Tom Eastep
2007-Dec-07 00:26 UTC
Shorewall 4.1.2 resent (without a mangled release notes extract)
Shorewall 4.1.2 is now available for testing. http://www1.shorewall.net/pub/shorewall/development/4.1/shorewall-4.1.2/ ftp://ftp1.shorewall.net/pub/shorewall/development/4.1/shorewall-4.1.2/ Problems corrected in Shorewall 4.1.2. 1) If any of the following files was missing, a harmless Perl warning was issued: accounting maclist masq nat netmap rfc1918 routestopped tunnels This problem was experienced mostly by Debian users and users of Debian derivatives such as Ubuntu. 2) The iptables utility doesn''t retry operations that fail due to resource shortage. Beginning with this release, Shorewall reruns iptables when such a failure occurs. 3) Previously, Shorewall-perl did not accept log levels in upper case (e.g., INFO). Log levels are treated in a case-insensitive manner by Shorewall-perl. 4) The column headers in macro files were not aligned. This has been corrected, along with some inaccuracies in the macro.template file. 5) The shorewall.conf files in the Samples did not contain some recently-defined options. They are now up to date. 6) The names of the Jabber macros were shuffled. They are now named correctly. Other changes in Shorewall 4.1.2. 1) Shorewall 4.1.2 contains enhanced operational logging capabilities through a set of related enhancements to Shorewall-common and Shorewall-perl. The enhancements are not supported by Shorewall-shell nor are they supported by Shorewall-lite except when the script is compiled using Shorewall-perl. a) The STARTUP_LOG option in /etc/shorewall/shorewall.conf gives the name of the Shorewall operational log. The log will be created if it does not exist. b) The LOG_VERBOSITY option in /etc/shorewall/shorewall.conf gives the verbosity at which logging will occur. It uses the same value range as VERBOSITY: -1 Do not log 0 Almost quiet 1 Only major steps 2 Verbose c) An absolute VERBOSITY may be specified on the command line using the -v option followed by -1,0,1 or 2. Example: shorewall -v2 check d) The /etc/init.d/shorewall script supplied with the shorewall.net packages sets ''-v0'' as the default. This may be overridden with the OPTIONS setting in /etc/defaults/shorewall or /etc/sysconfig/shorewall. Logging occurs on both Shorewall-perl and the generated script when the following commands are issued: start restart refresh Messages in the log are always timestamped. This change implemented two new options to the Shorewall-perl compiler (/usr/share/shorewall-perl/compiler.pl). --log=<logfile> --log_verbosity={-1|0-2} The --log option is ignored when --log_verbosity is not supplied or is supplied with value -1. To avoid a proliferation of parameters to Shorewall::Compiler::compile(), that function has been changed to use named parameters. Parameter names are: object Object file. If omitted or '''', the configuration is syntax checked. directory Directory. If omitted or '''', configuration files are located using CONFIG_PATH. Otherwise, the directory named by this parameter is searched first. verbosity Verbosity; range -1 to 2 timestamp 0|1 -- timestamp messages. debug 0|1 -- include stack trace in warning/error messages. export 0|1 -- compile for export. chains List of chains to be reloaded by ''refresh''. log File to log compiler messages to. log_verbosity Log Verbosity; range -1 to 2. Those parameters that are supplied must have defined values. Defaults are: object '''' (''check'' command) directory '''' verbosity 1 timestamp 0 debug 0 export 0 chains '''' log '''' log_verbosity -1 Example: use lib ''/usr/share/shorewall-perl/''; use Shorewall::Compiler; compiler( object => ''/root/firewall'', log => ''/root/compile.log'', log_verbosity => 2 ); 2) Previously, when HIGH_ROUTE_MARKS=Yes, Shorewall allowed non-zero mark values < 256 to be assigned in the OUTPUT chain. This has been changed so that only high mark values may be assigned there. Packet marking rules for traffic shaping of packets originating on the firewall must be coded in the POSTROUTING table. 3) Previously, Shorewall did not range-check the value of the VERBOSITY option in shorewall.conf. Beginning with Shorewall 4.1.2: a) A VERBOSITY setting outside the range -1 through 2 is rejected. b) After the -v and -q options are applied, the resulting value is adjusted to fall within the range -1 through 2. 4) The tcdevices file has been extended to include an OPTIONS column. Currently only a single option is defined. classify When specified, you must use explicit CLASSIFY tcrules to classify traffic by class. Shorewall will not create any CLASSIFY rules to classify traffic by mark value. The ''classify'' option should be specified when you want to do all classification using CLASSIFY tcrules. Because CLASSIFY is not a terminating target, every packet passes through all CLASSIFY rules. ''classify'' can prevent packets from having to pass through useless additional rules. Example: /etc/shorewall/tcdevices #INTERFACE IN-BANDWITH OUT-BANDWIDTH OPTIONS $EXT_IF 1300kbit 384kbit classify /etc/shorewall/tcclasses #INTERFACE MARK RATE CEIL PRIORITY OPTIONS $EXT_IF 10 5*full/10 full 1 tcp-ack,tos-minimize-delay $EXT_IF 20 2*full/10 6*full/10 2 default $EXT_IF 30 2*full/10 6*full/10 3 /etc/shorewall/tcrules #MARK SOURCE DEST PROTO PORT(S) SOURCE # PORT(S) 1:110 192.168.0.0/22 $EXT_IF 1:130 206.124.146.177 $EXT_IF tcp - 873 This example shows my own simple traffic shaping configuration. I have three classes; one for traffic from our local network, one for rsync from the master shorewall.net server, and one for all other DMZ traffic. I use CLASSIFY rules to assign traffic to the first and third class and let the rest default to the second class. 5) COMMENT lines are now supported in macro bodies by Shorewall-perl and are ignored by the Shorewall-shell compiler. The standard macros (with the exception of macro.Drop and macro.Reject) have been modified to include a COMMENT line describing the macro. COMMENT lines in macros work slightly differently from COMMENT lines in other files. COMMENT lines in macros are ignored if COMMENT support is not available or if there was a COMMENT in use when the top-level macro was invoked. This allows the following: /usr/share/shorewall/macro.SSH: #ACTION SOURCE PROTO DEST SOURCE RATE USER/ # PORT(S) PORT(S) LIMIT GROUP COMMENT SSH PARAM - - tcp 22 /etc/shorewall/rules: COMMENT Allow SSH from home SSH/ALLOW net:$MYIP $FW COMMENT The comment line in macro.SSH will not override the COMMENT line in the rules file and the generated rule will show /* Allow SSH from home */ when displayed through the Shorewall show and dump commands. Thank you for testing, -Tom -- Tom Eastep \ Nothing is foolproof to a sufficiently talented fool Shoreline, \ http://shorewall.net Washington USA \ teastep@shorewall.net PGP Public Key \ https://lists.shorewall.net/teastep.pgp.key ------------------------------------------------------------------------- SF.Net email is sponsored by: Check out the new SourceForge.net Marketplace. It''s the best place to buy or sell services for just about anything Open Source. http://sourceforge.net/services/buy/index.php
Steven Jan Springl
2007-Dec-07 02:01 UTC
Re: Shorewall 4.1.2 resent (without a mangled release notes extract)
On Friday 07 December 2007 00:26, Tom Eastep wrote:> Shorewall 4.1.2 is now available for testing.Tom Rule: ACCEPT:NFLOG(1,2,3) lan brd tcp 22 when compile with shorewall-perl generates the following iptables rule: A lan2brd -p 6 --dport 22 -j NFLOG --NFLOG-GROUP 1 --NFLOG-RANGE 2 --NFLOG-THRESHOLD 3 --nflog-prefix "Shorewall:lan2brd:ACCEPT:" which produces the following error message: iptables-restore v1.4.0rc1: Unknown arg `--NFLOG-GROUP'' Steven. ------------------------------------------------------------------------- SF.Net email is sponsored by: Check out the new SourceForge.net Marketplace. It''s the best place to buy or sell services for just about anything Open Source. http://sourceforge.net/services/buy/index.php
Paul Gear
2007-Dec-07 04:38 UTC
Re: Shorewall 4.1.2 resent (without a mangled release notes extract)
Steven Jan Springl wrote:> On Friday 07 December 2007 00:26, Tom Eastep wrote: >> Shorewall 4.1.2 is now available for testing.Hi Steven, Do you have a test suite you''re running this through, or do you just test this on your own firewall? -- Paul <http://paul.gear.dyndns.org> -- Did you know? Many viruses specifically target Microsoft Outlook and Outlook Express. You can help to keep your computer free of viruses by using one of the more secure alternatives from <http://mozilla.org>. ------------------------------------------------------------------------- SF.Net email is sponsored by: Check out the new SourceForge.net Marketplace. It''s the best place to buy or sell services for just about anything Open Source. http://sourceforge.net/services/buy/index.php
Tom Eastep
2007-Dec-07 05:35 UTC
Re: Shorewall 4.1.2 resent (without a mangled release notes extract)
Steven Jan Springl wrote:> On Friday 07 December 2007 00:26, Tom Eastep wrote: >> Shorewall 4.1.2 is now available for testing. > > Tom > > Rule: > ACCEPT:NFLOG(1,2,3) lan brd tcp 22 > > when compile with shorewall-perl generates the following iptables rule: > > A lan2brd -p 6 --dport 22 -j NFLOG --NFLOG-GROUP 1 --NFLOG-RANGE > 2 --NFLOG-THRESHOLD 3 --nflog-prefix "Shorewall:lan2brd:ACCEPT:" >Drat -- I knew I should have retested after that last "can''t fail" one-line change.... Patch attached... -Tom -- Tom Eastep \ Nothing is foolproof to a sufficiently talented fool Shoreline, \ http://shorewall.net Washington USA \ teastep@shorewall.net PGP Public Key \ https://lists.shorewall.net/teastep.pgp.key ------------------------------------------------------------------------- SF.Net email is sponsored by: Check out the new SourceForge.net Marketplace. It''s the best place to buy or sell services for just about anything Open Source. http://sourceforge.net/services/buy/index.php
Steven Jan Springl
2007-Dec-07 13:24 UTC
Re: Shorewall 4.1.2 resent (without a mangled release notes extract)
On Friday 07 December 2007 04:38, Paul Gear wrote:> Steven Jan Springl wrote: > > On Friday 07 December 2007 00:26, Tom Eastep wrote: > >> Shorewall 4.1.2 is now available for testing. > > Hi Steven, > > Do you have a test suite you''re running this through, or do you just > test this on your own firewall? > > -- > Paul > <http://paul.gear.dyndns.org>Paul I have a PC just for Shorewall testing. It runs Debian Etch with the latest test versions on the kernel, iptables and Shorewall. The Shorewall configuration that I use for testing is a ''nonesense'' configuration that generally contains entries that test the latest features only. As it is not possible for me to test some of the features such as multiple providers, I limit my testing to trying to break Shorewall, rather than prove that features work. I always start my testing by using the configuration from the previous test release. I have attached my latest test configuration (it breaks Shorewall). Steven. ------------------------------------------------------------------------- SF.Net email is sponsored by: Check out the new SourceForge.net Marketplace. It''s the best place to buy or sell services for just about anything Open Source. http://sourceforge.net/services/buy/index.php
Steven Jan Springl
2007-Dec-07 14:42 UTC
Re: Shorewall 4.1.2 resent (without a mangled release notes extract)
On Friday 07 December 2007 00:26, Tom Eastep wrote:> Shorewall 4.1.2 is now available for testing.Tom shorewall.conf entry: STARTUP_LOG=/var/log/sjs produces the following error: /sbin/shorewall: line 241: =2: command not found Steven. ------------------------------------------------------------------------- SF.Net email is sponsored by: Check out the new SourceForge.net Marketplace. It''s the best place to buy or sell services for just about anything Open Source. http://sourceforge.net/services/buy/index.php
Tom Eastep
2007-Dec-07 15:11 UTC
Re: Shorewall 4.1.2 resent (without a mangled release notes extract)
Steven Jan Springl wrote:> On Friday 07 December 2007 00:26, Tom Eastep wrote: >> Shorewall 4.1.2 is now available for testing. > > Tom > > shorewall.conf entry: > > STARTUP_LOG=/var/log/sjs > > produces the following error: > > /sbin/shorewall: line 241: =2: command not found >Steven, The error occurs only when STARTUP_LOG is specified without LOG_VERBOSITY. Patch attached. -Tom -- Tom Eastep \ Nothing is foolproof to a sufficiently talented fool Shoreline, \ http://shorewall.net Washington USA \ teastep@shorewall.net PGP Public Key \ https://lists.shorewall.net/teastep.pgp.key ------------------------------------------------------------------------- SF.Net email is sponsored by: Check out the new SourceForge.net Marketplace. It''s the best place to buy or sell services for just about anything Open Source. http://sourceforge.net/services/buy/index.php
Steven Jan Springl
2007-Dec-07 15:59 UTC
Re: Shorewall 4.1.2 resent (without a mangled release notes extract)
On Friday 07 December 2007 00:26, Tom Eastep wrote:> Shorewall 4.1.2 is now available for testing.Tom If LOG_VERBOSITY=2 is specified and STARTUP_LOG is not specified, the following messages are produced: /var/lib/shorewall/.start: line 66: $STARTUP_LOG: ambiguous redirect Starting Shorewall.... /var/lib/shorewall/.start: line 81: $STARTUP_LOG: ambiguous redirect Initializing... /var/lib/shorewall/.start: line 66: $STARTUP_LOG: ambiguous redirect /var/lib/shorewall/.start: line 51: $STARTUP_LOG: ambiguous redirect Processing /etc/shorewall/init ... /var/lib/shorewall/.start: line 66: $STARTUP_LOG: ambiguous redirect Setting up ARP filtering... /var/lib/shorewall/.start: line 66: $STARTUP_LOG: ambiguous redirect Setting up Route Filtering... /var/lib/shorewall/.start: line 66: $STARTUP_LOG: ambiguous redirect Setting up Martian Logging... /var/lib/shorewall/.start: line 66: $STARTUP_LOG: ambiguous redirect Setting up Accept Source Routing... /var/lib/shorewall/.start: line 66: $STARTUP_LOG: ambiguous redirect Setting up Proxy ARP... /var/lib/shorewall/.start: line 66: $STARTUP_LOG: ambiguous redirect Setting up Traffic Control... /var/lib/shorewall/.start: line 66: $STARTUP_LOG: ambiguous redirect Preparing iptables-restore input... /var/lib/shorewall/.start: line 66: $STARTUP_LOG: ambiguous redirect Running /usr/local/sbin/iptables-restore... /var/lib/shorewall/.start: line 66: $STARTUP_LOG: ambiguous redirect Processing /etc/shorewall/start ... /var/lib/shorewall/.start: line 66: $STARTUP_LOG: ambiguous redirect Processing /etc/shorewall/started ... /var/lib/shorewall/.start: line 66: $STARTUP_LOG: ambiguous redirect done. /var/lib/shorewall/.start: line 81: $STARTUP_LOG: ambiguous redirect Steven. ------------------------------------------------------------------------- SF.Net email is sponsored by: Check out the new SourceForge.net Marketplace. It''s the best place to buy or sell services for just about anything Open Source. http://sourceforge.net/services/buy/index.php
Tom Eastep
2007-Dec-07 16:30 UTC
Re: Shorewall 4.1.2 resent (without a mangled release notes extract)
Steven Jan Springl wrote:> On Friday 07 December 2007 00:26, Tom Eastep wrote: >> Shorewall 4.1.2 is now available for testing. > > Tom > > If LOG_VERBOSITY=2 is specified and STARTUP_LOG is not specified, > the following messages are produced: >Steven, Please try the attached patch. I got different symtoms than you did but it''s probably because we are using different shells. Thanks, -Tom -- Tom Eastep \ Nothing is foolproof to a sufficiently talented fool Shoreline, \ http://shorewall.net Washington USA \ teastep@shorewall.net PGP Public Key \ https://lists.shorewall.net/teastep.pgp.key ------------------------------------------------------------------------- SF.Net email is sponsored by: Check out the new SourceForge.net Marketplace. It''s the best place to buy or sell services for just about anything Open Source. http://sourceforge.net/services/buy/index.php
Steven Jan Springl
2007-Dec-07 17:00 UTC
Re: Shorewall 4.1.2 resent (without a mangled release notes extract)
On Friday 07 December 2007 16:30, Tom Eastep wrote:> Steven Jan Springl wrote: > > On Friday 07 December 2007 00:26, Tom Eastep wrote: > >> Shorewall 4.1.2 is now available for testing. > > > > Tom > > > > If LOG_VERBOSITY=2 is specified and STARTUP_LOG is not specified, > > the following messages are produced: > > Steven, > > Please try the attached patch. I got different symtoms than you did but > it''s probably because we are using different shells. > > Thanks, > -TomTom The patch works. Steven. ------------------------------------------------------------------------- SF.Net email is sponsored by: Check out the new SourceForge.net Marketplace. It''s the best place to buy or sell services for just about anything Open Source. http://sourceforge.net/services/buy/index.php
Tom Eastep
2007-Dec-07 17:03 UTC
Re: Shorewall 4.1.2 resent (without a mangled release notes extract)
Steven Jan Springl wrote:> On Friday 07 December 2007 16:30, Tom Eastep wrote:>> Please try the attached patch. I got different symptoms than you did but >> it''s probably because we are using different shells.> The patch works.Thanks, Steven -Tom -- Tom Eastep \ Nothing is foolproof to a sufficiently talented fool Shoreline, \ http://shorewall.net Washington USA \ teastep@shorewall.net PGP Public Key \ https://lists.shorewall.net/teastep.pgp.key ------------------------------------------------------------------------- SF.Net email is sponsored by: Check out the new SourceForge.net Marketplace. It''s the best place to buy or sell services for just about anything Open Source. http://sourceforge.net/services/buy/index.php
Steven Jan Springl
2007-Dec-08 16:38 UTC
Re: Shorewall 4.1.2 resent (without a mangled release notes extract)
On Friday 07 December 2007 00:26, Tom Eastep wrote:> Shorewall 4.1.2 is now available for testing. >Tom I am getting the following error from the Shorewall shell compiler: Checking... Initializing... Determining Zones... IPv4 Zones: lan Firewall Zone: fw Validating interfaces file... Validating hosts file... Pre-processing Actions... Pre-processing /usr/share/shorewall/action.Drop... /usr/share/shorewall-shell/lib.actions: line 646: [: eq: binary operator expected ERROR: Invalid TARGET in rule "COMMENT Auth " Steven. ------------------------------------------------------------------------- SF.Net email is sponsored by: Check out the new SourceForge.net Marketplace. It''s the best place to buy or sell services for just about anything Open Source. http://sourceforge.net/services/buy/index.php
Tom Eastep
2007-Dec-08 16:45 UTC
Re: Shorewall 4.1.2 resent (without a mangled release notes extract)
Steven Jan Springl wrote:> On Friday 07 December 2007 00:26, Tom Eastep wrote: >> Shorewall 4.1.2 is now available for testing. >> > Tom > > I am getting the following error from the Shorewall shell compiler: > > Checking... > Initializing... > Determining Zones... > IPv4 Zones: lan > Firewall Zone: fw > Validating interfaces file... > Validating hosts file... > Pre-processing Actions... > Pre-processing /usr/share/shorewall/action.Drop... > /usr/share/shorewall-shell/lib.actions: line 646: [: eq: binary operator > expected > ERROR: Invalid TARGET in rule "COMMENT Auth "Grrrr -- using Perl syntax in a shell program works poorly. Patch attached, -Tom -- Tom Eastep \ Nothing is foolproof to a sufficiently talented fool Shoreline, \ http://shorewall.net Washington USA \ teastep@shorewall.net PGP Public Key \ https://lists.shorewall.net/teastep.pgp.key ------------------------------------------------------------------------- SF.Net email is sponsored by: Check out the new SourceForge.net Marketplace. It''s the best place to buy or sell services for just about anything Open Source. http://sourceforge.net/services/buy/index.php
Steven Jan Springl
2007-Dec-08 17:12 UTC
Re: Shorewall 4.1.2 resent (without a mangled release notes extract)
On Friday 07 December 2007 00:26, Tom Eastep wrote:> Shorewall 4.1.2 is now available for testing.Tom; Nat entry: 10.1.1.1 eth0: 192.168.12.1 When compiled with Shorewall-perl, 10.1.1.1 is added as an alias to eth0. When compiled with Shorewall-shell it is not added as an alias. Having read the shorewall-nat man page, I was not expecting the alias to be added. ADD_IP_ALIASES=Yes is set in shorewall.conf Steven. ------------------------------------------------------------------------- SF.Net email is sponsored by: Check out the new SourceForge.net Marketplace. It''s the best place to buy or sell services for just about anything Open Source. http://sourceforge.net/services/buy/index.php
Tom Eastep
2007-Dec-08 17:36 UTC
Re: Shorewall 4.1.2 resent (without a mangled release notes extract)
Steven Jan Springl wrote:> On Friday 07 December 2007 00:26, Tom Eastep wrote: >> Shorewall 4.1.2 is now available for testing. > > Tom; > > Nat entry: > > 10.1.1.1 eth0: 192.168.12.1 > > When compiled with Shorewall-perl, 10.1.1.1 is added as an alias to eth0. > When compiled with Shorewall-shell it is not added as an alias. > > Having read the shorewall-nat man page, I was not expecting the alias to be > added. > > ADD_IP_ALIASES=Yes is set in shorewall.confThis problem also occurs in 4.0.6. Patch attached. -Tom -- Tom Eastep \ Nothing is foolproof to a sufficiently talented fool Shoreline, \ http://shorewall.net Washington USA \ teastep@shorewall.net PGP Public Key \ https://lists.shorewall.net/teastep.pgp.key ------------------------------------------------------------------------- SF.Net email is sponsored by: Check out the new SourceForge.net Marketplace. It''s the best place to buy or sell services for just about anything Open Source. http://sourceforge.net/services/buy/index.php