On Mon, 2011-12-05 at 06:37 -0800, Tom Eastep wrote:
> On Mon, 2011-12-05 at 09:31 -0500, Neal Thomsen wrote:
> > I don;t know then
> > 
> 
> I just realized that you were referring to Beta 1 -- dynamic
> blacklisting definitely looks broken there.


Here's a patch.

        patch /usr/share/shorewall/lib.common < DYNAMIC.patch

-Tom
-- 
Tom Eastep        \ When I die, I want to go like my Grandfather who
Shoreline,         \ died peacefully in his sleep. Not screaming like
Washington, USA     \ all of the passengers in his car
http://shorewall.net \________________________________________________


diff --git a/Shorewall/lib.common b/Shorewall/lib.common
index a3722f5..c518c9e 100644
--- a/Shorewall/lib.common
+++ b/Shorewall/lib.common
@@ -504,7 +504,11 @@ in_network() # $1 = IP address, $2 = CIDR network
 #
 chain_exists() # $1 = chain name
 {
-    qt1 $IP6TABLES -L $1 -n
+    if [ $g_family -eq 4 ]; then
+	qt1 $IPTABLES -L $1 -n
+    else
+	qt1 $IP6TABLES -L $1 -n
+    fi
 }
 
 #

Attachment: signature.asc
Description: This is a digitally signed message part

------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure 
contains a definitive record of customers, application performance, 
security threats, fraudulent activity, and more. Splunk takes this 
data and makes sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-novd2d
_______________________________________________
Shorewall-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-devel

Reply via email to