On Sunday 11 Dec 2011 23:23:20 Tom Eastep wrote:
>
> I'm unable to reproduce this failure; my kernel doesn't support
> AUDIT_TARGET but the rest are detected properly.
>
> Please look at the code in detect_capabilities() (lib.cli) and try one
> of the failing cases manually. If that works, then I'd like to see
> traces of the command on both releases.
>
> Thanks,
> -Tom
Tom
I have attached traces for both releases.
From the traces it seems that 4.4.27 is using /sbin/iptables instead of
/usr/local/sbin/iptables.
I have also attached a copy of my shorewall.conf.
Steven.
+ [ 1 -gt 1 ]
+ determine_capabilities
+ [ -n /usr/local/sbin/iptables ]
+ [ -z /usr/local/sbin/iptables ]
+ [ ip = ip -o -z ip ]
+ which ip
+ IP=/sbin/ip
+ [ -n /sbin/ip -a -x /sbin/ip ]
+ [ tc = tc -o -z tc ]
+ which tc
+ TC=/sbin/tc
+ [ -n /sbin/tc -a -x /sbin/tc ]
+ qt /usr/local/sbin/iptables -t nat -L -n
+ /usr/local/sbin/iptables -t nat -L -n
+ NAT_ENABLED=Yes
+ qt /usr/local/sbin/iptables -t mangle -L -n
+ /usr/local/sbin/iptables -t mangle -L -n
+ MANGLE_ENABLED=Yes
+ CONNTRACK_MATCH=
+ NEW_CONNTRACK_MATCH=
+ OLD_CONNTRACK_MATCH=
+ MULTIPORT=
+ XMULTIPORT=
+ POLICY_MATCH=
+ PHYSDEV_MATCH=
+ PHYSDEV_BRIDGE=
+ IPRANGE_MATCH=
+ RECENT_MATCH=
+ OWNER_MATCH=
+ IPSET_MATCH=
+ OLD_IPSET_MATCH=
+ IPSET_V5=
+ CONNMARK=
+ XCONNMARK=
+ CONNMARK_MATCH=
+ XCONNMARK_MATCH=
+ RAW_TABLE=
+ RAWPOST_TABLE=
+ IPP2P_MATCH=
+ OLD_IPP2P_MATCH=
+ LENGTH_MATCH=
+ CLASSIFY_TARGET=
+ ENHANCED_REJECT=
+ USEPKTTYPE=
+ KLUDGEFREE=
+ MARK=
+ XMARK=
+ EXMARK=
+ TPROXY_TARGET=
+ MANGLE_FORWARD=
+ COMMENTS=
+ ADDRTYPE=
+ TCPMSS_MATCH=
+ HASHLIMIT_MATCH=
+ NFQUEUE_TARGET=
+ REALM_MATCH=
+ HELPER_MATCH=
+ CONNLIMIT_MATCH=
+ TIME_MATCH=
+ GOTO_TARGET=
+ LOGMARK_TARGET=
+ IPMARK_TARGET=
+ LOG_TARGET=Yes
+ ULOG_TARGET=
+ NFLOG_TARGET=
+ PERSISTENT_SNAT=
+ FLOW_FILTER=
+ FWMARK_RT_MASK=
+ MARK_ANYWHERE=
+ HEADER_MATCH=
+ ACCOUNT_TARGET=
+ AUDIT_TARGET=
+ CONDITION_MATCH=
+ IPTABLES_S=
+ BASIC_FILTER=
+ chain=fooX10163
+ [ -n Yes ]
+ qt /usr/local/sbin/iptables -t nat -N fooX10163
+ /usr/local/sbin/iptables -t nat -N fooX10163
+ qt /usr/local/sbin/iptables -t nat -A fooX10163 -j SNAT --to-source 1.2.3.4
--persistent
+ /usr/local/sbin/iptables -t nat -A fooX10163 -j SNAT --to-source 1.2.3.4
--persistent
+ PERSISTENT_SNAT=Yes
+ qt /usr/local/sbin/iptables -t nat -F fooX10163
+ /usr/local/sbin/iptables -t nat -F fooX10163
+ qt /usr/local/sbin/iptables -t nat -X fooX10163
+ /usr/local/sbin/iptables -t nat -X fooX10163
+ qt /usr/local/sbin/iptables -F fooX10163
+ /usr/local/sbin/iptables -F fooX10163
+ qt /usr/local/sbin/iptables -X fooX10163
+ /usr/local/sbin/iptables -X fooX10163
+ /usr/local/sbin/iptables -N fooX10163
+ chain1=fooX101631
+ qt /usr/local/sbin/iptables -F fooX101631
+ /usr/local/sbin/iptables -F fooX101631
+ qt /usr/local/sbin/iptables -X fooX101631
+ /usr/local/sbin/iptables -X fooX101631
+ /usr/local/sbin/iptables -N fooX101631
+ qt /usr/local/sbin/iptables -A fooX10163 -m state --state ESTABLISHED,RELATED
-j ACCEPT
+ /usr/local/sbin/iptables -A fooX10163 -m state --state ESTABLISHED,RELATED -j
ACCEPT
+ qt /usr/local/sbin/iptables -A fooX10163 -m conntrack --ctorigdst 192.168.1.1
-j ACCEPT
+ /usr/local/sbin/iptables -A fooX10163 -m conntrack --ctorigdst 192.168.1.1 -j
ACCEPT
+ CONNTRACK_MATCH=Yes
+ [ -n Yes ]
+ qt /usr/local/sbin/iptables -A fooX10163 -m conntrack -p tcp --ctorigdstport
22 -j ACCEPT
+ /usr/local/sbin/iptables -A fooX10163 -m conntrack -p tcp --ctorigdstport 22
-j ACCEPT
+ NEW_CONNTRACK_MATCH=Yes
+ qt /usr/local/sbin/iptables -A fooX10163 -m conntrack ! --ctorigdst 1.2.3.4
+ /usr/local/sbin/iptables -A fooX10163 -m conntrack ! --ctorigdst 1.2.3.4
+ qt /usr/local/sbin/iptables -A fooX10163 -p tcp -m multiport --dports 21,22
-j ACCEPT
+ /usr/local/sbin/iptables -A fooX10163 -p tcp -m multiport --dports 21,22 -j
ACCEPT
+ MULTIPORT=Yes
+ qt /usr/local/sbin/iptables -A fooX10163 -p tcp -m multiport --sports 60 -m
multiport --dports 99 -j ACCEPT
+ /usr/local/sbin/iptables -A fooX10163 -p tcp -m multiport --sports 60 -m
multiport --dports 99 -j ACCEPT
+ KLUDEFREE=Yes
+ qt /usr/local/sbin/iptables -A fooX10163 -p tcp -m multiport --dports 21:22
-j ACCEPT
+ /usr/local/sbin/iptables -A fooX10163 -p tcp -m multiport --dports 21:22 -j
ACCEPT
+ XMULTIPORT=Yes
+ qt /usr/local/sbin/iptables -A fooX10163 -m policy --pol ipsec --mode tunnel
--dir in -j ACCEPT
+ /usr/local/sbin/iptables -A fooX10163 -m policy --pol ipsec --mode tunnel
--dir in -j ACCEPT
+ POLICY_MATCH=Yes
+ qt /usr/local/sbin/iptables -A fooX10163 -m physdev --physdev-out eth0 -j
ACCEPT
+ /usr/local/sbin/iptables -A fooX10163 -m physdev --physdev-out eth0 -j ACCEPT
+ PHYSDEV_MATCH=Yes
+ qt /usr/local/sbin/iptables -A fooX10163 -m physdev --physdev-is-bridged
--physdev-in eth0 --physdev-out eth0 -j ACCEPT
+ /usr/local/sbin/iptables -A fooX10163 -m physdev --physdev-is-bridged
--physdev-in eth0 --physdev-out eth0 -j ACCEPT
+ PHYSDEV_BRIDGE=Yes
+ [ -z ]
+ qt /usr/local/sbin/iptables -A fooX10163 -m physdev --physdev-in eth0 -m
physdev --physdev-out eth0 -j ACCEPT
+ /usr/local/sbin/iptables -A fooX10163 -m physdev --physdev-in eth0 -m physdev
--physdev-out eth0 -j ACCEPT
+ KLUDGEFREE=Yes
+ qt /usr/local/sbin/iptables -A fooX10163 -m iprange --src-range
192.168.1.5-192.168.1.124 -j ACCEPT
+ /usr/local/sbin/iptables -A fooX10163 -m iprange --src-range
192.168.1.5-192.168.1.124 -j ACCEPT
+ IPRANGE_MATCH=Yes
+ [ -z Yes ]
+ qt /usr/local/sbin/iptables -A fooX10163 -m recent --update -j ACCEPT
+ /usr/local/sbin/iptables -A fooX10163 -m recent --update -j ACCEPT
+ RECENT_MATCH=Yes
+ qt /usr/local/sbin/iptables -A fooX10163 -m owner --uid-owner 0 -j ACCEPT
+ /usr/local/sbin/iptables -A fooX10163 -m owner --uid-owner 0 -j ACCEPT
+ OWNER_MATCH=Yes
+ qt /usr/local/sbin/iptables -A fooX10163 -m connmark --mark 2 -j ACCEPT
+ /usr/local/sbin/iptables -A fooX10163 -m connmark --mark 2 -j ACCEPT
+ CONNMARK_MATCH=Yes
+ qt /usr/local/sbin/iptables -A fooX10163 -m connmark --mark 2/0xFF -j ACCEPT
+ /usr/local/sbin/iptables -A fooX10163 -m connmark --mark 2/0xFF -j ACCEPT
+ XCONNMARK_MATCH=Yes
+ qt /usr/local/sbin/iptables -A fooX10163 -p tcp -m ipp2p --edk -j ACCEPT
+ /usr/local/sbin/iptables -A fooX10163 -p tcp -m ipp2p --edk -j ACCEPT
+ IPP2P_MATCH=Yes
+ [ -n Yes ]
+ qt /usr/local/sbin/iptables -A fooX10163 -p tcp -m ipp2p --ipp2p -j ACCEPT
+ /usr/local/sbin/iptables -A fooX10163 -p tcp -m ipp2p --ipp2p -j ACCEPT
+ qt /usr/local/sbin/iptables -A fooX10163 -m length --length 10:20 -j ACCEPT
+ /usr/local/sbin/iptables -A fooX10163 -m length --length 10:20 -j ACCEPT
+ LENGTH_MATCH=Yes
+ qt /usr/local/sbin/iptables -A fooX10163 -j REJECT --reject-with
icmp-host-prohibited
+ /usr/local/sbin/iptables -A fooX10163 -j REJECT --reject-with
icmp-host-prohibited
+ ENHANCED_REJECT=Yes
+ qt /usr/local/sbin/iptables -A fooX10163 -j ACCEPT -m comment --comment This
is a comment
+ /usr/local/sbin/iptables -A fooX10163 -j ACCEPT -m comment --comment This is
a comment
+ COMMENTS=Yes
+ [ -n Yes ]
+ qt /usr/local/sbin/iptables -t mangle -N fooX10163
+ /usr/local/sbin/iptables -t mangle -N fooX10163
+ qt /usr/local/sbin/iptables -t mangle -A fooX10163 -j MARK --set-mark 1
+ /usr/local/sbin/iptables -t mangle -A fooX10163 -j MARK --set-mark 1
+ MARK=Yes
+ qt /usr/local/sbin/iptables -t mangle -A fooX10163 -j MARK --and-mark 0xFF
+ /usr/local/sbin/iptables -t mangle -A fooX10163 -j MARK --and-mark 0xFF
+ XMARK=Yes
+ qt /usr/local/sbin/iptables -t mangle -A fooX10163 -j MARK --set-mark 1/0xFF
+ /usr/local/sbin/iptables -t mangle -A fooX10163 -j MARK --set-mark 1/0xFF
+ EXMARK=Yes
+ qt /usr/local/sbin/iptables -t mangle -A fooX10163 -j CONNMARK --save-mark
+ /usr/local/sbin/iptables -t mangle -A fooX10163 -j CONNMARK --save-mark
+ CONNMARK=Yes
+ qt /usr/local/sbin/iptables -t mangle -A fooX10163 -j CONNMARK --save-mark
--mask 0xFF
+ /usr/local/sbin/iptables -t mangle -A fooX10163 -j CONNMARK --save-mark
--mask 0xFF
+ XCONNMARK=Yes
+ qt /usr/local/sbin/iptables -t mangle -A fooX10163 -j CLASSIFY --set-class 1:1
+ /usr/local/sbin/iptables -t mangle -A fooX10163 -j CLASSIFY --set-class 1:1
+ CLASSIFY_TARGET=Yes
+ qt /usr/local/sbin/iptables -t mangle -A fooX10163 -j IPMARK --addr src
+ /usr/local/sbin/iptables -t mangle -A fooX10163 -j IPMARK --addr src
+ IPMARK_TARGET=Yes
+ qt /usr/local/sbin/iptables -t mangle -A fooX10163 -p tcp -j TPROXY --on-port
0 --tproxy-mark 1
+ /usr/local/sbin/iptables -t mangle -A fooX10163 -p tcp -j TPROXY --on-port 0
--tproxy-mark 1
+ TPROXY_TARGET=Yes
+ qt /usr/local/sbin/iptables -t mangle -F fooX10163
+ /usr/local/sbin/iptables -t mangle -F fooX10163
+ qt /usr/local/sbin/iptables -t mangle -X fooX10163
+ /usr/local/sbin/iptables -t mangle -X fooX10163
+ qt /usr/local/sbin/iptables -t mangle -L FORWARD -n
+ /usr/local/sbin/iptables -t mangle -L FORWARD -n
+ MANGLE_FORWARD=Yes
+ qt /usr/local/sbin/iptables -t raw -L -n
+ /usr/local/sbin/iptables -t raw -L -n
+ RAW_TABLE=Yes
+ qt /usr/local/sbin/iptables -t rawpost -L -n
+ /usr/local/sbin/iptables -t rawpost -L -n
+ RAWPOST_TABLE=Yes
+ qt mywhich ipset
+ mywhich ipset
+ qt ipset -X fooX10163
+ ipset -X fooX10163
+ local have_ipset
+ qt ipset -N fooX10163 hash:ip family inet
+ ipset -N fooX10163 hash:ip family inet
+ IPSET_V5=Yes
+ have_ipset=Yes
+ [ -n Yes ]
+ qt /usr/local/sbin/iptables -A fooX10163 -m set --match-set fooX10163 src -j
ACCEPT
+ /usr/local/sbin/iptables -A fooX10163 -m set --match-set fooX10163 src -j
ACCEPT
+ qt /usr/local/sbin/iptables -D fooX10163 -m set --match-set fooX10163 src -j
ACCEPT
+ /usr/local/sbin/iptables -D fooX10163 -m set --match-set fooX10163 src -j
ACCEPT
+ IPSET_MATCH=Yes
+ qt ipset -X fooX10163
+ ipset -X fooX10163
+ qt /usr/local/sbin/iptables -A fooX10163 -m pkttype --pkt-type broadcast -j
ACCEPT
+ /usr/local/sbin/iptables -A fooX10163 -m pkttype --pkt-type broadcast -j
ACCEPT
+ USEPKTTYPE=Yes
+ qt /usr/local/sbin/iptables -A fooX10163 -m addrtype --src-type BROADCAST -j
ACCEPT
+ /usr/local/sbin/iptables -A fooX10163 -m addrtype --src-type BROADCAST -j
ACCEPT
+ ADDRTYPE=Yes
+ qt /usr/local/sbin/iptables -A fooX10163 -p tcp --tcp-flags SYN,RST SYN -m
tcpmss --mss 1000:1500 -j ACCEPT
+ /usr/local/sbin/iptables -A fooX10163 -p tcp --tcp-flags SYN,RST SYN -m
tcpmss --mss 1000:1500 -j ACCEPT
+ TCPMSS_MATCH=Yes
+ qt /usr/local/sbin/iptables -A fooX10163 -m hashlimit --hashlimit-upto 4
--hashlimit-burst 5 --hashlimit-name fooX10163 --hashlimit-mode dstip -j ACCEPT
+ /usr/local/sbin/iptables -A fooX10163 -m hashlimit --hashlimit-upto 4
--hashlimit-burst 5 --hashlimit-name fooX10163 --hashlimit-mode dstip -j ACCEPT
+ HASHLIMIT_MATCH=Yes
+ [ -z Yes ]
+ qt /usr/local/sbin/iptables -A fooX10163 -j NFQUEUE --queue-num 4
+ /usr/local/sbin/iptables -A fooX10163 -j NFQUEUE --queue-num 4
+ NFQUEUE_TARGET=Yes
+ qt /usr/local/sbin/iptables -A fooX10163 -m realm --realm 4
+ /usr/local/sbin/iptables -A fooX10163 -m realm --realm 4
+ REALM_MATCH=Yes
+ qt /usr/local/sbin/iptables -A fooX10163 -m helper --helper ftp
+ /usr/local/sbin/iptables -A fooX10163 -m helper --helper ftp
+ HELPER_MATCH=Yes
+ qt /usr/local/sbin/iptables -A fooX10163 -m connlimit --connlimit-above 8 -j
DROP
+ /usr/local/sbin/iptables -A fooX10163 -m connlimit --connlimit-above 8 -j DROP
+ CONNLIMIT_MATCH=Yes
+ qt /usr/local/sbin/iptables -A fooX10163 -m time --timestart 23:00 -j DROP
+ /usr/local/sbin/iptables -A fooX10163 -m time --timestart 23:00 -j DROP
+ TIME_MATCH=Yes
+ qt /usr/local/sbin/iptables -A fooX10163 -g fooX101631
+ /usr/local/sbin/iptables -A fooX10163 -g fooX101631
+ GOTO_TARGET=Yes
+ qt /usr/local/sbin/iptables -A fooX10163 -j LOGMARK
+ /usr/local/sbin/iptables -A fooX10163 -j LOGMARK
+ LOGMARK_TARGET=Yes
+ qt /usr/local/sbin/iptables -A fooX10163 -j LOG
+ /usr/local/sbin/iptables -A fooX10163 -j LOG
+ qt /usr/local/sbin/iptables -A fooX10163 -j ULOG
+ /usr/local/sbin/iptables -A fooX10163 -j ULOG
+ ULOG_TARGET=Yes
+ qt /usr/local/sbin/iptables -A fooX10163 -j NFLOG
+ /usr/local/sbin/iptables -A fooX10163 -j NFLOG
+ NFLOG_TARGET=Yes
+ qt /usr/local/sbin/iptables -A fooX10163 -j MARK --set-mark 5
+ /usr/local/sbin/iptables -A fooX10163 -j MARK --set-mark 5
+ MARK_ANYWHERE=Yes
+ qt /usr/local/sbin/iptables -A fooX10163 -j ACCOUNT --addr 192.168.1.0/29
--tname fooX10163
+ /usr/local/sbin/iptables -A fooX10163 -j ACCOUNT --addr 192.168.1.0/29
--tname fooX10163
+ ACCOUNT_TARGET=Yes
+ qt /usr/local/sbin/iptables -A fooX10163 -j AUDIT --type drop
+ /usr/local/sbin/iptables -A fooX10163 -j AUDIT --type drop
+ AUDIT_TARGET=Yes
+ qt /usr/local/sbin/iptables -A fooX10163 -m condition --condition foo
+ /usr/local/sbin/iptables -A fooX10163 -m condition --condition foo
+ CONDITION_MATCH=Yes
+ qt /usr/local/sbin/iptables -S INPUT
+ /usr/local/sbin/iptables -S INPUT
+ IPTABLES_S=Yes
+ qt /usr/local/sbin/iptables -F fooX10163
+ /usr/local/sbin/iptables -F fooX10163
+ qt /usr/local/sbin/iptables -X fooX10163
+ /usr/local/sbin/iptables -X fooX10163
+ qt /usr/local/sbin/iptables -F fooX101631
+ /usr/local/sbin/iptables -F fooX101631
+ qt /usr/local/sbin/iptables -X fooX101631
+ /usr/local/sbin/iptables -X fooX101631
+ [ -n /sbin/tc ]
+ grep -q ^Usage
+ /sbin/tc filter add flow help
+ FLOW_FILTER=Yes
+ [ -n /sbin/tc ]
+ grep -q ^Usage
+ /sbin/tc filter add basic help
+ BASIC_FILTER=Yes
+ [ -n /sbin/ip ]
+ grep -q /MASK
+ /sbin/ip rule add help
+ FWMARK_RT_MASK=Yes
+ CAPVERSION=40426
+ sed -e s/-.*//
+ uname -r
+ KERNELVERSION=3.0
+ sed -e s/^\([0-9][0-9]*\)\.\([0-9][0-9]*\).*$/\1 \2/g
+ echo 3.0
+ printf %d%02d00 3 0
+ KERNELVERSION=30000
+ VERBOSITY=2
+ [ -n Yes ]
+ report_capabilities1
+ echo #
#
+ date
+ echo # Shorewall 4.4.26-RC2 detected the following iptables/netfilter
capabilities - Sun Dec 11 23:54:52 GMT 2011
# Shorewall 4.4.26-RC2 detected the following iptables/netfilter capabilities -
Sun Dec 11 23:54:52 GMT 2011
+ echo #
#
+ report_capability1 NAT_ENABLED
+ eval echo NAT_ENABLED=$NAT_ENABLED
+ echo NAT_ENABLED=Yes
NAT_ENABLED=Yes
+ report_capability1 MANGLE_ENABLED
+ eval echo MANGLE_ENABLED=$MANGLE_ENABLED
+ echo MANGLE_ENABLED=Yes
MANGLE_ENABLED=Yes
+ report_capability1 MULTIPORT
+ eval echo MULTIPORT=$MULTIPORT
+ echo MULTIPORT=Yes
MULTIPORT=Yes
+ report_capability1 XMULTIPORT
+ eval echo XMULTIPORT=$XMULTIPORT
+ echo XMULTIPORT=Yes
XMULTIPORT=Yes
+ report_capability1 CONNTRACK_MATCH
+ eval echo CONNTRACK_MATCH=$CONNTRACK_MATCH
+ echo CONNTRACK_MATCH=Yes
CONNTRACK_MATCH=Yes
+ report_capability1 NEW_CONNTRACK_MATCH
+ eval echo NEW_CONNTRACK_MATCH=$NEW_CONNTRACK_MATCH
+ echo NEW_CONNTRACK_MATCH=Yes
NEW_CONNTRACK_MATCH=Yes
+ report_capability1 OLD_CONNTRACK_MATCH
+ eval echo OLD_CONNTRACK_MATCH=$OLD_CONNTRACK_MATCH
+ echo OLD_CONNTRACK_MATCH=
OLD_CONNTRACK_MATCH=
+ report_capability1 USEPKTTYPE
+ eval echo USEPKTTYPE=$USEPKTTYPE
+ echo USEPKTTYPE=Yes
USEPKTTYPE=Yes
+ report_capability1 POLICY_MATCH
+ eval echo POLICY_MATCH=$POLICY_MATCH
+ echo POLICY_MATCH=Yes
POLICY_MATCH=Yes
+ report_capability1 PHYSDEV_MATCH
+ eval echo PHYSDEV_MATCH=$PHYSDEV_MATCH
+ echo PHYSDEV_MATCH=Yes
PHYSDEV_MATCH=Yes
+ report_capability1 PHYSDEV_BRIDGE
+ eval echo PHYSDEV_BRIDGE=$PHYSDEV_BRIDGE
+ echo PHYSDEV_BRIDGE=Yes
PHYSDEV_BRIDGE=Yes
+ report_capability1 LENGTH_MATCH
+ eval echo LENGTH_MATCH=$LENGTH_MATCH
+ echo LENGTH_MATCH=Yes
LENGTH_MATCH=Yes
+ report_capability1 IPRANGE_MATCH
+ eval echo IPRANGE_MATCH=$IPRANGE_MATCH
+ echo IPRANGE_MATCH=Yes
IPRANGE_MATCH=Yes
+ report_capability1 RECENT_MATCH
+ eval echo RECENT_MATCH=$RECENT_MATCH
+ echo RECENT_MATCH=Yes
RECENT_MATCH=Yes
+ report_capability1 OWNER_MATCH
+ eval echo OWNER_MATCH=$OWNER_MATCH
+ echo OWNER_MATCH=Yes
OWNER_MATCH=Yes
+ report_capability1 IPSET_MATCH
+ eval echo IPSET_MATCH=$IPSET_MATCH
+ echo IPSET_MATCH=Yes
IPSET_MATCH=Yes
+ report_capability1 OLD_IPSET_MATCH
+ eval echo OLD_IPSET_MATCH=$OLD_IPSET_MATCH
+ echo OLD_IPSET_MATCH=
OLD_IPSET_MATCH=
+ report_capability1 CONNMARK
+ eval echo CONNMARK=$CONNMARK
+ echo CONNMARK=Yes
CONNMARK=Yes
+ report_capability1 XCONNMARK
+ eval echo XCONNMARK=$XCONNMARK
+ echo XCONNMARK=Yes
XCONNMARK=Yes
+ report_capability1 CONNMARK_MATCH
+ eval echo CONNMARK_MATCH=$CONNMARK_MATCH
+ echo CONNMARK_MATCH=Yes
CONNMARK_MATCH=Yes
+ report_capability1 XCONNMARK_MATCH
+ eval echo XCONNMARK_MATCH=$XCONNMARK_MATCH
+ echo XCONNMARK_MATCH=Yes
XCONNMARK_MATCH=Yes
+ report_capability1 RAW_TABLE
+ eval echo RAW_TABLE=$RAW_TABLE
+ echo RAW_TABLE=Yes
RAW_TABLE=Yes
+ report_capability1 RAWPOST_TABLE
+ eval echo RAWPOST_TABLE=$RAWPOST_TABLE
+ echo RAWPOST_TABLE=Yes
RAWPOST_TABLE=Yes
+ report_capability1 IPP2P_MATCH
+ eval echo IPP2P_MATCH=$IPP2P_MATCH
+ echo IPP2P_MATCH=Yes
IPP2P_MATCH=Yes
+ report_capability1 OLD_IPP2P_MATCH
+ eval echo OLD_IPP2P_MATCH=$OLD_IPP2P_MATCH
+ echo OLD_IPP2P_MATCH=
OLD_IPP2P_MATCH=
+ report_capability1 CLASSIFY_TARGET
+ eval echo CLASSIFY_TARGET=$CLASSIFY_TARGET
+ echo CLASSIFY_TARGET=Yes
CLASSIFY_TARGET=Yes
+ report_capability1 ENHANCED_REJECT
+ eval echo ENHANCED_REJECT=$ENHANCED_REJECT
+ echo ENHANCED_REJECT=Yes
ENHANCED_REJECT=Yes
+ report_capability1 KLUDGEFREE
+ eval echo KLUDGEFREE=$KLUDGEFREE
+ echo KLUDGEFREE=Yes
KLUDGEFREE=Yes
+ report_capability1 MARK
+ eval echo MARK=$MARK
+ echo MARK=Yes
MARK=Yes
+ report_capability1 XMARK
+ eval echo XMARK=$XMARK
+ echo XMARK=Yes
XMARK=Yes
+ report_capability1 EXMARK
+ eval echo EXMARK=$EXMARK
+ echo EXMARK=Yes
EXMARK=Yes
+ report_capability1 MANGLE_FORWARD
+ eval echo MANGLE_FORWARD=$MANGLE_FORWARD
+ echo MANGLE_FORWARD=Yes
MANGLE_FORWARD=Yes
+ report_capability1 COMMENTS
+ eval echo COMMENTS=$COMMENTS
+ echo COMMENTS=Yes
COMMENTS=Yes
+ report_capability1 ADDRTYPE
+ eval echo ADDRTYPE=$ADDRTYPE
+ echo ADDRTYPE=Yes
ADDRTYPE=Yes
+ report_capability1 TCPMSS_MATCH
+ eval echo TCPMSS_MATCH=$TCPMSS_MATCH
+ echo TCPMSS_MATCH=Yes
TCPMSS_MATCH=Yes
+ report_capability1 HASHLIMIT_MATCH
+ eval echo HASHLIMIT_MATCH=$HASHLIMIT_MATCH
+ echo HASHLIMIT_MATCH=Yes
HASHLIMIT_MATCH=Yes
+ report_capability1 OLD_HL_MATCH
+ eval echo OLD_HL_MATCH=$OLD_HL_MATCH
+ echo OLD_HL_MATCH=
OLD_HL_MATCH=
+ report_capability1 NFQUEUE_TARGET
+ eval echo NFQUEUE_TARGET=$NFQUEUE_TARGET
+ echo NFQUEUE_TARGET=Yes
NFQUEUE_TARGET=Yes
+ report_capability1 REALM_MATCH
+ eval echo REALM_MATCH=$REALM_MATCH
+ echo REALM_MATCH=Yes
REALM_MATCH=Yes
+ report_capability1 HELPER_MATCH
+ eval echo HELPER_MATCH=$HELPER_MATCH
+ echo HELPER_MATCH=Yes
HELPER_MATCH=Yes
+ report_capability1 CONNLIMIT_MATCH
+ eval echo CONNLIMIT_MATCH=$CONNLIMIT_MATCH
+ echo CONNLIMIT_MATCH=Yes
CONNLIMIT_MATCH=Yes
+ report_capability1 TIME_MATCH
+ eval echo TIME_MATCH=$TIME_MATCH
+ echo TIME_MATCH=Yes
TIME_MATCH=Yes
+ report_capability1 GOTO_TARGET
+ eval echo GOTO_TARGET=$GOTO_TARGET
+ echo GOTO_TARGET=Yes
GOTO_TARGET=Yes
+ report_capability1 LOGMARK_TARGET
+ eval echo LOGMARK_TARGET=$LOGMARK_TARGET
+ echo LOGMARK_TARGET=Yes
LOGMARK_TARGET=Yes
+ report_capability1 IPMARK_TARGET
+ eval echo IPMARK_TARGET=$IPMARK_TARGET
+ echo IPMARK_TARGET=Yes
IPMARK_TARGET=Yes
+ report_capability1 LOG_TARGET
+ eval echo LOG_TARGET=$LOG_TARGET
+ echo LOG_TARGET=Yes
LOG_TARGET=Yes
+ report_capability1 ULOG_TARGET
+ eval echo ULOG_TARGET=$ULOG_TARGET
+ echo ULOG_TARGET=Yes
ULOG_TARGET=Yes
+ report_capability1 NFLOG_TARGET
+ eval echo NFLOG_TARGET=$NFLOG_TARGET
+ echo NFLOG_TARGET=Yes
NFLOG_TARGET=Yes
+ report_capability1 PERSISTENT_SNAT
+ eval echo PERSISTENT_SNAT=$PERSISTENT_SNAT
+ echo PERSISTENT_SNAT=Yes
PERSISTENT_SNAT=Yes
+ report_capability1 TPROXY_TARGET
+ eval echo TPROXY_TARGET=$TPROXY_TARGET
+ echo TPROXY_TARGET=Yes
TPROXY_TARGET=Yes
+ report_capability1 FLOW_FILTER
+ eval echo FLOW_FILTER=$FLOW_FILTER
+ echo FLOW_FILTER=Yes
FLOW_FILTER=Yes
+ report_capability1 FWMARK_RT_MASK
+ eval echo FWMARK_RT_MASK=$FWMARK_RT_MASK
+ echo FWMARK_RT_MASK=Yes
FWMARK_RT_MASK=Yes
+ report_capability1 MARK_ANYWHERE
+ eval echo MARK_ANYWHERE=$MARK_ANYWHERE
+ echo MARK_ANYWHERE=Yes
MARK_ANYWHERE=Yes
+ report_capability1 HEADER_MATCH
+ eval echo HEADER_MATCH=$HEADER_MATCH
+ echo HEADER_MATCH=
HEADER_MATCH=
+ report_capability1 ACCOUNT_TARGET
+ eval echo ACCOUNT_TARGET=$ACCOUNT_TARGET
+ echo ACCOUNT_TARGET=Yes
ACCOUNT_TARGET=Yes
+ report_capability1 AUDIT_TARGET
+ eval echo AUDIT_TARGET=$AUDIT_TARGET
+ echo AUDIT_TARGET=Yes
AUDIT_TARGET=Yes
+ report_capability1 IPSET_V5
+ eval echo IPSET_V5=$IPSET_V5
+ echo IPSET_V5=Yes
IPSET_V5=Yes
+ report_capability1 CONDITION_MATCH
+ eval echo CONDITION_MATCH=$CONDITION_MATCH
+ echo CONDITION_MATCH=Yes
CONDITION_MATCH=Yes
+ report_capability1 IPTABLES_S
+ eval echo IPTABLES_S=$IPTABLES_S
+ echo IPTABLES_S=Yes
IPTABLES_S=Yes
+ report_capability1 BASIC_FILTER
+ eval echo BASIC_FILTER=$BASIC_FILTER
+ echo BASIC_FILTER=Yes
BASIC_FILTER=Yes
+ echo CAPVERSION=40426
CAPVERSION=40426
+ echo KERNELVERSION=30000
KERNELVERSION=30000
+ [ 1 -gt 1 ]
+ determine_capabilities
+ local tool
+ local chain
+ local chain1
+ [ 4 -eq 4 ]
+ tool=iptables
+ mywhich iptables
+ local dir
+ split /sbin:/bin:/usr/sbin:/usr/bin:/usr/local/bin:/usr/local/sbin
+ local ifs
+ ifs=
+ IFS=:
+ echo /sbin /bin /usr/sbin /usr/bin /usr/local/bin /usr/local/sbin
+ IFS=
+ [ -x /sbin/iptables ]
+ echo /sbin/iptables
+ return 0
+ g_tool=/sbin/iptables
+ [ -z /sbin/iptables ]
+ qt /sbin/iptables -t nat -L -n
+ /sbin/iptables -t nat -L -n
+ NAT_ENABLED=Yes
+ qt /sbin/iptables -t mangle -L -n
+ /sbin/iptables -t mangle -L -n
+ MANGLE_ENABLED=Yes
+ [ ip = ip -o -z ip ]
+ which ip
+ IP=/sbin/ip
+ [ -n /sbin/ip -a -x /sbin/ip ]
+ [ tc = tc -o -z tc ]
+ which tc
+ TC=/sbin/tc
+ [ -n /sbin/tc -a -x /sbin/tc ]
+ CONNTRACK_MATCH=
+ NEW_CONNTRACK_MATCH=
+ OLD_CONNTRACK_MATCH=
+ MULTIPORT=
+ XMULTIPORT=
+ POLICY_MATCH=
+ PHYSDEV_MATCH=
+ PHYSDEV_BRIDGE=
+ IPRANGE_MATCH=
+ RECENT_MATCH=
+ OWNER_MATCH=
+ IPSET_MATCH=
+ OLD_IPSET_MATCH=
+ IPSET_V5=
+ CONNMARK=
+ XCONNMARK=
+ CONNMARK_MATCH=
+ XCONNMARK_MATCH=
+ RAW_TABLE=
+ RAWPOST_TABLE=
+ IPP2P_MATCH=
+ OLD_IPP2P_MATCH=
+ LENGTH_MATCH=
+ CLASSIFY_TARGET=
+ ENHANCED_REJECT=
+ USEPKTTYPE=
+ KLUDGEFREE=
+ MARK=
+ XMARK=
+ EXMARK=
+ TPROXY_TARGET=
+ MANGLE_FORWARD=
+ COMMENTS=
+ ADDRTYPE=
+ TCPMSS_MATCH=
+ HASHLIMIT_MATCH=
+ NFQUEUE_TARGET=
+ REALM_MATCH=
+ HELPER_MATCH=
+ CONNLIMIT_MATCH=
+ TIME_MATCH=
+ GOTO_TARGET=
+ LOGMARK_TARGET=
+ IPMARK_TARGET=
+ LOG_TARGET=Yes
+ ULOG_TARGET=
+ NFLOG_TARGET=
+ PERSISTENT_SNAT=
+ FLOW_FILTER=
+ FWMARK_RT_MASK=
+ MARK_ANYWHERE=
+ HEADER_MATCH=
+ ACCOUNT_TARGET=
+ AUDIT_TARGET=
+ CONDITION_MATCH=
+ IPTABLES_S=
+ BASIC_FILTER=
+ CT_TARGET=
+ chain=fooX8904
+ [ -n Yes ]
+ qt /sbin/iptables -t nat -N fooX8904
+ /sbin/iptables -t nat -N fooX8904
+ qt /sbin/iptables -t nat -A fooX8904 -j SNAT --to-source 1.2.3.4 --persistent
+ /sbin/iptables -t nat -A fooX8904 -j SNAT --to-source 1.2.3.4 --persistent
+ PERSISTENT_SNAT=Yes
+ qt /sbin/iptables -t nat -F fooX8904
+ /sbin/iptables -t nat -F fooX8904
+ qt /sbin/iptables -t nat -X fooX8904
+ /sbin/iptables -t nat -X fooX8904
+ qt /sbin/iptables -F fooX8904
+ /sbin/iptables -F fooX8904
+ qt /sbin/iptables -X fooX8904
+ /sbin/iptables -X fooX8904
+ /sbin/iptables -N fooX8904
+ chain1=fooX89041
+ qt /sbin/iptables -F fooX89041
+ /sbin/iptables -F fooX89041
+ qt /sbin/iptables -X fooX89041
+ /sbin/iptables -X fooX89041
+ /sbin/iptables -N fooX89041
+ qt /sbin/iptables -A fooX8904 -m state --state ESTABLISHED,RELATED -j ACCEPT
+ /sbin/iptables -A fooX8904 -m state --state ESTABLISHED,RELATED -j ACCEPT
+ [ 4 -eq 4 ]
+ qt /sbin/iptables -A fooX8904 -m conntrack --ctorigdst 192.168.1.1 -j ACCEPT
+ /sbin/iptables -A fooX8904 -m conntrack --ctorigdst 192.168.1.1 -j ACCEPT
+ CONNTRACK_MATCH=Yes
+ [ -n Yes ]
+ qt /sbin/iptables -A fooX8904 -m conntrack -p tcp --ctorigdstport 22 -j ACCEPT
+ /sbin/iptables -A fooX8904 -m conntrack -p tcp --ctorigdstport 22 -j ACCEPT
+ NEW_CONNTRACK_MATCH=Yes
+ [ 4 -eq 4 ]
+ qt /sbin/iptables -A fooX8904 -m conntrack ! --ctorigdst 1.2.3.4
+ /sbin/iptables -A fooX8904 -m conntrack ! --ctorigdst 1.2.3.4
+ qt /sbin/iptables -A fooX8904 -p tcp -m multiport --dports 21,22 -j ACCEPT
+ /sbin/iptables -A fooX8904 -p tcp -m multiport --dports 21,22 -j ACCEPT
+ MULTIPORT=Yes
+ qt /sbin/iptables -A fooX8904 -p tcp -m multiport --sports 60 -m multiport
--dports 99 -j ACCEPT
+ /sbin/iptables -A fooX8904 -p tcp -m multiport --sports 60 -m multiport
--dports 99 -j ACCEPT
+ KLUDEFREE=Yes
+ qt /sbin/iptables -A fooX8904 -p tcp -m multiport --dports 21:22 -j ACCEPT
+ /sbin/iptables -A fooX8904 -p tcp -m multiport --dports 21:22 -j ACCEPT
+ XMULTIPORT=Yes
+ qt /sbin/iptables -A fooX8904 -m policy --pol ipsec --mode tunnel --dir in -j
ACCEPT
+ /sbin/iptables -A fooX8904 -m policy --pol ipsec --mode tunnel --dir in -j
ACCEPT
+ POLICY_MATCH=Yes
+ qt /sbin/iptables -A fooX8904 -m physdev --physdev-out eth0 -j ACCEPT
+ /sbin/iptables -A fooX8904 -m physdev --physdev-out eth0 -j ACCEPT
+ PHYSDEV_MATCH=Yes
+ qt /sbin/iptables -A fooX8904 -m physdev --physdev-is-bridged --physdev-in
eth0 --physdev-out eth0 -j ACCEPT
+ /sbin/iptables -A fooX8904 -m physdev --physdev-is-bridged --physdev-in eth0
--physdev-out eth0 -j ACCEPT
+ PHYSDEV_BRIDGE=Yes
+ [ -z ]
+ qt /sbin/iptables -A fooX8904 -m physdev --physdev-in eth0 -m physdev
--physdev-out eth0 -j ACCEPT
+ /sbin/iptables -A fooX8904 -m physdev --physdev-in eth0 -m physdev
--physdev-out eth0 -j ACCEPT
+ KLUDGEFREE=Yes
+ [ 4 -eq 4 ]
+ qt /sbin/iptables -A fooX8904 -m iprange --src-range
192.168.1.5-192.168.1.124 -j ACCEPT
+ /sbin/iptables -A fooX8904 -m iprange --src-range 192.168.1.5-192.168.1.124
-j ACCEPT
+ IPRANGE_MATCH=Yes
+ [ -z Yes ]
+ qt /sbin/iptables -A fooX8904 -m recent --update -j ACCEPT
+ /sbin/iptables -A fooX8904 -m recent --update -j ACCEPT
+ RECENT_MATCH=Yes
+ qt /sbin/iptables -A fooX8904 -m owner --uid-owner 0 -j ACCEPT
+ /sbin/iptables -A fooX8904 -m owner --uid-owner 0 -j ACCEPT
+ OWNER_MATCH=Yes
+ qt /sbin/iptables -A fooX8904 -m connmark --mark 2 -j ACCEPT
+ /sbin/iptables -A fooX8904 -m connmark --mark 2 -j ACCEPT
+ CONNMARK_MATCH=Yes
+ qt /sbin/iptables -A fooX8904 -m connmark --mark 2/0xFF -j ACCEPT
+ /sbin/iptables -A fooX8904 -m connmark --mark 2/0xFF -j ACCEPT
+ XCONNMARK_MATCH=Yes
+ qt /sbin/iptables -A fooX8904 -p tcp -m ipp2p --edk -j ACCEPT
+ /sbin/iptables -A fooX8904 -p tcp -m ipp2p --edk -j ACCEPT
+ [ -n ]
+ qt /sbin/iptables -A fooX8904 -m length --length 10:20 -j ACCEPT
+ /sbin/iptables -A fooX8904 -m length --length 10:20 -j ACCEPT
+ LENGTH_MATCH=Yes
+ [ 4 -eq 4 ]
+ qt /sbin/iptables -A fooX8904 -j REJECT --reject-with icmp-host-prohibited
+ /sbin/iptables -A fooX8904 -j REJECT --reject-with icmp-host-prohibited
+ ENHANCED_REJECT=Yes
+ qt /sbin/iptables -A fooX8904 -j ACCEPT -m comment --comment This is a comment
+ /sbin/iptables -A fooX8904 -j ACCEPT -m comment --comment This is a comment
+ COMMENTS=Yes
+ [ -n Yes ]
+ qt /sbin/iptables -t mangle -N fooX8904
+ /sbin/iptables -t mangle -N fooX8904
+ qt /sbin/iptables -t mangle -A fooX8904 -j MARK --set-mark 1
+ /sbin/iptables -t mangle -A fooX8904 -j MARK --set-mark 1
+ MARK=Yes
+ qt /sbin/iptables -t mangle -A fooX8904 -j MARK --and-mark 0xFF
+ /sbin/iptables -t mangle -A fooX8904 -j MARK --and-mark 0xFF
+ XMARK=Yes
+ qt /sbin/iptables -t mangle -A fooX8904 -j MARK --set-mark 1/0xFF
+ /sbin/iptables -t mangle -A fooX8904 -j MARK --set-mark 1/0xFF
+ EXMARK=Yes
+ qt /sbin/iptables -t mangle -A fooX8904 -j CONNMARK --save-mark
+ /sbin/iptables -t mangle -A fooX8904 -j CONNMARK --save-mark
+ CONNMARK=Yes
+ qt /sbin/iptables -t mangle -A fooX8904 -j CONNMARK --save-mark --mask 0xFF
+ /sbin/iptables -t mangle -A fooX8904 -j CONNMARK --save-mark --mask 0xFF
+ XCONNMARK=Yes
+ qt /sbin/iptables -t mangle -A fooX8904 -j CLASSIFY --set-class 1:1
+ /sbin/iptables -t mangle -A fooX8904 -j CLASSIFY --set-class 1:1
+ CLASSIFY_TARGET=Yes
+ qt /sbin/iptables -t mangle -A fooX8904 -j IPMARK --addr src
+ /sbin/iptables -t mangle -A fooX8904 -j IPMARK --addr src
+ qt /sbin/iptables -t mangle -A fooX8904 -p tcp -j TPROXY --on-port 0
--tproxy-mark 1
+ /sbin/iptables -t mangle -A fooX8904 -p tcp -j TPROXY --on-port 0
--tproxy-mark 1
+ TPROXY_TARGET=Yes
+ qt /sbin/iptables -t mangle -F fooX8904
+ /sbin/iptables -t mangle -F fooX8904
+ qt /sbin/iptables -t mangle -X fooX8904
+ /sbin/iptables -t mangle -X fooX8904
+ qt /sbin/iptables -t mangle -L FORWARD -n
+ /sbin/iptables -t mangle -L FORWARD -n
+ MANGLE_FORWARD=Yes
+ qt /sbin/iptables -t raw -L -n
+ /sbin/iptables -t raw -L -n
+ RAW_TABLE=Yes
+ qt /sbin/iptables -t rawpost -L -n
+ /sbin/iptables -t rawpost -L -n
+ RAWPOST_TABLE=Yes
+ [ -n Yes ]
+ qt /sbin/iptables -t raw -N fooX8904
+ /sbin/iptables -t raw -N fooX8904
+ qt /sbin/iptables -t raw -A fooX8904 -j CT --notrack
+ /sbin/iptables -t raw -A fooX8904 -j CT --notrack
+ CT_TARGET=Yes
+ qt /sbin/iptables -t raw -N fooX8904
+ /sbin/iptables -t raw -N fooX8904
+ qt /sbin/iptables -t raw -F fooX8904
+ /sbin/iptables -t raw -F fooX8904
+ qt /sbin/iptables -t raw -X fooX8904
+ /sbin/iptables -t raw -X fooX8904
+ qt mywhich ipset
+ mywhich ipset
+ qt ipset -X fooX8904
+ ipset -X fooX8904
+ local have_ipset
+ [ 4 -eq 4 ]
+ qt ipset -N fooX8904 hash:ip family inet
+ ipset -N fooX8904 hash:ip family inet
+ IPSET_V5=Yes
+ have_ipset=Yes
+ [ -n Yes ]
+ qt /sbin/iptables -A fooX8904 -m set --match-set fooX8904 src -j ACCEPT
+ /sbin/iptables -A fooX8904 -m set --match-set fooX8904 src -j ACCEPT
+ qt /sbin/iptables -D fooX8904 -m set --match-set fooX8904 src -j ACCEPT
+ /sbin/iptables -D fooX8904 -m set --match-set fooX8904 src -j ACCEPT
+ IPSET_MATCH=Yes
+ qt ipset -X fooX8904
+ ipset -X fooX8904
+ qt /sbin/iptables -A fooX8904 -m pkttype --pkt-type broadcast -j ACCEPT
+ /sbin/iptables -A fooX8904 -m pkttype --pkt-type broadcast -j ACCEPT
+ USEPKTTYPE=Yes
+ qt /sbin/iptables -A fooX8904 -m addrtype --src-type BROADCAST -j ACCEPT
+ /sbin/iptables -A fooX8904 -m addrtype --src-type BROADCAST -j ACCEPT
+ ADDRTYPE=Yes
+ qt /sbin/iptables -A fooX8904 -p tcp --tcp-flags SYN,RST SYN -m tcpmss --mss
1000:1500 -j ACCEPT
+ /sbin/iptables -A fooX8904 -p tcp --tcp-flags SYN,RST SYN -m tcpmss --mss
1000:1500 -j ACCEPT
+ TCPMSS_MATCH=Yes
+ qt /sbin/iptables -A fooX8904 -m hashlimit --hashlimit-upto 4
--hashlimit-burst 5 --hashlimit-name fooX8904 --hashlimit-mode dstip -j ACCEPT
+ /sbin/iptables -A fooX8904 -m hashlimit --hashlimit-upto 4 --hashlimit-burst
5 --hashlimit-name fooX8904 --hashlimit-mode dstip -j ACCEPT
+ HASHLIMIT_MATCH=Yes
+ [ -z Yes ]
+ qt /sbin/iptables -A fooX8904 -j NFQUEUE --queue-num 4
+ /sbin/iptables -A fooX8904 -j NFQUEUE --queue-num 4
+ NFQUEUE_TARGET=Yes
+ qt /sbin/iptables -A fooX8904 -m realm --realm 4
+ /sbin/iptables -A fooX8904 -m realm --realm 4
+ REALM_MATCH=Yes
+ qt /sbin/iptables -A fooX8904 -m helper --helper ftp
+ /sbin/iptables -A fooX8904 -m helper --helper ftp
+ HELPER_MATCH=Yes
+ qt /sbin/iptables -A fooX8904 -m connlimit --connlimit-above 8 -j DROP
+ /sbin/iptables -A fooX8904 -m connlimit --connlimit-above 8 -j DROP
+ CONNLIMIT_MATCH=Yes
+ qt /sbin/iptables -A fooX8904 -m time --timestart 23:00 -j DROP
+ /sbin/iptables -A fooX8904 -m time --timestart 23:00 -j DROP
+ TIME_MATCH=Yes
+ qt /sbin/iptables -A fooX8904 -g fooX89041
+ /sbin/iptables -A fooX8904 -g fooX89041
+ GOTO_TARGET=Yes
+ qt /sbin/iptables -A fooX8904 -j LOGMARK
+ /sbin/iptables -A fooX8904 -j LOGMARK
+ qt /sbin/iptables -A fooX8904 -j LOG
+ /sbin/iptables -A fooX8904 -j LOG
+ qt /sbin/iptables -A fooX8904 -j ULOG
+ /sbin/iptables -A fooX8904 -j ULOG
+ ULOG_TARGET=Yes
+ qt /sbin/iptables -A fooX8904 -j NFLOG
+ /sbin/iptables -A fooX8904 -j NFLOG
+ NFLOG_TARGET=Yes
+ qt /sbin/iptables -A fooX8904 -j MARK --set-mark 5
+ /sbin/iptables -A fooX8904 -j MARK --set-mark 5
+ MARK_ANYWHERE=Yes
+ [ 4 -eq 4 ]
+ qt /sbin/iptables -A fooX8904 -j ACCOUNT --addr 192.168.1.0/29 --tname
fooX8904
+ /sbin/iptables -A fooX8904 -j ACCOUNT --addr 192.168.1.0/29 --tname fooX8904
+ qt /sbin/iptables -A fooX8904 -j AUDIT --type drop
+ /sbin/iptables -A fooX8904 -j AUDIT --type drop
+ qt /sbin/iptables -A fooX8904 -m condition --condition foo
+ /sbin/iptables -A fooX8904 -m condition --condition foo
+ qt /sbin/iptables -S INPUT
+ /sbin/iptables -S INPUT
+ IPTABLES_S=Yes
+ qt /sbin/iptables -F fooX8904
+ /sbin/iptables -F fooX8904
+ qt /sbin/iptables -X fooX8904
+ /sbin/iptables -X fooX8904
+ qt /sbin/iptables -F fooX89041
+ /sbin/iptables -F fooX89041
+ qt /sbin/iptables -X fooX89041
+ /sbin/iptables -X fooX89041
+ [ -n /sbin/tc ]
+ grep -q ^Usage
+ /sbin/tc filter add flow help
+ FLOW_FILTER=Yes
+ [ -n /sbin/tc ]
+ grep -q ^Usage
+ /sbin/tc filter add basic help
+ BASIC_FILTER=Yes
+ [ -n /sbin/ip ]
+ grep -q /MASK
+ /sbin/ip rule add help
+ FWMARK_RT_MASK=Yes
+ CAPVERSION=40427
+ sed -e s/-.*//
+ uname -r
+ KERNELVERSION=3.0
+ sed -e s/^\([0-9][0-9]*\)\.\([0-9][0-9]*\).*$/\1 \2/g
+ echo 3.0
+ printf %d%02d00 3 0
+ KERNELVERSION=30000
+ VERBOSITY=2
+ [ -n Yes ]
+ report_capabilities1
+ echo #
#
+ date
+ echo # Shorewall 4.4.27-Beta2 detected the following iptables/netfilter
capabilities - Sun Dec 11 23:44:14 GMT 2011
# Shorewall 4.4.27-Beta2 detected the following iptables/netfilter capabilities
- Sun Dec 11 23:44:14 GMT 2011
+ echo #
#
+ report_capability1 NAT_ENABLED
+ eval echo NAT_ENABLED=$NAT_ENABLED
+ echo NAT_ENABLED=Yes
NAT_ENABLED=Yes
+ report_capability1 MANGLE_ENABLED
+ eval echo MANGLE_ENABLED=$MANGLE_ENABLED
+ echo MANGLE_ENABLED=Yes
MANGLE_ENABLED=Yes
+ report_capability1 MULTIPORT
+ eval echo MULTIPORT=$MULTIPORT
+ echo MULTIPORT=Yes
MULTIPORT=Yes
+ report_capability1 XMULTIPORT
+ eval echo XMULTIPORT=$XMULTIPORT
+ echo XMULTIPORT=Yes
XMULTIPORT=Yes
+ report_capability1 CONNTRACK_MATCH
+ eval echo CONNTRACK_MATCH=$CONNTRACK_MATCH
+ echo CONNTRACK_MATCH=Yes
CONNTRACK_MATCH=Yes
+ report_capability1 NEW_CONNTRACK_MATCH
+ eval echo NEW_CONNTRACK_MATCH=$NEW_CONNTRACK_MATCH
+ echo NEW_CONNTRACK_MATCH=Yes
NEW_CONNTRACK_MATCH=Yes
+ report_capability1 OLD_CONNTRACK_MATCH
+ eval echo OLD_CONNTRACK_MATCH=$OLD_CONNTRACK_MATCH
+ echo OLD_CONNTRACK_MATCH=
OLD_CONNTRACK_MATCH=
+ report_capability1 USEPKTTYPE
+ eval echo USEPKTTYPE=$USEPKTTYPE
+ echo USEPKTTYPE=Yes
USEPKTTYPE=Yes
+ report_capability1 POLICY_MATCH
+ eval echo POLICY_MATCH=$POLICY_MATCH
+ echo POLICY_MATCH=Yes
POLICY_MATCH=Yes
+ report_capability1 PHYSDEV_MATCH
+ eval echo PHYSDEV_MATCH=$PHYSDEV_MATCH
+ echo PHYSDEV_MATCH=Yes
PHYSDEV_MATCH=Yes
+ report_capability1 PHYSDEV_BRIDGE
+ eval echo PHYSDEV_BRIDGE=$PHYSDEV_BRIDGE
+ echo PHYSDEV_BRIDGE=Yes
PHYSDEV_BRIDGE=Yes
+ report_capability1 LENGTH_MATCH
+ eval echo LENGTH_MATCH=$LENGTH_MATCH
+ echo LENGTH_MATCH=Yes
LENGTH_MATCH=Yes
+ report_capability1 IPRANGE_MATCH
+ eval echo IPRANGE_MATCH=$IPRANGE_MATCH
+ echo IPRANGE_MATCH=Yes
IPRANGE_MATCH=Yes
+ report_capability1 RECENT_MATCH
+ eval echo RECENT_MATCH=$RECENT_MATCH
+ echo RECENT_MATCH=Yes
RECENT_MATCH=Yes
+ report_capability1 OWNER_MATCH
+ eval echo OWNER_MATCH=$OWNER_MATCH
+ echo OWNER_MATCH=Yes
OWNER_MATCH=Yes
+ report_capability1 IPSET_MATCH
+ eval echo IPSET_MATCH=$IPSET_MATCH
+ echo IPSET_MATCH=Yes
IPSET_MATCH=Yes
+ report_capability1 OLD_IPSET_MATCH
+ eval echo OLD_IPSET_MATCH=$OLD_IPSET_MATCH
+ echo OLD_IPSET_MATCH=
OLD_IPSET_MATCH=
+ report_capability1 CONNMARK
+ eval echo CONNMARK=$CONNMARK
+ echo CONNMARK=Yes
CONNMARK=Yes
+ report_capability1 XCONNMARK
+ eval echo XCONNMARK=$XCONNMARK
+ echo XCONNMARK=Yes
XCONNMARK=Yes
+ report_capability1 CONNMARK_MATCH
+ eval echo CONNMARK_MATCH=$CONNMARK_MATCH
+ echo CONNMARK_MATCH=Yes
CONNMARK_MATCH=Yes
+ report_capability1 XCONNMARK_MATCH
+ eval echo XCONNMARK_MATCH=$XCONNMARK_MATCH
+ echo XCONNMARK_MATCH=Yes
XCONNMARK_MATCH=Yes
+ report_capability1 RAW_TABLE
+ eval echo RAW_TABLE=$RAW_TABLE
+ echo RAW_TABLE=Yes
RAW_TABLE=Yes
+ report_capability1 RAWPOST_TABLE
+ eval echo RAWPOST_TABLE=$RAWPOST_TABLE
+ echo RAWPOST_TABLE=Yes
RAWPOST_TABLE=Yes
+ report_capability1 IPP2P_MATCH
+ eval echo IPP2P_MATCH=$IPP2P_MATCH
+ echo IPP2P_MATCH=
IPP2P_MATCH=
+ report_capability1 OLD_IPP2P_MATCH
+ eval echo OLD_IPP2P_MATCH=$OLD_IPP2P_MATCH
+ echo OLD_IPP2P_MATCH=
OLD_IPP2P_MATCH=
+ report_capability1 CLASSIFY_TARGET
+ eval echo CLASSIFY_TARGET=$CLASSIFY_TARGET
+ echo CLASSIFY_TARGET=Yes
CLASSIFY_TARGET=Yes
+ report_capability1 ENHANCED_REJECT
+ eval echo ENHANCED_REJECT=$ENHANCED_REJECT
+ echo ENHANCED_REJECT=Yes
ENHANCED_REJECT=Yes
+ report_capability1 KLUDGEFREE
+ eval echo KLUDGEFREE=$KLUDGEFREE
+ echo KLUDGEFREE=Yes
KLUDGEFREE=Yes
+ report_capability1 MARK
+ eval echo MARK=$MARK
+ echo MARK=Yes
MARK=Yes
+ report_capability1 XMARK
+ eval echo XMARK=$XMARK
+ echo XMARK=Yes
XMARK=Yes
+ report_capability1 EXMARK
+ eval echo EXMARK=$EXMARK
+ echo EXMARK=Yes
EXMARK=Yes
+ report_capability1 MANGLE_FORWARD
+ eval echo MANGLE_FORWARD=$MANGLE_FORWARD
+ echo MANGLE_FORWARD=Yes
MANGLE_FORWARD=Yes
+ report_capability1 COMMENTS
+ eval echo COMMENTS=$COMMENTS
+ echo COMMENTS=Yes
COMMENTS=Yes
+ report_capability1 ADDRTYPE
+ eval echo ADDRTYPE=$ADDRTYPE
+ echo ADDRTYPE=Yes
ADDRTYPE=Yes
+ report_capability1 TCPMSS_MATCH
+ eval echo TCPMSS_MATCH=$TCPMSS_MATCH
+ echo TCPMSS_MATCH=Yes
TCPMSS_MATCH=Yes
+ report_capability1 HASHLIMIT_MATCH
+ eval echo HASHLIMIT_MATCH=$HASHLIMIT_MATCH
+ echo HASHLIMIT_MATCH=Yes
HASHLIMIT_MATCH=Yes
+ report_capability1 OLD_HL_MATCH
+ eval echo OLD_HL_MATCH=$OLD_HL_MATCH
+ echo OLD_HL_MATCH=
OLD_HL_MATCH=
+ report_capability1 NFQUEUE_TARGET
+ eval echo NFQUEUE_TARGET=$NFQUEUE_TARGET
+ echo NFQUEUE_TARGET=Yes
NFQUEUE_TARGET=Yes
+ report_capability1 REALM_MATCH
+ eval echo REALM_MATCH=$REALM_MATCH
+ echo REALM_MATCH=Yes
REALM_MATCH=Yes
+ report_capability1 HELPER_MATCH
+ eval echo HELPER_MATCH=$HELPER_MATCH
+ echo HELPER_MATCH=Yes
HELPER_MATCH=Yes
+ report_capability1 CONNLIMIT_MATCH
+ eval echo CONNLIMIT_MATCH=$CONNLIMIT_MATCH
+ echo CONNLIMIT_MATCH=Yes
CONNLIMIT_MATCH=Yes
+ report_capability1 TIME_MATCH
+ eval echo TIME_MATCH=$TIME_MATCH
+ echo TIME_MATCH=Yes
TIME_MATCH=Yes
+ report_capability1 GOTO_TARGET
+ eval echo GOTO_TARGET=$GOTO_TARGET
+ echo GOTO_TARGET=Yes
GOTO_TARGET=Yes
+ report_capability1 LOGMARK_TARGET
+ eval echo LOGMARK_TARGET=$LOGMARK_TARGET
+ echo LOGMARK_TARGET=
LOGMARK_TARGET=
+ report_capability1 IPMARK_TARGET
+ eval echo IPMARK_TARGET=$IPMARK_TARGET
+ echo IPMARK_TARGET=
IPMARK_TARGET=
+ report_capability1 LOG_TARGET
+ eval echo LOG_TARGET=$LOG_TARGET
+ echo LOG_TARGET=Yes
LOG_TARGET=Yes
+ report_capability1 ULOG_TARGET
+ eval echo ULOG_TARGET=$ULOG_TARGET
+ echo ULOG_TARGET=Yes
ULOG_TARGET=Yes
+ report_capability1 NFLOG_TARGET
+ eval echo NFLOG_TARGET=$NFLOG_TARGET
+ echo NFLOG_TARGET=Yes
NFLOG_TARGET=Yes
+ report_capability1 PERSISTENT_SNAT
+ eval echo PERSISTENT_SNAT=$PERSISTENT_SNAT
+ echo PERSISTENT_SNAT=Yes
PERSISTENT_SNAT=Yes
+ report_capability1 TPROXY_TARGET
+ eval echo TPROXY_TARGET=$TPROXY_TARGET
+ echo TPROXY_TARGET=Yes
TPROXY_TARGET=Yes
+ report_capability1 FLOW_FILTER
+ eval echo FLOW_FILTER=$FLOW_FILTER
+ echo FLOW_FILTER=Yes
FLOW_FILTER=Yes
+ report_capability1 FWMARK_RT_MASK
+ eval echo FWMARK_RT_MASK=$FWMARK_RT_MASK
+ echo FWMARK_RT_MASK=Yes
FWMARK_RT_MASK=Yes
+ report_capability1 MARK_ANYWHERE
+ eval echo MARK_ANYWHERE=$MARK_ANYWHERE
+ echo MARK_ANYWHERE=Yes
MARK_ANYWHERE=Yes
+ report_capability1 HEADER_MATCH
+ eval echo HEADER_MATCH=$HEADER_MATCH
+ echo HEADER_MATCH=
HEADER_MATCH=
+ report_capability1 ACCOUNT_TARGET
+ eval echo ACCOUNT_TARGET=$ACCOUNT_TARGET
+ echo ACCOUNT_TARGET=
ACCOUNT_TARGET=
+ report_capability1 AUDIT_TARGET
+ eval echo AUDIT_TARGET=$AUDIT_TARGET
+ echo AUDIT_TARGET=
AUDIT_TARGET=
+ report_capability1 IPSET_V5
+ eval echo IPSET_V5=$IPSET_V5
+ echo IPSET_V5=Yes
IPSET_V5=Yes
+ report_capability1 CONDITION_MATCH
+ eval echo CONDITION_MATCH=$CONDITION_MATCH
+ echo CONDITION_MATCH=
CONDITION_MATCH=
+ report_capability1 IPTABLES_S
+ eval echo IPTABLES_S=$IPTABLES_S
+ echo IPTABLES_S=Yes
IPTABLES_S=Yes
+ report_capability1 BASIC_FILTER
+ eval echo BASIC_FILTER=$BASIC_FILTER
+ echo BASIC_FILTER=Yes
BASIC_FILTER=Yes
+ report_capability1 CT_TARGET
+ eval echo CT_TARGET=$CT_TARGET
+ echo CT_TARGET=Yes
CT_TARGET=Yes
+ echo CAPVERSION=40427
CAPVERSION=40427
+ echo KERNELVERSION=30000
KERNELVERSION=30000
###############################################################################
#
# Shorewall Version 4 -- /etc/shorewall/shorewall.conf
#
# For information about the settings in this file, type "man shorewall.conf"
#
# Manpage also online at http://www.shorewall.net/manpages/shorewall.conf.html
###############################################################################
# S T A R T U P E N A B L E D
###############################################################################
STARTUP_ENABLED=Yes
###############################################################################
# V E R B O S I T Y
###############################################################################
VERBOSITY=1
###############################################################################
# L O G G I N G
###############################################################################
BLACKLIST_LOGLEVEL=
LOG_MARTIANS=Yes
LOG_VERBOSITY=2
LOGALLNEW=
LOGFILE=/var/log/messages
LOGFORMAT="Shorewall:%s:%s:"
LOGTAGONLY=No
LOGLIMIT=
MACLIST_LOG_LEVEL=info
SFILTER_LOG_LEVEL=info
SMURF_LOG_LEVEL=info
STARTUP_LOG=/var/log/shorewall-init.log
TCP_FLAGS_LOG_LEVEL=info
###############################################################################
# L O C A T I O N O F F I L E S A N D D I R E C T O R I E S
###############################################################################
CONFIG_PATH="/etc/shorewall:/usr/share/shorewall"
IPTABLES=/usr/local/sbin/iptables
IP=
IPSET=
MODULESDIR=
PATH="/sbin:/bin:/usr/sbin:/usr/bin:/usr/local/bin:/usr/local/sbin"
PERL=/usr/bin/perl
RESTOREFILE=
SHOREWALL_SHELL=/bin/sh
SUBSYSLOCK=
TC=
###############################################################################
# D E F A U L T A C T I O N S / M A C R O S
###############################################################################
ACCEPT_DEFAULT=none
DROP_DEFAULT=Drop
NFQUEUE_DEFAULT=none
QUEUE_DEFAULT=none
REJECT_DEFAULT=Reject
###############################################################################
# R S H / R C P C O M M A N D S
###############################################################################
RCP_COMMAND='scp ${files} ${root}@${system}:${destination}'
RSH_COMMAND='ssh ${root}@${system} ${command}'
###############################################################################
# F I R E W A L L O P T I O N S
###############################################################################
ACCOUNTING=Yes
ACCOUNTING_TABLE=filter
ADD_IP_ALIASES=No
ADD_SNAT_ALIASES=No
ADMINISABSENTMINDED=Yes
AUTO_COMMENT=Yes
AUTOMAKE=Yes
BLACKLISTNEWONLY=Yes
CLAMPMSS=No
CLEAR_TC=Yes
COMPLETE=No
DELETE_THEN_ADD=Yes
DETECT_DNAT_IPADDRS=No
DISABLE_IPV6=No
DONT_LOAD=
DYNAMIC_BLACKLIST=Yes
EXPAND_POLICIES=Yes
EXPORTMODULES=Yes
FASTACCEPT=No
FORWARD_CLEAR_MARK=
IMPLICIT_CONTINUE=No
IP_FORWARDING=On
KEEP_RT_TABLES=No
LEGACY_FASTSTART=Yes
LOAD_HELPERS_ONLY=No
MACLIST_TABLE=filter
MACLIST_TTL=
MANGLE_ENABLED=Yes
MAPOLDACTIONS=No
MARK_IN_FORWARD_CHAIN=No
MODULE_SUFFIX=ko
MULTICAST=No
MUTEX_TIMEOUT=60
NULL_ROUTE_RFC1918=No
OPTIMIZE=15
OPTIMIZE_ACCOUNTING=No
REQUIRE_INTERFACE=No
RESTORE_DEFAULT_ROUTE=Yes
RETAIN_ALIASES=No
ROUTE_FILTER=No
SAVE_IPSETS=No
TC_ENABLED=Internal
TC_EXPERT=No
TC_PRIOMAP="2 3 3 3 2 3 1 1 2 2 2 2 2 2 2 2"
TRACK_PROVIDERS=No
USE_DEFAULT_RT=No
ZONE2ZONE=2
###############################################################################
# P A C K E T D I S P O S I T I O N
###############################################################################
BLACKLIST_DISPOSITION=DROP
MACLIST_DISPOSITION=REJECT
SMURF_DISPOSITION=DROP
SFILTER_DISPOSITION=DROP
TCP_FLAGS_DISPOSITION=DROP
################################################################################
# P A C K E T M A R K L A Y O U T
################################################################################
TC_BITS=8
PROVIDER_BITS=8
PROVIDER_OFFSET=0
MASK_BITS=8
ZONE_BITS=0
################################################################################
# L E G A C Y O P T I O N
# D O N O T D E L E T E O R A L T E R
################################################################################
IPSECFILE=zones
------------------------------------------------------------------------------
Learn Windows Azure Live! Tuesday, Dec 13, 2011
Microsoft is holding a special Learn Windows Azure training event for
developers. It will provide a great way to learn Windows Azure and what it
provides. You can attend the event by watching it streamed LIVE online.
Learn more at http://p.sf.net/sfu/ms-windowsazure
_______________________________________________
Shorewall-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-devel