http://shorewall.net/pub/shorewall/Snapshots
ftp://shorewall.net/pub/shorewall/Snapshots
 
Problems Corrected since version 1.4.6:
 
1) Corrected problem in 1.4.6 where the MANGLE_ENABLED variable was
   being tested before it was set.
 
2) Corrected handling of MAC addresses in the SOURCE column of the
   tcrules file. Previously, these addresses resulted in an invalid
   iptables command.
 
Migration Issues:
 
1) Once you have installed this version of Shorewall, you must
   restart Shorewall before you may use the ''drop'',
''reject'', ''allow''
   or ''save'' commands.
 
2) To maintain strict compatibility with previous versions, current
   uses of "shorewall drop" and "shorewall reject" should be
replaced
   with "shorewall dropall" and "shorewall rejectall".
 
New Features:
 
1) Shorewall now creates a dynamic blacklisting chain for each interface
   defined in /etc/shorewall/interfaces. The ''drop'' and
''reject''
   commands use the routing table to determine which of these chains is
   to be used for blacklisting the specified IP address(es).
 
   Two new commands (''dropall'' and
''rejectall'') have been introduced
   that do what ''drop'' and ''reject'' used to
do; namely, when an address
   is blacklisted using these new commands, it will be blacklisted on
   all of your firewall''s interfaces.
 
2) Thanks to Steve Herber, the help command can now give
   command-specific help.
 
3) The "shorewall stop" command is now disabled when
   /etc/shorewall/startup_disabled exists. This prevents people from
   shooting themselves in the foot prior to having configured
   Shorewall.
 
4) A new option "ADMINISABSENTMINDED" has been added to
   /etc/shorewall/shorewall.conf. For existing users, this option has a 
   default value of "No" in which case Shorewall''s
''stopped'' state
   continues as it has been; namely, in the stopped state only traffic 
   to/from hosts listed in /etc/shorewall/routestopped is accepted.
 
   For new users installing Shorewall for the first time, the default is
   ADUMIISABSENTMINDED=Yes. With that setting, in addition to traffic  
   to/from the hosts listed in /etc/shorewall/routestopped, Shorewall
   will allow:
 
   a) All traffic originating from the firewall itself; and
   b) All traffic that is part of or related to an already-existing
   connection.
 
   In particular, with ADMINISABSENTMINDED=Yes, a "shorewall stop"
   entered through an ssh session will not kill the session.
 
   Note though that it is still possible for people to shoot themselves
   in the foot.
 
   Example:
 
   /etc/shorewall/nat:
 
   206.124.146.178      eth0:0  192.168.1.5
 
   /etc/shorewall/rules:
   ACCEPT       net     loc:192.168.1.5 tcp     22
   ACCEPT       loc     fw              tcp     22
 
   I ssh into 206.124.146.178 which establishes an SSH connection with
   192.168.1.5. I then create a second SSH connection from that
   computer to the firewall and confidently type "shorewall
   stop". As part of stopping, Shorewall removes eth0:0 which kills my
   SSH connection to 192.168.1.5!!!
 
-Tom
-- 
Tom Eastep    \ Shorewall - iptables made easy
Shoreline,     \ http://shorewall.net
Washington USA  \ teastep@shorewall.net