On Mon, 2011-12-05 at 06:37 -0800, Tom Eastep wrote: > On Mon, 2011-12-05 at 09:31 -0500, Neal Thomsen wrote: > > I don;t know then > > > > I just realized that you were referring to Beta 1 -- dynamic > blacklisting definitely looks broken there.
Here's a patch.
patch /usr/share/shorewall/lib.common < DYNAMIC.patch
-Tom
--
Tom Eastep \ When I die, I want to go like my Grandfather who
Shoreline, \ died peacefully in his sleep. Not screaming like
Washington, USA \ all of the passengers in his car
http://shorewall.net \________________________________________________
diff --git a/Shorewall/lib.common b/Shorewall/lib.common
index a3722f5..c518c9e 100644
--- a/Shorewall/lib.common
+++ b/Shorewall/lib.common
@@ -504,7 +504,11 @@ in_network() # $1 = IP address, $2 = CIDR network
#
chain_exists() # $1 = chain name
{
- qt1 $IP6TABLES -L $1 -n
+ if [ $g_family -eq 4 ]; then
+ qt1 $IPTABLES -L $1 -n
+ else
+ qt1 $IP6TABLES -L $1 -n
+ fi
}
#
signature.asc
Description: This is a digitally signed message part
------------------------------------------------------------------------------ All the data continuously generated in your IT infrastructure contains a definitive record of customers, application performance, security threats, fraudulent activity, and more. Splunk takes this data and makes sense of it. IT sense. And common sense. http://p.sf.net/sfu/splunk-novd2d
_______________________________________________ Shorewall-devel mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/shorewall-devel
