-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi Tom;

I see the following (cosmetic?) pb after having updated shorewall(6)
on a LEAF box:

Use of uninitialized value $Shorewall::Config::sillyname in
concatenation (.) or string at
/usr/share/shorewall/Shorewall/Config.pm line 3907.


Note I haven't updated configs, maybe this causes the error messages?

tia
kp

Am 01.05.2013 15:43, schrieb Tom Eastep:
> The Shorewall team is pleased to announce the availability of
> Shorewall 4.5.16.
> 
> ----------------------------------------------------------------------------
>
> 
I.  P R O B L E M S   C O R R E C T E D   I N   T H I S  R E L E A S E
> ----------------------------------------------------------------------------
>
>  1)  Previously, the TOS target and tos match did not work on
> older iptables versions such as 1.3.5 in RHEL5-based distributions.
> That has been corrected. To correct this problem, a new capability
> (New tos Match) was created, so users who utilize a capabilities
> file will need to regenerate the file. This applies to all
> distributions and not just the older ones.
> 
> 2)  A_ACCEPT! is now recognized as a rules ACTION. Previously, it
> was documented in shorewall[6]-rules(5) but was not implemented.
> 
> 3)  Previously, NFACCT accounting rules generated iptables rules
> with the matches in the incorrect order. That caused the counters
> to be incremented before all of the matches had been checked. Now,
> the counter in an NFACCT rule is incremented only if all of the
> other matches have been successful.
> 
> 4)  A number of ipset-related modules were incorrectly included in 
> /usr/share/shorewall/helpers. Those entries have now been removed.
> 
> ----------------------------------------------------------------------------
>
> 
I I.  K N O W N   P R O B L E M S   R E M A I N I N G
> ----------------------------------------------------------------------------
>
>  1)  On systems running Upstart, shorewall-init cannot reliably
> secure the firewall before interfaces are brought up.
> 
> ----------------------------------------------------------------------------
>
> 
I I I.  N E W   F E A T U R E S   I N   T H I S  R E L E A S E
> ----------------------------------------------------------------------------
>
>  1)  A new Shorewall6 interface option, 'accept_ra' has been added.
> The option value may be set as follows:
> 
> 0
> 
> Do not accept Router Advertisements. 1
> 
> Accept Route Advertisements if forwarding is disabled. 2
> 
> Overrule forwarding behavior. Accept Route Advertisements even if
> forwarding is enabled.
> 
> If the option is specified without a value, then value 1 is 
> assumed.
> 
> 2)  Two new macros have been added:
> 
> macro.Xymon contributed by T.J. Yang macro.VRRP contributed by
> James Shubin
> 
> 3)  A new INLINE action has been added. This action allows
> defining arbitrary iptables rules in the blrules and rules files,
> as well as in action and macro bodies.
> 
> The basic form of an INLINE rule is as follows:
> 
> INLINE        <src> <dst> <proto> ... ; <iptables matches and jump>
> 
> The <iptables matches and jump> are added to the rule generated by 
> the contents of the other supplied columns. Given the 'raw' nature 
> of this action, you should examine the rule generated by the entry 
> (e.g., 'shorewall check -r') prior to attempting a 'start' or 
> 'restart' operation.
> 
> Example:
> 
> INLINE  $FW   net   tcp   1234  ; -j SECCTX --name foo
> 
> This entry generates the following:
> 
> -A fw2net -p 6 --dport 1234 -j SECCTX --name foo
> 
> When multiple matches are specified, the compiler will keep them
> in the order in which they appear, but they will not necessarily be
> at the end of the generated rule. For example, if addresses are 
> specified in the SOURCE and/or DEST columns, their generated
> matches will appear after those specified using ';'.
> 
> Note: The following matches will always appear at the front of the 
> rule in the order shown:
> 
> p dport sport icmp-type icmpv6-type s d i o policy state or
> conntrack --ctstate
> 
> As part of this change, a new 'builtin' action type has been
> added. ip[6]tables targets not supported by Shorewall (such as
> 'SECCTX' in the example above), must be defined in your 
> /etc/shorewall[6]/actions file:
> 
> Example:
> 
> SECCTX        builtin
> 
> Such builtin actions may only be used in INLINE action
> invocations; they may not appear in the ACTION column of a rule.
> 
> If you want to use a standard Shorewall-supported action, you can 
> pass it as a parameter to INLINE.
> 
> Example:
> 
> INLINE(ACCEPT) $FW net ; -m foo --bar baz
> 
> Note that if you include a log level with INLINE and do not pass a 
> parameter, Shorewall will automatically assume that the parameter 
> is LOG. That means that you must not specify a log level if you 
> specify your own rule target with '-j'.
> 
> The alternate input format may be used with INLINE, provided that 
> the {....} form of alternate input is used.
> 
> Example:
> 
> INLINE $FW net { owner=teastep } ; -j FOO --bar
> 
> 4)  The INLINE action is also supported in the accounting and
> tcrules files. In the accounting file, INLINE is treated the same
> as COUNT in the with the exception that the freeform iptables
> input following the ';' is appended to any matches generated by
> the column contents. INLINE is treated similarly in the tcrules
> file; that is, the freeform input following ';' must specify the
> rule target, if any. In the accounting and tcrules files, INLINE
> does not accept a parameter.
> 
> 5)  It is now possible to specify HELPERS=none in 
> /etc/shorewall[6]/shorewall[6].conf.
> 
> This setting has two consequences:
> 
> a) All of the *_HELPER capabilities are set to off. b) No probing
> of helpers is performed, thus eliminating "xt_CT: No such helper
> XXX" warnings when the compiler is probing the system for
> capabilities.
> 
> 6)  It is now possible to specify multiple nfacct objects in an
> NFACCT accounting rule. Where previously, the following rules were
> given:
> 
> SECTION INPUT NFACCT(all) NFACCT(all_in)
> 
> SECTION OUTPUT NFACCT(all) NFACCT(all_out)
> 
> SECTION FORWARD NFACCT(all) NFACCT(all_fwd)
> 
> It is now possible to do the same thing as follows:
> 
> SECTION INPUT NFACCT(all,all_in)
> 
> SECTION OUTPUT NFACCT(all,all_out)
> 
> SECTION FORWARD NFACCT(all,all_fwd)
> 
> To allow a nfobject to be incremented unconditionally, you may 
> follow the object name with '!' (e.g., NFACCT(all!)). When '!' is
> omitted, the object is incremented only if all of the rule's 
> matches succeed.
> 
> 7)  It is now possible to increment an nfacct counter when a
> packet matches an ipset. To do that, simplly include the counter
> object's name in parentheses after the ipset specification.
> 
> Examples:
> 
> a)  Increment the mysetcounter nfacct object when a packet's
> source matches myset.
> 
> +myset[src](mysetcounter)
> 
> b)  Increment the mysetcounter1 and mysetcounter2 nfacct objects 
> when a packet's sourcematches myset.
> 
> +myset[src](mysetcounter1,mysetcounter2)
> 
> b)  In an accounting rule, increment the 'all' nfacct object 
> unconditionally and increment the 'mysetcounter' object only if the
> packet source matches myset:
> 
> NFACCT(all!)    -       +myset(mysetcounter)
> 
> 8)  Prior to the availability of BEGIN PERL....END PERL in 
> configuration files, the only way to execute a chain-specific 
> script was to create a script file with the same name as the chain 
> and place it in a directory on the CONFIG_PATH. That facility has 
> the drawback that the compiler will attempt to run a non-script 
> file just because it has the same name as a chain. To disable this 
> facility, a new CHAIN_SCRIPTS option has been added to 
> shorewall[6].conf. The facility is disabled by setting 
> CHAIN_SCRIPTS=No. If not specified or specified as the empty
> value, CHAIN_SCRIPTS=Yes is assumed for backward compatibility.
> 
> Thank you for using Shorewall.
> 
> -Tom
> 
> 
> 
> ------------------------------------------------------------------------------
>
> 
Introducing AppDynamics Lite, a free troubleshooting tool for Java/.NET
> Get 100% visibility into your production application - at no cost. 
> Code-level diagnostics for performance bottlenecks with <2%
> overhead Download for free and get started troubleshooting in
> minutes. http://p.sf.net/sfu/appdyn_d2d_ap1
> 
> 
> 
> _______________________________________________ Shorewall-users
> mailing list [email protected] 
> https://lists.sourceforge.net/lists/listinfo/shorewall-users
> 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAlGBRCIACgkQ4+OaXWTUIwW0ggCfTlZN43j4SOqKv6bUkr4gpObW
th8AoKrnuw30JtPZMWN/0uktD6qzgeve
=yR3Q
-----END PGP SIGNATURE-----

------------------------------------------------------------------------------
Introducing AppDynamics Lite, a free troubleshooting tool for Java/.NET
Get 100% visibility into your production application - at no cost.
Code-level diagnostics for performance bottlenecks with <2% overhead
Download for free and get started troubleshooting in minutes.
http://p.sf.net/sfu/appdyn_d2d_ap1
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to