On 11/21/12 6:19 PM, "Mr Dash Four" <mr.dash.f...@googlemail.com> wrote:

>
>> I just recalled that 'all' can't be qualified with an ipset name (or
>> anything else for that matter).
>> 
>> Patch attached.
>> 
>> With this patch:
>> 
>> - 'all' places the rule in PREROUTING and in OUTPUT
>> - 'all-' places the rule in PREROUTING
>> - '$FW' places the rule in OUTPUT
>> - All of the above can be qualified with ipsets, addresses, etc.
>The patch works, but there is one *massive* gotcha:
>
>if ipset is used (I assume that would be valid for any other IP
>address/subnet, ports, protocol values specified there as well) then the
>rules generated do not flip the src/dst designators around. For example:
>
>conntrack
>~~~~~~~~~
>DROP all:+baddies-set
>
>will generate 2 set of iptables statements all showing "baddies-set src"
>and not, as what seems the more logical thing, create "baddies-set src"
>for PREROUTING and "baddies-set dst" for OUTPUT, which may not be the
>initial intention. I seem to remember you had a similar arrangement with
>the dhcp option in "interfaces" as well as "routestopped".


You need two entries if you want to drop traffic to/from +baddies-set:

        DROP    all-:+baddies-set       -
        DROP    all                     +baddies+set

So I don't see anything broken here except that I need to add an example
to the manages.

-Tom
You do not need a parachute to skydive. You only need a parachute to
skydive twice.





------------------------------------------------------------------------------
Monitor your physical, virtual and cloud infrastructure from a single
web console. Get in-depth insight into apps, servers, databases, vmware,
SAP, cloud infrastructure, etc. Download 30-day Free Trial.
Pricing starts from $795 for 25 servers or applications!
http://p.sf.net/sfu/zoho_dev2dev_nov
_______________________________________________
Shorewall-devel mailing list
Shorewall-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-devel

Reply via email to