Tom Eastep wrote:
> There actually *is* a way.
>
> Change your interfaces file to look like this:
>
> world   br0             detect          bridge,routeback
> -       br0:eth0        detect
> loc     br0:vnet0       detect
>
> And add a hosts file as follows:
>
> net     eth0:0.0.0.0/0  blacklist
>   


Cool, thanks for your tip I can confirm it to be working.
So which of the two ways is the preferred way, the two interface way
with proxyarp or the bridge way?
I guess as regards to security there's no difference.
What about future versions of shorewall, which way will be "more
compatible"?

If you'd like to include my bridge example in the docs, see below.

Regards
Michael


PS: Here's my setup:
====================================
blacklist
210.107.0.0/17        #"boranet"
....... (long blacklist)
====================================
hosts
net eth0:0.0.0.0/0 blacklist
====================================
interfaces
world br0       detect    bridge,routeback
-     br0:eth0  detect
kvm   br0:vnet0 detect
====================================
policy
kvm net ACCEPT
net all DROP info
all kvm DROP info
all $FW DROP info
$FW all ACCEPT
all             all             REJECT          info
====================================
routestopped
eth0            -
====================================
rules
SSH/ACCEPT      net    $FW
Ping/ACCEPT           net    $FW
SSH/ACCEPT            net     kvm
... lots of other rules
====================================
shorewall.conf
STARTUP_ENABLED=Yes
VERBOSITY=1
SHOREWALL_COMPILER=perl
LOGFILE=/var/log/messages
LOGFORMAT="Shorewall:%s:%s:"
LOGTAGONLY=No
LOGRATE=
LOGBURST=
LOGALLNEW=
BLACKLIST_LOGLEVEL=info
MACLIST_LOG_LEVEL=info
TCP_FLAGS_LOG_LEVEL=info
RFC1918_LOG_LEVEL=info
SMURF_LOG_LEVEL=info
LOG_MARTIANS=keep
IPTABLES=
PATH=/sbin:/bin:/usr/sbin:/usr/bin:/usr/local/bin:/usr/local/sbin
SHOREWALL_SHELL=/bin/sh
SUBSYSLOCK=/var/lock/subsys/shorewall
MODULESDIR=
CONFIG_PATH=/etc/shorewall:/usr/share/shorewall
RESTOREFILE=
IPSECFILE=zones
LOCKFILE=
DROP_DEFAULT="Drop"
REJECT_DEFAULT="Reject"
ACCEPT_DEFAULT="none"
QUEUE_DEFAULT="none"
NFQUEUE_DEFAULT="none"
RSH_COMMAND='ssh ${ro...@${system} ${command}'
RCP_COMMAND='scp ${files} ${ro...@${system}:${destination}'
IP_FORWARDING=On
ADD_IP_ALIASES=Yes
ADD_SNAT_ALIASES=No
RETAIN_ALIASES=No
TC_ENABLED=Internal
TC_EXPERT=No
CLEAR_TC=Yes
MARK_IN_FORWARD_CHAIN=No
CLAMPMSS=No
ROUTE_FILTER=No
DETECT_DNAT_IPADDRS=No
MUTEX_TIMEOUT=60
ADMINISABSENTMINDED=Yes
BLACKLISTNEWONLY=Yes
DELAYBLACKLISTLOAD=No
MODULE_SUFFIX=
DISABLE_IPV6=Yes
BRIDGING=No
DYNAMIC_ZONES=No
PKTTYPE=Yes
RFC1918_STRICT=No
MACLIST_TABLE=filter
MACLIST_TTL=
SAVE_IPSETS=No
MAPOLDACTIONS=No
FASTACCEPT=No
IMPLICIT_CONTINUE=Yes
HIGH_ROUTE_MARKS=No
USE_ACTIONS=Yes
OPTIMIZE=1
EXPORTPARAMS=No
EXPAND_POLICIES=No
EXPAND_POLICIES=Yes
KEEP_RT_TABLES=No
DELETE_THEN_ADD=Yes
MULTICAST=No
DONT_LOAD=
BLACKLIST_DISPOSITION=DROP
MACLIST_DISPOSITION=REJECT
TCP_FLAGS_DISPOSITION=DROP
====================================
zones
fw      firewall
world   ipv4
net:world       bport
kvm:world       bport


------------------------------------------------------------------------------
Open Source Business Conference (OSBC), March 24-25, 2009, San Francisco, CA
-OSBC tackles the biggest issue in open source: Open Sourcing the Enterprise
-Strategies to boost innovation and cut costs with open source participation
-Receive a $600 discount off the registration fee with the source code: SFAD
http://p.sf.net/sfu/XcvMzF8H
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to