> I'm unable to reproduce that problem.
>
Test case? If so, what would you like me to include (what is the likely
cause of this)?
>> 2. "-r" and "-T" shorewall update options are not documented.
>>
>
> The last sentence in the 'update' section of the manpage is:
>
> For a description of the other options, see the check command above.
>
Noted.
> If you want the tcp-ack filter to have priority 1, specify it as
> tcp-ack(1)
>
I thought that is what the "priority" column is for, isn't that the
case? From the shorewall-tcclasses man page:
PRIORITY - priority
[...]
For both HTB and HFSC, the priority is used to calculate the priority of
following Shorewall-generated classification filters that refer to the
class:
* Packet MARK
* tcp-ack and the tos options (see below)
Setting "tcp-ack:1" does indeed suppress that message, though I am
intrigued as to why the priority specified in the "priority" column is
disregarded?
> That's an error in the manpage -- to use NFLOG, specify "LOG:NFLOG(1,0,1)".
>
Taking into account your latest response on this - I'll use
"NFLOG(1,0,1)" and see if that does the job.
> Use "LOG:<level>!" (note the '!'). e.g., 'LOG:NFLOG(2,0,1)!'
>
Noted, though I have some reservations about using actions - see below.
> Again, USE_ACTIONS=No is no longer supported. I'll correct the manpage.
>
OK, the way I understand it, I could only use actions in my policy file,
right? If so, I am going to have another set of problems:
Currently, by its own definition, shorewall macros can "assign" log
levels "automatically" to all operators in that macro. For example, if I
have the following:
macro.C_MACRO
~~~~~~~~~~~~~
LOG
NFLOG(1,0,1)
NFLOG(2,0,1)
DROP
and then call it with "C_MACRO:info" in, say, my "rules" file, this will
pass this log level (info) "automatically" to LOG (the first operator of
C_MACRO) as well as the DROP statement (and create an additional -
standard LOG jump) before the packet is dropped.
If I use action, how can I achieve this? This is particularly evident in
the policy file: When I use "$FW net DROP:C_ACTION info" I would expect
the "info" log level to be, somehow, passed to C_ACTION. That doesn't
happen though - all I get is a jump to the C_ACTION chain and then I
have an additional LOG in fw2net chain itself - completely detached from
C_ACTION.
There is additional benefit of using macros as far as I can see: when I
use macro, the "code" of that macro is inserted "inline". That has the
added benefit of creating the appropriate "labels" and comments for the
chain in which this macro originated. In other words, when I use
rules
~~~~
C_MACRO:info $FW net
This will create 5 inline statements, like so:
-A fw2net -j LOG --log-level 6 --log-prefix "Shorewall:fw2net:LOG:" -m
comment --comment "C_MACRO"
-A fw2net -j NFLOG --nflog-group 1 --nflog-range 0 --nflog-threshold 1
--nflog-prefix "Shorewall:fw2net:LOG:" -m comment --comment "C_MACRO"
-A fw2net -j NFLOG --nflog-group 2 --nflog-range 0 --nflog-threshold 1
--nflog-prefix "Shorewall:fw2net:LOG:" -m comment --comment "C_MACRO"
-A fw2net -j LOG --log-level 6 --log-prefix "Shorewall:fw2net:DROP:" -m
comment --comment "C_MACRO"
-A fw2net -j DROP -m comment --comment "C_MACRO"
Note the "nflog-prefix", "log-prefix" and "comment" - they are all
"tailored" specifically for the chain in which I use that macro - very
handy since if I am going to use one macro across the board, the chain
from which this call originated could be easily identified
("Shorewall:fw2net:LOG:" and "Shorewall:fw2net:DROP:"). If I use action
instead, that won't be possible since I am going to get this instead:
-A C_ACTION -j NFLOG --nflog-group 1 --nflog-range 0 --nflog-threshold 1
--nflog-prefix "Shorewall:C_ACTION:LOG:"
-A C_ACTION -j NFLOG --nflog-group 2 --nflog-range 0 --nflog-threshold 1
--nflog-prefix "Shorewall:C_ACTION:LOG:"
Notice the nflog-prefix (Shorewall:C_ACTION:LOG:) - there is no way I
could identify which chain the packet originated from and there is no
comment there either.
This might not sound like a big deal, but when I wish to use a single
macro in various policy statements for different directions ($FW->net,
net->$FW etc), when I get a packet logged, I won't know which chain this
packet originated from, or, at the very least, I have to scratch my head
to find out. If I were able to deploy macros in the "policy" instead,
this problem goes away as the macro will be included "inline" with the
appropriate labels and comments to boot.
> Patch attached. The new suffixes are:
>
> :U (UNTRACKED)
> :NU (NEW,UNTRACKED)
> :NIU (NEW,INVALID,UNTRACKED)
>
Noted, I'll test this later.
> Patch attached. Adds a DROP action to the format-2 conntrack file.
>
Noted, wasn't aware of the "conntrack" file, but I'll test this as well
- I take it the support for ipsets is there, right?
------------------------------------------------------------------------------
Monitor your physical, virtual and cloud infrastructure from a single
web console. Get in-depth insight into apps, servers, databases, vmware,
SAP, cloud infrastructure, etc. Download 30-day Free Trial.
Pricing starts from $795 for 25 servers or applications!
http://p.sf.net/sfu/zoho_dev2dev_nov
_______________________________________________
Shorewall-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-devel