Shorewall 5.2.1 is now available for download.

Problems Corrected:

1)  This release contains defect repair up through Shorewall 5.2.0.5.

2)  Previously, if:

    a) IP[6]TABLES was not set in shorewall[6].conf; and
    b) The ip[6]tables binary was not found on the PATH.

    then a shell 'not found' error was generated on 'fatal-error'. That
    has been corrected (Matt Darfeuille)

3)  A number of files in the Shorewall-common package have had their
    heading version updated to version 5.2 (Matt Darfeuille).

4)  Previously, if statistical load balancing ('load=<load-factor>' in
    provider OPTIONS) was configured on providers that shared an
    interface, then the compiler would fail with an assertion
    failure. That has been corrected so that this combination now works
    as expected.

5)  Where two or more providers share a network interface, the
    'optional' interface/provider option has never worked correctly.
    Beginning with this release, the 'optional' option is disallowed
    on such interfaces and providers.

6)  Previously, when rate limiting was applied to a DNAT or
    REDIRECT rule, rate limiting was applied to the accompanying
    ACCEPT rule. Since logging is applied in the DNAT/REDIRECT rule, if
    the connection failed the rate limit then the connection attempt
    could be logged twice - once in the nat table and once when the
    applicable policy was applied. Beginning with this release, rate
    limiting is applied to the DNAT/REDIRECT so that no nat-table
    logging occurs if the connection attempt exceeds the rate limit.

7)  Some regular expressions used in Shorewall's Perl code will be
    disallowed by Perl version 5.23. These have been changed to be
    acceptable to that version of Per.

8)  Previously, if SNAT(detect) was used on an optional interface and
    the resulting ip[6]tables rule was unreachable, then invalid shell
    code was generated similar to:

         if [ "$SW_PPP1_ADDRESS" != 0.0.0.0 ]; then
         fi

    That has been corrected such that the above code is not generated
    and a warning message is issued indicating that the rule generated
    no ip[6]tables rule.

New Features:

1)  New macros for IPFS (https://ipfs.io/) have been contributed by
    Răzvan Sandu.

2)  Several new man pages have been added:

    - shorewall-addresses(5) describes specification of addresses in
      shorewall configuration files.

    - shorewall-files(5) describes the shorewall configuration files
      together with features common to multiple files.

    - shorewall-logging(5) describes shorewall's logging facilities.

    - shorewall-names(5) describes restrictions on names used in
      Shorewall configuration files.

    Additional man pages will be included in future 5.2.1 pre-releases.

3)  In the SOURCE and DEST columns, it is now possible to exclude an
    interface by preceding the interface name with '!'. This is useful
    for excluding the loopback interface (lo).

    Example from the mangle file:

        #ACTION         SOURCE          DEST
        DROP:T          127.0.0.0/8     !lo

4)  The MARK, CONNMARK, SAVE and RESTORE commands may now be placed in
    the nat table through used of new chain designators in the mangle
    file:

        NP - nat table PREROUTING chain
        NI - nat table INPUT chain
        NO - nat table OUTPUT chain
        NT - nat table POSTROUTING chain

5)  When TC_EXPERT=Yes, it is now possible to specify any mark/mask
    values that are displayed by the 'show marks' command, including
    the Exclusion and TPROXY values.

6)  The configure and install scripts now support ALT Linux (Alexey
    Shabalin).

7)  The verbosity of the 'remote-*' CLI commands has been increased
    (Matt Darfeuille).

8)  You may now specify a VLSM in the RATE columns of the policy and
    rules files, when per-IP limiting is used. This results in one hash
    table entry per subnet rather than one entry per hosts, and applies
    the limit to the subnet. See shorewall-policy(5) and
    shorewall-rules(5) for details. This provides a means for reducing
    the size of the hash tables.

9)  You man now specify the number of hash table buckets and the
    maximum number of hash table entries in the RATE columns of the
    policy and rules files, when per-IP limiting is used. This allows
    you to increase the size of the tables to more fully handle DDOS
    attacks. See shorewall-policy(5) and shorewall-rules(5) for
    details.

10) Eric Teeter has contributed a macro for Cockpit.

Thank you for using Shorewall,

-Tom
-- 
Tom Eastep        \   Q: What do you get when you cross a mobster with
Shoreline,         \     an international standard?
Washington, USA     \ A: Someone who makes you an offer you can't
http://shorewall.org \   understand
                      \_______________________________________________

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to