G I N G
###############################################################################
-BLACKLIST_LOGLEVEL=
+BLACKLIST_LOG_LEVEL=
INVALID_LOG_LEVEL=
diff --git a/Shorewall/Samples/two-interfaces/shorewall.conf b/Shorewall/Samples/two-interfaces/shorewall.conf
index 53b74c5b8..49258e0c1 100644
--- a/Shorewall/Samples/two-interfaces/shorewall.conf
+++ b/Shorewall/Samples/two-interfaces/shorewall.conf
@@ -33,7 +33,7 @@ VERBOSITY=1
# L O G G I N G
###############################################################################
-BLACKLIST_LOGLEVEL=
+BLACKLIST_LOG_LEVEL=
INVALID_LOG_LEVEL=
diff --git a/Shorewall/configfiles/shorewall.conf b/Shorewall/configfiles/shorewall.conf
index cc13d51e3..bd8aecef2 100644
--- a/Shorewall/configfiles/shorewall.conf
+++ b/Shorewall/configfiles/shorewall.conf
@@ -21,7 +21,7 @@ VERBOSITY=1
# L O G G I N G
###############################################################################
-BLACKLIST_LOGLEVEL=
+BLACKLIST_LOG_LEVEL=
INVALID_LOG_LEVEL=
diff --git a/Shorewall/manpages/shorewall.conf.xml b/Shorewall/manpages/shorewall.conf.xml
index b8abea340..54b4ecbf1 100644
--- a/Shorewall/manpages/shorewall.conf.xml
+++ b/Shorewall/manpages/shorewall.conf.xml
@@ -422,19 +422,17 @@
BLACKLIST_LOGLEVEL=[log-level]
+ role="bold">BLACKLIST_LOG_LEVEL=[log-level]
- This parameter determines if packets from blacklisted hosts
- are logged and it determines the syslog level that they are to be
- logged at. Its value is a syslog level (Example:
- BLACKLIST_LOGLEVEL=debug). If you do not assign a value or if you
- assign an empty value then packets from blacklisted hosts are not
- logged. The BLACKLIST_LOGLEVEL setting has no effect on entries in
- the BLACKLIST section of shorewall-rules (5). It
- determines the log level of packets sent to the blacklog target of Formerly named BLACKLIST_LOGLEVEL. This parameter determines
+ if packets from blacklisted hosts are logged and it determines the
+ syslog level that they are to be logged at. Its value is a syslog
+ level (Example: BLACKLIST_LOG_LEVEL=debug). If you do not assign a
+ value or if you assign an empty value then packets from blacklisted
+ hosts are not logged. The setting determines the log level of
+ packets sent to the blacklog target
+ of shorewall-blrules(5).
diff --git a/Shorewall6/Samples6/Universal/shorewall6.conf b/Shorewall6/Samples6/Universal/shorewall6.conf
index 48a8df721..0997f2903 100644
--- a/Shorewall6/Samples6/Universal/shorewall6.conf
+++ b/Shorewall6/Samples6/Universal/shorewall6.conf
@@ -22,7 +22,7 @@ VERBOSITY=1
# L O G G I N G
###############################################################################
-BLACKLIST_LOGLEVEL=
+BLACKLIST_LOG_LEVEL=
INVALID_LOG_LEVEL=
diff --git a/Shorewall6/Samples6/one-interface/shorewall6.conf b/Shorewall6/Samples6/one-interface/shorewall6.conf
index 5975448b4..58f4e6e61 100644
--- a/Shorewall6/Samples6/one-interface/shorewall6.conf
+++ b/Shorewall6/Samples6/one-interface/shorewall6.conf
@@ -22,7 +22,7 @@ VERBOSITY=1
# L O G G I N G
###############################################################################
-BLACKLIST_LOGLEVEL=
+BLACKLIST_LOG_LEVEL=
INVALID_LOG_LEVEL=
diff --git a/Shorewall6/Samples6/three-interfaces/shorewall6.conf b/Shorewall6/Samples6/three-interfaces/shorewall6.conf
index 0cb5eaa12..c0c83e13f 100644
--- a/Shorewall6/Samples6/three-interfaces/shorewall6.conf
+++ b/Shorewall6/Samples6/three-interfaces/shorewall6.conf
@@ -22,7 +22,7 @@ VERBOSITY=1
# L O G G I N G
###############################################################################
-BLACKLIST_LOGLEVEL=
+BLACKLIST_LOG_LEVEL=
INVALID_LOG_LEVEL=
diff --git a/Shorewall6/Samples6/two-interfaces/shorewall6.conf b/Shorewall6/Samples6/two-interfaces/shorewall6.conf
index bd57dea15..624b12f3f 100644
--- a/Shorewall6/Samples6/two-interfaces/shorewall6.conf
+++ b/Shorewall6/Samples6/two-interfaces/shorewall6.conf
@@ -22,7 +22,7 @@ VERBOSITY=1
# L O G G I N G
###############################################################################
-BLACKLIST_LOGLEVEL=
+BLACKLIST_LOG_LEVEL=
INVALID_LOG_LEVEL=
diff --git a/Shorewall6/configfiles/shorewall6.conf b/Shorewall6/configfiles/shorewall6.conf
index ca3d2ceeb..d4e2d549c 100644
--- a/Shorewall6/configfiles/shorewall6.conf
+++ b/Shorewall6/configfiles/shorewall6.conf
@@ -22,7 +22,7 @@ VERBOSITY=1
# L O G G I N G
###############################################################################
-BLACKLIST_LOGLEVEL=
+BLACKLIST_LOG_LEVEL=
INVALID_LOG_LEVEL=
diff --git a/Shorewall6/manpages/shorewall6.conf.xml b/Shorewall6/manpages/shorewall6.conf.xml
index ea102d21a..a8f274bb1 100644
--- a/Shorewall6/manpages/shorewall6.conf.xml
+++ b/Shorewall6/manpages/shorewall6.conf.xml
@@ -341,10 +341,7 @@
be dropped or REJECT if the packets are to be replied with an ICMP
port unreachable reply or a TCP RST (tcp only). If you do not assign
a value or if you assign an empty value then DROP is assumed. The
- BLACKLIST_DISPOSITION setting has no effect on entries in the
- BLACKLIST section of shorewall6-rules (5). It
- determines the disposition of packets sent to the blacklog target of shorewall6-blrules(5).
@@ -352,19 +349,17 @@
BLACKLIST_LOGLEVEL=[log-level]
+ role="bold">BLACKLIST_LOG_LEVEL=[log-level]
- This parameter determines if packets from blacklisted hosts
- are logged and it determines the syslog level that they are to be
- logged at. Its value is a syslog level (Example:
- BLACKLIST_LOGLEVEL=debug). If you do not assign a value or if you
- assign an empty value then packets from blacklisted hosts are not
- logged. The BLACKLIST_LOGLEVEL setting has no effect on entries in
- the BLACKLIST section of shorewall6-rules (5). It
- determines the log level of packets sent to the blacklog target of Formerly named BLACKLIST_LOGLEVEL. This parameter determines
+ if packets from blacklisted hosts are logged and it determines the
+ syslog level that they are to be logged at. Its value is a syslog
+ level (Example: BLACKLIST_LOG_LEVEL=debug). If you do not assign a
+ value or if you assign an empty value then packets from blacklisted
+ hosts are not logged. The setting determines the log level of
+ packets sent to the blacklog target
+ of shorewall6-blrules(5).