-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Shorewall 5.1.1 is now available for download.

Problems Corrected:

1)  This release contains defect repair up through Shorewall 5.1.0.1.

2)  Previously, expanded variables would be enclosed in single quotes
    in ?ERROR, ?WARNING and ?INFO directive output. That has been
    corrected.

3)  The obsolete Drop and Reject macros have been removed (Drop and
    Reject are now actions rather than macros).

4)  A typo has been corrected in the parameter descriptions in
    action.Drop and action.Reject.

New Features:

1)  Previously, the compiler did not check for routefilter/provider
    issues. Now, a fatal compilation error is raised in the following
    cases:

    a)  USE_DEFAULT_RT=Yes, ROUTE_FILTER=Yes in shorewall.conf and a
        regular provider (not tproxy) is defined in the
        providers file.

    b)  USE_DEFAULT_RT=Yes and a provider interface specifies a
        non-zero value for the 'routefilter' option in the interfaces
        file.

    c)  USE_DEFAULT_RT=No, ROUTE_FILTER=Yes in shorewall.conf, and
        a provider interface doesn't specify the 'balance' or 'primary'
        option in the providers file.

    d)  USE_DEFAULT_RT=No, a provider interface specifies the non-zero
        value for the 'routefilter' option in the interfaces file but
        does not specify the 'balance' or 'primary' option in the
        providers file.

2)  When 'routefilter' is specified by itself or with a non-zero value
    (e.g., routefilter=1), the 'logmartians' option is now also set
    implicitly when LOG_MARTIANS=No. If you actually want route
    filtering without logging, then you must also include
    'logmartians=0'.

3)  Since the creation of the USE_DEFAULT_RT option, when
    USE_DEFAULT_RT=Yes, 'balance=1' is assumed on all provider
    interfaces unless 'fallback', 'load', 'primary', 'loose' or
    'tproxy' is specified. This makes it awkward to define a provider
    that does not generate a default route in either the 'balance' or
    'default' routing tables; it is necessary to specify 'loose' then
    add the routing rules that are suppressed by that option.

    To address this issue, it is now possible to specify
    BALANCE_PROVIDERS=No. When BALANCE_PROVIDERS=No and none of the
    above-listed options is specified, the provider will generate no
    entry in the 'balance' or 'default routing tables irrespective of
    the setting of USE_DEFAULT_RT.

    All of the released shorewall[6].conf files now specify
    BALANCE_PROVIDERS=No. The default value is the effective setting of
    USE_DEFAULT_RT to provide backward compatibility with earlier
    releases.

4)  When using ipset-based dynamic blacklisting, it is now possible to
    specify BLACKLIST in the POLICY column of policy files. When
    BLACKLIST is specified, the source IP address is automatically
    added to the dynamic blacklist ipset and then the packet is
    dropped. This new policy adds BLACKLIST_DEFAULT to
    shorewall[6].conf; the default setting is "Drop".

5)  A BLACKLIST action has been added; the action adds the sender to
    the dynamic blacklist IPSET.

    BLACKLIST accepts two optional argument:

    1 - Action to take after adding the sender to the ipset. Default is
        DROP.
    2 - specifies the timeout for the added/updated entry.

    If no timeout is passed, the one specified in
    DYNAMIC_BLACKLIST, if any, is used. Otherwise, the one specified
    when the ipset was created, if any, is used.

6)  Given that there was already a BLACKLIST macro which implemented
    the BLACKLIST action in blrules, the preceding change required that
    BLACKLIST behave differently when invoked from the blrules file and
    when invoked from the rules file. Because BLACKLIST invoked from
    the rules file normally generates two rules, an action (not
    inlined) is more appropriate there than is a macro. When it is
    invoked from the blrules file, it only generates a single rule so
    the optimizer will inline it anyway.

    For historical reasons, the compiler treats the blrules file as if
    it were the section BLACKLIST in the rules file. So, to implement
    this dual behavior in the BLACKLIST action, a new 'section' option
    has been added in the action file. When 'section' is specified, the
    name of the current section and a comma are prepended to the
    argument list passed when invoking the action. The action.BLACKLIST
    file then has the following structure:

         ?if @1 eq 'BLACKLIST'
            <logic to generate rule from the blrules file>
         ?else
            <logic to generate rules from the rules file>
         ?endif

7)  There is now a 'show action <action>' command for Shorewall and
    Shorewall6. The command displays the action file for the specified
    <action>.

Thank you for using Shorewall.

- -Tom
- -- 
Tom Eastep        \ When I die, I want to go like my Grandfather who
Shoreline,         \ died peacefully in his sleep. Not screaming like
Washington, USA     \ all of the passengers in his car
http://shorewall.net \________________________________________________
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
Comment: GPGTools - http://gpgtools.org
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=mazd
-----END PGP SIGNATURE-----

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, SlashDot.org! http://sdm.link/slashdot
_______________________________________________
Shorewall-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-devel

Reply via email to