> 1)  Previously, when a device number was explicitly specified in
>     /etc/shorewall/tcdevices, all unused numbers less than the one
>     specified were unavailable for allocation to following entries that
>     did not specify a number. Now, the compiler selects the lowest
>     unallocated number when no device number is explicitly allocated.
>   
That works.

> 2)  Network developers have discovered an exploit that allows hosts to
>     poke holes in a firewall under some circumstances. The known ways
>     to protect against the exploit are:
>   
How do I know if I am "affected" by this? I have various "routefilter" 
options in my interfaces file (ranging from routefilter to 
routefilter=2). Regardless of whether I have "routefilter" or 
"routefilter=2" shorewall creates a "filter" chain with 0 references in 
it. Don't know why that is or if it is supposed to be this way?

>     FILTER_LOG_LEVEL
>       Specifies the logging level; default is 'info'. To omit
>       logging, specify FILTER_LOG_LEVEL=none.
>   
Have this set as the default (=info)

>     FILTER_DISPOSITION
>       Specifies the disposition. Default is DROP and the possible
>       values are DROP, A_DROP, REJECT and A_REJECT.
>   
Have this set as A_DROP.

> 1)  The new auditing actions and macros introduced in Beta 4 have been
>     renamed by adding an underscore ('_') after the leading A. For
>     example, ADrop is now A_Drop.
>   
That works with the new names.

I also found the following:

1. USE_ACTIONS is not present in the "default" shorewall.conf (the one 
supplied with either the source or the rpm file) - it needs to be added.
2. There is a syntax error in man shorewall.conf (LEGACY_FASTSTART 
section) - "/etc/shorewall are compare with " should be "/etc/shorewall 
are compared with "
3. The following problem which I reported in Beta4 is still there - 
A_ACCEPT, A_DROP and/or A_REJECT assume comments from the first action 
(normally in Drop and Reject) which calls them, which is wrong. Example:

If I have A_AllowICMPs, Auth(A_REJECT) and A_DropUPnP in my Drop action 
the following chains are produced by shorewall:

Chain A_ACCEPT (4 references)
 pkts bytes target prot opt in out source destination         
 0 0 AUDIT all -- * * 0.0.0.0/0 0.0.0.0/0 /* Needed ICMP types */  AUDIT 
accept
 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 /* Needed ICMP types */

Chain A_DROP (9 references)
 pkts bytes target prot opt in out source destination         
 0 0 AUDIT all -- * * 0.0.0.0/0 0.0.0.0/0 /* UPnP */  AUDIT drop
  0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 /* UPnP */

Chain A_REJECT (2 references)
 pkts bytes target prot opt in out source destination         
 0 0 AUDIT all -- * * 0.0.0.0/0 0.0.0.0/0 /* Auth */  AUDIT reject
 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0 [goto] /* Auth */

The comments of which are, of course, utter nonsense! These should not 
be there at all!

4. Not a bug, but a suggestion.

Every time I upgrade shorewall I am spending time executing diff and 
peeling my eyes out to see what new options have been introduced and 
what options, if any, have been deprecated. This exercise is very much 
prone to errors and I believe there is a simpler and better solution to 
this, which could be done "automagically" without much fuss.

- Create (and distribute) shorewall.conf.default, which contains all 
shorewall.conf options with their default values for the current 
shorewall version being distributed;

- Create (and distribute) shorewall.conf.template which also contains 
all available options for the shorewall version being distributed, but 
lists their "values" in the following manner:
USE_ACTIONS=$USE_ACTIONS
LEGACY_FASTSTART=$LEGACY_FASTSTART
...

- Create a shell script which:
1). simply reads shorewall.conf.default as a shell source, so that all 
"variables" listed there are "defined" and have their values loaded up.
2). check to see if shorewall.conf exists (from a previous shorewall 
version perhaps) and if that is the case read this file also as a shell 
source, so that the variables previously "defined" in 
shorewall.conf.default get overwritten from the existing shorewall.conf
3). use shorewall.conf.template to output all shorewall.conf variables 
with their values and redirect this output to shorewall.conf

- Job done and I don't have to spend any more time diff-ing old and new 
shorewall configs ever!


------------------------------------------------------------------------------
vRanger cuts backup time in half-while increasing security.
With the market-leading solution for virtual backup and recovery, 
you get blazing-fast, flexible, and affordable data protection.
Download your free trial now. 
http://p.sf.net/sfu/quest-d2dcopy1
_______________________________________________
Shorewall-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-devel

Reply via email to