* Martin Schulze:

>> > What was the behaviour pre-sarge?
>> > What is the behaviour post-sarge (or rather in sarge)?
>> 
>> Do you mean "before and after the upstream security update"?  The
>> terms pre-sarge/post-sarge do not make much sense to me in this
>> context, I'm afraid.
>
> Ok, so when did the behaviour change?

Upstream's security update changed the behavior, from "vulnerable" to
"non-vulnerable", if you want.

> Which behaviour is documented and hence expected?

Like most software, shorewall comes with no formalized descriptions of
its semantics.  The exact behavior of the MAC verification feature is
not documented because the documentation writer seemd to assume that
it went without saying.  So what goes without saying?  As far as I can
see, something like this: MAC verification is a further restriction
which is performed in addition to the usual filtering rules, and not
intended to replace it.  After all, it's called "verification" and not
"bypass".

So, to answer your question: Users expect that MAC verification never
makes the filter policy less restrictive.  This is not the case if you
set MACLIST_DISPOSITION to ACCEPT or MACLIST_TTL to a non-zero value.

> Which behaviour is experienced by potentially buggy code?

Buggy results?  Sorry, I don't understand this question.

>> (Note that I have yet to test Lorenzo's new package.)
>
> Are you in a position to do so?

Sure, but the question is if you want to rely on the results.  You
don't seem to trust my judgement on this matter, for reasons I don't
know.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to