Beta 4 is now available for testing. Problems Corrected since Beta 3: 1) When logical interface names were used, an entry in tcrules that includes a classid could result in the compiler failing with this Perl diagnostic: Can''t use an undefined value as an ARRAY reference at /usr/share/shorewall/Shorewall/Tc.pm line nnn, <$currentfile> line 20. New Features since Beta 3: 1) It is now possible to use Perl-compatible expressions in ?IF directives. As before, variables must be environmental variables, options from shorewall.conf, shell variables set in the params file or capabilities. As previously, capabilities may be entered with leading ''__'' rather than ''$''. Example: ?IF $BLACKLIST_LOGLEVEL && ! __LOG_OPTIONS 2) The ?ELSIF directive has been added allowing more convenient expression of complex include scenarios. Example (column headings abbreviated to fit release notes format): #NAME NUM MARK DUP INTERFACE GWAY OPTIONS ?IF $FALLBACK ComcastB 1 0x10000 - COMB_IF detect fallback ComcastC 2 0x20000 - COMC_IF detect fallback ?ELSIF $STATISTICAL ComcastB 1 0x10000 - COMB_IF detect load=0.66666667 ComcastC 2 0x20000 - COMC_IF detect load=0.33333333 ?ELSE ComcastB 1 0x10000 - COMB_IF detect balance=2 ComcastC 2 0x20000 - COMC_IF detect loose,balance ?ENDIF 3) And ORIGINAL DEST column has been added to the masq file, allowing SNAT rules to match only DNAT traffic to a particular original source address. Thank you for testing, -Tom -- Tom Eastep \ When I die, I want to go like my Grandfather who Shoreline, \ died peacefully in his sleep. Not screaming like Washington, USA \ all of the passengers in his car http://shorewall.net \________________________________________________ ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today''s security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
Tom Rule: ACCEPT fw dmz tcp 22 - - - -20 produces the following error message: iptables-restore v1.4.14: owner: Bad value for "--uid-owner" option: "-20" Steven. ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today''s security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
On 6/30/12 1:33 PM, Steven Jan Springl wrote:> Rule: > > ACCEPT fw dmz tcp 22 - - - -20 > > produces the following error message: > > iptables-restore v1.4.14: owner: Bad value for "--uid-owner" option: "-20"This patch seems to eliminate the problem. Thanks Steven, -Tom -- Tom Eastep \ When I die, I want to go like my Grandfather who Shoreline, \ died peacefully in his sleep. Not screaming like Washington, USA \ all of the passengers in his car http://shorewall.net \________________________________________________ ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today''s security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
On Saturday 30 Jun 2012 22:45:12 Tom Eastep wrote:> On 6/30/12 1:33 PM, Steven Jan Springl wrote: > > Rule: > > > > ACCEPT fw dmz tcp 22 - - - -20 > > > > produces the following error message: > > > > iptables-restore v1.4.14: owner: Bad value for "--uid-owner" option: > > "-20" > > This patch seems to eliminate the problem. > > Thanks Steven, > -TomTom Confirmed, the patch fixes the issue. Thanks. Steven. ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today''s security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/