Displaying 20 results from an estimated 10000 matches similar to: "Vacation"
2004 Sep 23
0
Fwd: RE: 2.6 kernel ipsec and shorewall
FYI...
---------- Forwarded Message ----------
Subject: RE: [Shorewall-users] 2.6 kernel ipsec and shorewall
Date: Thursday 23 September 2004 07:44
From: "Jonathan Schneider" <jon@clearconcepts.ca>
To: "''Tom Eastep''" <teastep@shorewall.net>
I must have been up too late working on this, looking at it the next day I
noticed I completely forgot
2005 Sep 20
0
Fwd: [PATCH] Another iptables-save buglet
FYI
This bug will prevent ''shorewall restore'' from working if you have "!<single
IP address>" in the ORIGINAL DEST column.
-Tom
---------- Forwarded Message ----------
Subject: [PATCH] Another iptables-save buglet
Date: Wednesday 14 September 2005 15:09
From: Tom Eastep <teastep@shorewall.net>
To: netfilter-devel@lists.netfilter.org
The conntrack
2004 May 02
0
Vacation
I will be at our vacation home until next weekend (probably 5/9). I
trust that those of you who have an understanding of Shorewall will
assist those who don''t...
-Tom
--
Tom Eastep \ Nothing is foolproof to a sufficiently talented fool
Shoreline, \ http://shorewall.net
Washington USA \ teastep@shorewall.net
2004 Sep 29
0
Re: Shorewall-users Digest, Vol 22, Issue 65
Hi
I have 2nic firewall . I had to open some ranges of udp and tcp ports . I
faced a problem that although all the ports are open Some functionality was
not working . Any body used shorewall with H323 Voip traffic DNATed . Any
help is appretiated .
Thanks
----- Original Message -----
From: <shorewall-users-request@lists.shorewall.net>
To: <shorewall-users@lists.shorewall.net>
Sent:
2004 Nov 02
0
Shorewall 2.2.0 Beta 2
http://shorewall.net/pub/shorewall/2.2-Beta/shorewall-2.2.0-Beta2
ftp://shorewall.net/pub/shorewall/2.2-Beta/shorewall-2.2.0-Beta2
Problems Corrected:
1. The "shorewall check" command results in the (harmless) error
message:
/usr/share/shorewall/firewall: line 2753:
check_dupliate_zones: command not found
2. The
2004 Nov 02
3
Shorewall 2.2.0 Beta 2
http://shorewall.net/pub/shorewall/2.2-Beta/shorewall-2.2.0-Beta2
ftp://shorewall.net/pub/shorewall/2.2-Beta/shorewall-2.2.0-Beta2
Problems Corrected:
1. The "shorewall check" command results in the (harmless) error
message:
/usr/share/shorewall/firewall: line 2753:
check_dupliate_zones: command not found
2. The
2004 Sep 27
1
Re: routing between networks on same
Hi Tom,
Thank you for your quick reply.
I aplied changes as you suppose, and now users can
comunicate each with others. - thank you very much.
I have just one aditional question regarding
PKTTYPE=No variable.
I didnt find it in shorewall.conf so I simply add it
at the end of conf file (above #Last line :-) ) So
question is it is standard feature of shorewall, and
from which version it is
2004 Oct 03
0
Shorewall 2.1.10
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
http://shorewall.net/pub/shorewall/2.1/shorewall-2.1.10
ftp://shorewall.net/pub/shorewall/2.1/shorewall-2.1.10
New Features:
1) Using the default LOGFORMAT, chain names longer than 11 characters
(such as in user-defined actions) may result in log prefix
truncation. A new shorewall.conf action LOGTAGONLY has been added
to deal with this
2004 Oct 04
0
2.6 Kernel and Native IPSEC
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
As I announced earlier, I''m on vacation this week and we are spending
the week at our second home. Before I left, I simulated an IPSEC tunnel
between this house and our home in the Seattle area and I''m pleased to
announce that the real tunnel works flawlessly.
So I believe that I have done all of the testing that I can on the new
2004 Sep 08
0
Shorewall-2.1.8
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
http://shorewall.net/pub/shorewall/2.1/shorewall-2.1.8
ftp://shorewall.net/pub/shorewall/2.1/shorewall-2.1.8
New in this release:
1) Shorewall now verifies that your kernel and iptables have physdev
~ match support if BRIDGING=Yes in shorewall.conf.
2) Beginning with this release, if your kernel and iptables have
~ iprange match support
2004 Sep 16
0
Shorewall-2.1.9
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
http://shorewall.net/pub/shorewall/2.1/shorewall-2.1.9
ftp://shorewall.net/pub/shorewall/2.1/shorewall-2.1.9
Problems Corrected:
1) IP ranges in the routestopped and tunnels files now work.
2) Rules where an IP range appears in both the source and destination
~ now work correctly.
3) With complex proxy arp configurations involving two or
2004 Aug 18
0
iptables-save is broken with policy match
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
iptables=save is producing bad output for rules involving policy match.
I''ve checked in a version of /sbin/shorewall to the Shorewall2/ CVS
project that compensates for this bug.
- -Tom
- --
Tom Eastep \ Nothing is foolproof to a sufficiently talented fool
Shoreline, \ http://shorewall.net
Washington USA \ teastep@shorewall.net
PGP
2004 Aug 22
0
Development Releases
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Effective immediately, I will only be announcing new Development
releases on the Development List (shorewall-devel@lists.shorewall.net).
- -Tom
- --
Tom Eastep \ Nothing is foolproof to a sufficiently talented fool
Shoreline, \ http://shorewall.net
Washington USA \ teastep@shorewall.net
PGP Public Key \
2004 Oct 05
0
New Article
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
I''ve written an article that describes the cause of some of the more
frequently seen error and warning messages generated by Shorewall. You
may find the article at http://shorewall.net/ErrorMessages.html.
- -Tom
- --
Tom Eastep \ Nothing is foolproof to a sufficiently talented fool
Shoreline, \ http://shorewall.net
Washington USA \
2004 Oct 24
0
Shorewall 2.2.0 Beta 1
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
The first beta in the 2.2 series is now available. Download location is:
http://shorewall.net/pub/shorewall/2.2-Beta/shorewall-2.2.0-Beta1
ftp://shorewall.net/pub/shorewall/2.2-Beta/shorewall-2.2.0-Beta1
The features available in this release and the migration considerations
are covered in the release notes. Highlights include:
1. The behavior
2004 Oct 25
0
Shorewall 2.0.10
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
http://shorewall.net/pub/shorewall/2.0/shorewall-2.0.10
ftp://shorewall.net/pub/shorewall/2.0/shorewall-2.0.10
Nothing Earth-shattering here and there is no reason to upgrade if you
are not seeing one of the corrected problems.
- -----------------------------------------------------------------------
Problems corrected in version 2.0.10
1) The
2004 Oct 25
0
Problem with 2.0.10
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
The packages that I uploaded earlier were unfortunately incorrect. I
have uploaded the correct packages.
The incorrect md5sums are:
14e8f2bfa08cc5ca2715c8b1179d5eb2 shorewall-2.0.10-1.noarch.rpm
54bcbb2216ad3db9870507cd9716fd99 shorewall-2.0.10.tgz
c2fe0acc7f056acb56d089cf8dafa39a shorwall-2.0.10.lrp
The correct md5sums are:
2004 Sep 30
0
Shorewall 2.0.9
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Problems Corrected in version 2.0.9
1) Previously, an empty PROTO column or a value of "all" in that column
would cause errors when processing the /etc/shorewall/tcrules file.
New Features in version 2.0.9
1) The "shorewall status" command now includes the output of "brctl
show" if the bridge tools are installed.
2004 Aug 19
0
Shorewall 2.1.5
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
http://shorewall.net/pub/shorewall/2.1/shorewall-2.1.5
ftp://shorewall.net/pub/shorewall/2.1/shorewall-2.1.5
This completes the implementation of Kernel 2.6 IPSEC support in Shorewall.
Documentation is still minimal -- see the releasenotes and
http://shorewall.net/IPSEC-2.6.html
- -Tom
- --
Tom Eastep \ Nothing is foolproof to a sufficiently
2004 Aug 23
0
Shorewall 2.0.8 (Stable Release)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
http://shorewall.net/pub/shorewall/2.0/shorewall-2.0.8
ftp://shorewall.net/pub/shorewall/2.0/shorewall-2.0.8
- -Tom
- --
Tom Eastep \ Nothing is foolproof to a sufficiently talented fool
Shoreline, \ http://shorewall.net
Washington USA \ teastep@shorewall.net
PGP Public Key \ https://lists.shorewall.net/teastep.pgp.key
-----BEGIN PGP