Hi,

Matt Darfeuille schrieb am 22.07.2019 14:00:

> On 7/22/2019 12:39 PM, Timo Sigurdsson wrote:
>> Hi,
>> 
>> some of you may be aware of the new default firewall backend in Debian 10
>> alias Buster, i.e. Buster defaults to nftables and all of xtables programs
>> (iptables, ip6tables, etc.) are merely symlinks to iptables-nft,
>> ip6tables-nft, etc. This means you can use the iptables syntax, but will
>> actually get nftables rules. As I am planning to upgrade my router machine to
>> Debian 10 in the near future, I was wondering whether I should take any
>> precautions prior or during the upgrade with regards to shorewall. I use
>> shorewall in a dual-stack setup with one WAN interface and several LAN-side
>> interfaces and zones.
>> 
> 
> To air on the side of caution, I would test Shorewall and the desired
> configuration using a VM or a chroot when moving away from Iptables and
> report back any issues you might encounter.

so, I went ahead and migrated the first system (a VPN server with a rather 
simple shorewall configuration) to Debian Buster - first in a VM and then the 
actual machine. The transition was quite smooth. I updated the configuration 
files and regenerated the capabilities files for shorewall and shorewall6 - and 
I was good to go. While I haven't done extensive testing against my firewall 
rules yet, everything seems to behave normal. I did intentionally generate 
traffic that violates one of my rules and it was blocked as expected.

I do notice one nice improvement, though. Looking at the generated rules with 
`nft list ruleset`, the output is actually quite easy to read. At least for me, 
it's much easier to understand than the iptables syntax. ;)

I haven't really encountered any issue caused by shorewall or the new nftables 
backend yet. But I did find some kind of race condiion that's new. My DHCPv6 
client on that machine seems to be started too early so it gives up waiting for 
a server (router). If I restart it later, it works fine, so I assume there is a 
race between starting shorewall and the DHCPv6 client (maybe the stoppedrules 
are still active?). For now, I just added a 10 seconds delay to the start of 
the DHCPv6 client which works around the issue. I'll have a look at that later 
again. Anyway that's certainly not an issue the list should be concerned with.


On a sidenote: Does anyone know why the default value for TRACK_PROVIDERS in 
shorewall.conf has changed from No to Yes in Buster (compared to Stretch)? I 
didn't see anything in the docs or changelos that would explain this change. 
But then again, I don't have multiple providers so it probably doesn't make any 
difference in my case.


Cheers,

Timo


_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to