We are excited to release new functionality to enable a 1-click import from Google Code onto the Allura platform on SourceForge. You can import tickets, wikis, source, releases, and more with a few simple steps. Read MoreClose
Shorewall 2.4.0 =2D---------------------------------------------------------------------- Problems Corrected since 2.4.0-RC2 1) Previously, "shorewall status" could list the same routing table's contents more than once.=20 =2D---------------------------------------------------------------------- Upgrade Issues when moving to 2.4.0 1) Shorewall now enforces the restriction that mark values used in=20 /etc/shorewall/tcrules are less than 256. If you are using mark values >=3D 256, you must change your configuration before you=20 upgrade. 2) The value "ipp2p" is no longer accepted in the PROTO column of the rules file. This support has never worked as intended and filtering P2P applications this way is a bad idea to begin with (you should be using a proxy). 3) LEAF/Bering packages for version 2.4.0 and later will not be available from shorewall.net. See http://leaf.sf.net for the lastest version of Shorewall for LEAF variants. =2D---------------------------------------------------------------------- New Features in version 2.4.0 1) Shorewall 2.4.0 includes support for multiple internet interfaces to different ISPs.=20 The file /etc/shorewall/providers may be used to define the different providers. It can actually be used to define alternate routing tables so uses like transparent proxy can use the file as well. Columns are: NAME The provider name. NUMBER The provider number -- a number between 1 and 15 MARK A FWMARK value used in your /etc/shorewall/tcrules file to direct packets to this provider. DUPLICATE The name of an existing table to duplicate. May be 'main' or the name of a previous provider. INTERFACE The name of the network interface to the provider. Must be listed in /etc/shorewall/interfaces. GATEWAY The IP address of the provider's gateway router. If you enter "detect" here then Shorewall will attempt to determine the gateway IP address automatically. OPTIONS A comma-separated list selected from the following: track If specified, connections FROM this interface are to be tracked so that responses may be routed back out this same interface. You want specify 'track' if internet hosts will be connecting to local servers through this provider. Because of limitations in the 'ip' utility and policy routing, you may not use the SAVE or RESTORE tcrules options or use connection marking on any traffic to or from this interface. For traffic control purposes, you must mark packets in the FORWARD chain (or better yet, use the CLASSIFY target). balance The providers that have 'balance' specified will get outbound traffic load-balanced among them. By default, all interfaces with 'balance' specified will have the same weight (1). You can change the=20 weight of the route out of the interface by specifiying balance=3D<weight> where <weight> is the desired route weight. Example: You run squid in your DMZ on IP address 192.168.2.99. Your DMZ interface is eth2 #NAME NUMBER MARK DUPLICATE INTERFACE GATEWAY OPTIONS Squid 1 1 - eth2 192.168.2.99 - Use of this feature requires that your kernel and iptables=20 support CONNMARK target and conntrack match support. It does NOT require the ROUTE target extension. WARNING: The current version of iptables (1.3.1) is broken with respect to CONNMARK and iptables-save/iptables-restore. This means that if you configure multiple ISPs, "shorewall restore" will fail. You must patch your iptables using the patch at http://shorewall.net/pub/shorewall/contrib/iptables/CONNMARK.diff. 2) Shorewall 2.3.0 supports the 'cmd-owner' option of the owner match facility in Netfilter. Like all owner match options, 'cmd-owner' may only be applied to traffic that originates on the firewall. The syntax of the USER/GROUP column in the following files has been extended: /etc/shorewall/accounting /etc/shorewall/rules /etc/shorewall/tcrules /usr/share/shorewall/action.template To specify a command, prefix the command name with "+". Examples: +mozilla-bin #The program is named "mozilla-bin" joe+mozilla-bin #The program is named "mozilla-bin" and #is being run by user "joe" joe:users+mozilla-bin #The program is named "mozilla-bin" and #is being run by user "joe" with=20 #effective group "users". Note that this is not a particularly robust feature and I would never advertise it as a "Personal Firewall" equivalent. Using symbolic links, it's easy to alias command names to be anything you want. 3) Support has been added for ipsets (see http://people.netfilter.org/kadlec/ipset/). In most places where a host or network address may be used, you may also use the name of an ipset prefaced by "+".=20 Example: "+Mirrors" The name of the set may be optionally followed by:=20 =20 a) a number from 1 to 6 enclosed in square brackets () -- this number indicates the maximum number of ipset binding levels that=20 are to be matched. Depending on the context where the ipset name=20 is used, either all "src" or all "dst" matches will be used. =20 Example: "+Mirrors" b) a series of "src" and "dst" options separated by commas and inclosed in square brackets (). These will be passed directly to iptables in the generated --set clause. See the ipset documentation for details.=20 Example: "+Mirrors[src,dst,src]" =20 Note that "+Mirrors" used in the SOURCE column of the rules=20 file is equivalent to "+Mirrors[src,src,src,src]". To generate a negative match, prefix the "+" with "!" as in "!+Mirrors". Example 1: Blacklist all hosts in an ipset named "blacklist" /etc/shorewall/blacklist #ADDRESS/SUBNET PROTOCOL PORT +blacklist Example 2: Allow SSH from all hosts in an ipset named "sshok: /etc/shorewall/rules #ACTION SOURCE DEST PROTO DEST PORT(S) ACCEPT +sshok fw tcp 22 Shorewall can automatically capture the contents of your ipsets for you. If you specify SAVE_IPSETS=3DYes in /etc/shorewall/shorewall.conf then "shorewall save" will save the contents of your ipsets. The file where the sets are saved is formed by taking the name where the Shorewall configuration is stored and appending "-ipsets". So if you enter the command "shorewall save standard" then your Shorewall configuration will be saved in /var/lib/shorewall/standard and your ipset contents will be saved in /var/lib/shorewall/standard-ipsets. Assuming the default RESTOREFILE setting, if you just enter "shorewall save" then your Shorewall configuration will be saved in /var/lib/shorewall/restore and your ipset contents will be saved in /var/lib/shorewall/restore-ipsets. Regardless of the setting of SAVE_IPSETS, the "shorewall -f start" and "shorewall restore" commands will restore the ipset contents corresponding to the Shorewall configuration restored provided that the saved Shorewall configuration specified exists. For example, "shorewall restore standard" would restore the ipset contents from /var/lib/shorewall/standard-ipsets provided that /var/lib/shorewall/standard exists and is executable and that /var/lib/shorewall/standard-ipsets exists and is executable. Also regardless of the setting of SAVE_IPSETS, the "shorewall forget" command will purge the saved ipset information (if any) associated with the saved shorewall configuration being removed. You can also associate ipset contents with Shorewall configuration directories using the following command: ipset -S > <config directory>/ipsets Example: ipset -S > /etc/shorewall/ipsets When you start or restart Shorewall (including using the 'try' command) from the configuration directory, your ipsets will be configured from the saved ipsets file. Once again, this behavior is independent of the setting of SAVE_IPSETS. Ipsets are well suited for large blacklists. You can maintain your blacklist using the 'ipset' utility without ever having to restart or refresh Shorewall. If you use the SAVE_IPSETS=3DYes feature just be sure to "shorewall save" after altering the blacklist ipset(s).=20 Example /etc/shorewall/blacklist: #ADDRESS/SUBNET PROTOCOL PORT +Blacklist[src,dst] +Blacklistnets[src,dst] Create the blacklist ipsets using: ipset -N Blacklist iphash ipset -N Blacklistnets nethash Add entries ipset -A Blacklist 220.127.116.11 ipset -A Blacklistnets 18.104.22.168/24 To allow entries for individual ports ipset -N SMTP portmap --from 1 --to 31 ipset -A SMTP 25 ipset -A Blacklist 22.214.171.124 ipset -B Blacklist 126.96.36.199 -b SMTP Now only port 25 will be blocked from 188.8.131.52.=20 4) Shorewall 2.4.0 can now configure routing if your kernel and iptables support the ROUTE target extension. This extension is available in Patch-O-Matic-ng. This feature is *EXPERIMENTAL* since the Netfilter team have no intention of ever releasing the ROUTE target extension to kernel.org. Routing is configured using the /etc/shorewall/routes file. Columns in the file are as follows: SOURCE Source of the packet. May be any of the following: - A host or network address - A network interface name. - The name of an ipset prefaced with "+" - $FW (for packets originating on the firewall) - A MAC address in Shorewall format - A range of IP addresses (assuming that your kernel and iptables support range match) - A network interface name followed by ":" and an address or address range. DEST Destination of the packet. May be any of the following: - A host or network address - A network interface name (determined from routing table(s)) - The name of an ipset prefaced with "+" - A network interface name followed by ":" and an address or address range.=20 PROTO Protocol - Must be "tcp", "udp", "icmp", "ipp2p", a number, or "all". "ipp2p" requires ipp2p match support in your kernel and iptables. PORT(S) Destination Ports. A comma-separated list of Port names (from /etc/services), port numbers or port ranges; if the protocol is "icmp", this column is interpreted as the destination icmp-type(s). If the protocol is ipp2p, this column is interpreted as an ipp2p option without the leading "--" (example "bit" for bit-torrent). If no PORT is given, "ipp2p" is assumed. This column is ignored if PROTOCOL =3D all but must be entered if any of the following field is supplied. In that case, it is suggested that this field contain "-" SOURCE PORT(S) (Optional) Source port(s). If omitted, any source port is acceptable. Specified as a comma-separated list of port names, port numbers or port ranges. TEST Defines a test on the existing packet or connection mark.=20 The rule will match only if the test returns true. Tests have the format [!]<value>[/<mask>][:C] Where: ! Inverts the test (not equal) <value> Value of the packet or connection mark. <mask> A mask to be applied to the mark before testing=20 :C Designates a connection mark. If omitted, the packet mark's value is tested. INTERFACE The interface that the packet is to be routed out of. If you do not specify this field then you must place "-" in this column and enter an IP address in the GATEWAY column. GATEWAY The gateway that the packet is to be forewarded through. 5) Normally when Shorewall is stopped, starting or restarting then=20 connections are allowed from hosts listed in /etc/shorewall/routestopped to the firewall and to other hosts listed in /etc/shorewall/routestopped.=20 A new 'source' option is added for entries in that file which will cause Shorewall to allow traffic from the host listed in the entry to ANY other host. When 'source' is specified in an entry, it is unnecessary to also specify 'routeback'. Similarly, a new 'dest' option is added which will cause Shorewall to allow traffic to the host listed in the entry from ANY other host. When 'source' is specified in an entry, it is unnecessary to also specify 'routeback'. 6) This change was implemented by Lorenzo Martignoni. It provides two new commands: "safe-start" and "safe-restart".=20 safe-start starts Shorewall then prompts you to ask you if everything looks ok. If you answer "no" or if you don't answer within 60 seconds, a "shorewall clear" is executed. safe-restart saves your current configuration to /var/lib/shorewall/safe-restart then issues a "shorewall restart"; It then prompts you to ask if you if you want to accept the new configuration. If you answer "no" or if you don't answer within 60 seconds, the configuration is restored to its prior state. These new commands require either that your /bin/sh supports the "-t" option to the 'read' command or that you have /bin/bash installed.