Displaying 20 results from an estimated 8000 matches similar to: "Snapshot 20030623"
2003 Jun 27
0
Snapshot 20030637
Problems Corrected:
1) A problem seen on RH7.3 systems where Shorewall encountered start
errors when started using the "service" mechanism has been worked
around.
2) A problem introduced in earlier snapshots has been corrected. This
problem caused incorrect netfilter rules to be created when the
destination zone in a rule was qualified by an address in CIDR
format.
2003 Jun 29
3
Snapshot 20030629
Problems Corrected:
1) A problem seen on RH7.3 systems where Shorewall encountered start
errors when started using the "service" mechanism has been worked
around.
2) A problem introduced in earlier snapshots has been corrected. This
problem caused incorrect netfilter rules to be created when the
destination zone in a rule was qualified by an address in CIDR
format.
2003 Jul 21
0
Shorewall 1.4.6
Shorewall 1.4.6 is now available. Thanks to Francesca Smith, the 1.4.6
Sample configurations are also available.
The release is currently available at:
http://shorewall.net/pub/shorewall
ftp://shorewall.net/pub/shorewall
It will be available at the other mirrors shortly.
This is a minor release of Shorewall.
Problems Corrected:
1) A problem seen on RH7.3 systems where Shorewall encountered
2003 Jul 04
3
Shorewall 1.4.6 Beta 1
Beta 1 is now available at:
http://shorewall.net/pub/shorewall/testing
ftp://shorewall.net/pub/shorewall/testing
This is a minor release of Shorewall.
Problems Corrected:
1) A problem seen on RH7.3 systems where Shorewall encountered start
errors when started using the "service" mechanism has been worked
around.
2) Where a list of IP addresses appears in the DEST column of a
2003 Jun 22
0
Snapshot 1.4.5_20030621
Problems Corrected:
1) A problem seen on RH7.3 systems where Shorewall encountered start
errors when started using the "service" mechanism has been worked
around.
New Features:
1) A ''newnotsyn'' interface option has been added. This option may be
specified in /etc/shorewall/interfaces and overrides the setting
NEWNOTSYN=No for packets arriving on the
2003 Jun 27
1
More re: Snapshot 20030627
I failed to save the changelog before creating the snapshot -- here it is:
Changes since 1.4.5
1) Worked around RH7.3 "service" anomaly.
2) Implemented ''newnotsyn'' interface option.
3) Document range in masq ADDRESS column and suppress ADD_SNAT_ALIASES
behavior in that case.
4) Enable ADD_SNAT_ALIASES=Yes for SNAT ranges.
5) Allow Shorewall to add aliases to
2003 Mar 25
7
DNAT not working after changing BIND to use views
Hello all:
I''ve got a confusing issue. I had a working shorewall configuration
(based on the two interface model) using DNAT for redirection to my HTTP
server. The HTTP server is on my inside network (I know - bad juju, but
one thing at a time). I changed my configuration this morning to use
views in my BIND (named) configuration. Everyone outside the firewall
is able to get in
2003 Aug 12
1
Shorewall Keeps sending false IP Address Conflict
Dear All,
After installing Shorewall, on a router with 4 NIC, seems running ok.
Next day, when connecting from clients, (MS) we keep getting ip conflict for non-conflicting ip addresses.
Any help is appreciated.
Detals of Startup:
+ shift
+ nolock=
+ ''['' 1 -gt 1 '']''
+ trap ''my_mutex_off; exit 2'' 1 2 3 4 5 6 9
+ command=start
+
2013 Sep 10
4
[Bug 850] New: DNAT applied even after deleting the IP Tables DNAT Rule
https://bugzilla.netfilter.org/show_bug.cgi?id=850
Summary: DNAT applied even after deleting the IP Tables DNAT
Rule
Product: iptables
Version: 1.4.x
Platform: All
OS/Version: All
Status: NEW
Severity: major
Priority: P5
Component: iptables
AssignedTo: netfilter-buglog at
2003 Feb 23
1
RTSP problems (and SNAT questions)
I am having problems making RTSP connections to a Windows Streaming Media
Server (ie "connecting to media...." but WMP never connects). There are no
error messages in /var/log/messages. It was suggested to me that SNAT might
perform better than MASQ in this respect.
I edited my shorewall/masq file as such:
eth0 eth1 12.34.56.78
or should it be?
eth0 10.0.0.0/24
2003 Jun 18
0
Snapshots
I''ve decided to produce snapshots each time that I complete a change to
Shorewall. These snapshots will have undergone initial testing and I
will be running them here at shorewall.net. The snapshots will be
available at:
http://shorewall.net/pub/shorewall/Snapshots
ftp://shorewall.net/pub/shorewall/Snapshots
Snapshots will carry a version number of the form:
<base
2003 Jun 18
0
Snapshots
I''ve decided to produce snapshots each time that I complete a change to
Shorewall. These snapshots will have undergone initial testing and I
will be running them here at shorewall.net. The snapshots will be
available at:
http://shorewall.net/pub/shorewall/Snapshots
ftp://shorewall.net/pub/shorewall/Snapshots
Snapshots will carry a version number of the form:
<base
2004 Aug 28
0
Shorewall 2.1.7
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
In this release:
1) Dynamic Ipsec Zones now work.
2) Output Traffic Accounting by user/group is supported (thanks to
Tuomas Jormola).
3) The following negative test options are added in /etc/shorewall/ipsec
and /etc/shorewall/masq:
reqid!=<number>
spi!=<number>
proto!=esp|ah|ipcomp
mode!=tunnel|transport
2003 Oct 08
2
Problem with /bin/ash
I have /bin/ash from rh8 installation and I have following error when I
tried to change using ash instead of sh with shorewall-1.4.7:
+ eval options=$tap0_options
+ options=
+ list_search newnotsyn
+ local e=newnotsyn
+ [ 1 -gt 1 ]
+ return 1
+ run_user_exit newnotsyn
+ find_file newnotsyn
+ [ -n -a -f /newnotsyn ]
+ echo /etc/shorewall/newnotsyn
+ local user_exit=/etc/shorewall/newnotsyn
+ [
2003 Oct 06
2
Shorewall 1.4.7
Shorewall 1.4.7 is now available at:
http://shorewall.net/pub/shorewall/shorewall-1.4.7
ftp://shorewall.net/pub/shorewall/shorewall-1.4.7
It will be available at your favorite mirror shortly.
The release notes are attached.
As always, many thanks go to Francesca Smith for updating the sample
configurations for this release.
-Tom
--
Tom Eastep \ Nothing is foolproof to a sufficiently
2003 Aug 13
0
Snapshot 1.4.6 20030813
http://shorewall.net/pub/shorewall/Snapshots
ftp://shorewall.net/pub/shorewall/Snapshots
Release Notes are attached
Changes since last Snapshot:
a) The per-interface dynamic blacklisting chains are now displayed by
"shorewall monitor"
b) IP Traffic Accounting support has been added.
c) Rules may now be rate-limited.
d) Bridge interfaces (br[0-9]) may now appear in entries in the
2005 Jun 01
0
SNAT (or MASQUERADING) and DNAT question
Hi,
The private adresses (192.168.254.0/255.255.255.0) of my network are sent
dynamically by dhcp on my network. The dhcp server is on the firewall which
address is 192.168.254.1/255.255.255.255 (this address is static).
I''ve got a rsync server on this network which is on a separe server. His
address is 192.168.254.200/255.255.255.255 (this address is static).
I want that the users
2003 Aug 22
0
Snapshot 20030821
http://shorewall.net/pub/shorewall/Snapshots
ftp://shorewall.net/pub/shorewall/Snapshots
Problems Corrected since version 1.4.6:
1) Corrected problem in 1.4.6 where the MANGLE_ENABLED variable was
being tested before it was set.
2) Corrected handling of MAC addresses in the SOURCE column of the
tcrules file. Previously, these addresses resulted in an invalid
iptables command.
3) The
2003 Mar 28
9
Squid
I''m attempting to setup Squid as shown on:
http://shorewall.sourceforge.net/Shorewall_Squid_Usage.html#DMZ
The firewall is a Bering 1.0 firewall running Shorewall 1.3.11, Red Hat
7.2 on the server in the DMZ. I''m not seeing the requests come in to the
server using tcpdump. The server is 192.168.2.1 connecting to eth2 on the
firewall, the local traffic I''m trying to
2005 Jun 26
1
Re: Shorewall-users Digest, Vol 31, Issue 48
On Friday 24 June 2005 20:57, Derek Vincent wrote:
>>Hello all,
>>
>>I have shorewall setup with 3 SNAT entries for external IP address''s to
>>a single IP internal address. I am wondering how to limit access based
>>on the source IP address.
>>ex.
>> EXT IP 1 access only to port 25
>> EXT IP 2 access only to port 443
>> EXT IP 3