Title: [New Vision] - Vorlage GmbH mit LOGO
Tom Eastep schrieb:
On Fri, 2007-08-24 at 18:21 +0200, Philipp Rusch wrote:
  
Tom Eastep schrieb: 
    
On Fri, 2007-08-24 at 11:22 +0200, Philipp Rusch wrote:
  
      
Shorewall 3.4.6 running on SuSE Linux 10.2

Compiling Rule Activation...
Shorewall configuration compiled to /var/lib/shorewall/.restart
Processing /etc/shorewall/params ...
Restarting Shorewall....
/sbin/shorewall: line 665:  6782 Segmentation
fault     $SHOREWALL_SHELL ${VARDIR}/.restart $debugging restart


got this with V3.4.4, updated to 3.4.6 this morning, but that didn't
help.
Does anybody have any hint for me ?
    
        
Afraid not -- a trace would be useful when you get on-site.

-Tom
  
      
Tom,
the trace is 42 MB - too big to send in one piece, so what do you need
as extract ?
    

Let's start with the last 1000 lines or so.

-Tom
  
Oh, I did not get/read this one, so I'm sending this now, the last 1000 lines ...
--
Mit freundlichen Grüßen,
Philipp Rusch

New Vision GmbH                                               
Neue Mitte 3
D-35415 Pohlheim, Germany                    
Fon:      +49 (0)6403 969 08 56
Fax:      +49 (0)6403 969 08 57
Mobile : +49 (0)172 89 86 230 
New Vision Logo
HRB 6415 Gießen
Ust.-ID: DE 814 629 367
Web   : www.newvision-it.de
Mailto : [EMAIL PROTECTED]


Diese E-Mail enthält vertrauliche und/oder rechtlich geschützteInformationen. Wenn Sie nicht der richtige 
Adressat sind oder diese E-Mail irrtümlich erhalten haben, informieren Sie bitte den Absender und vernichten 
Sie diese E-Mail. Das unerlaubte Kopieren sowie die unbefugte Weitergabe dieser E-Mail ist nicht gestattet.

This e-mail may contain confidential and/or privileged information. If you are not the intended recipient 
(or have received this e-mail in error) please notify the sender and destroy this e-mail. Any unauthorised 
copying, disclosure or distribution of the material in this e-mail is strictly forbidden.
+++ local c=tun3
+++ true
+++ case $c in
+++ echo tun3
+++ return
++ echo tun3_in
+ run_iptables -A INPUT -i tun3 -j tun3_in
+ '[' -z '' ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/physdev ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/iprange ']'
+ save_command 'run_iptables -A' INPUT -i tun3 -j tun3_in
+ '[' 6 -gt 0 ']'
+ echo '    run_iptables -A' INPUT -i tun3 -j tun3_in
++ out_chain tun3
+++ chain_base tun3
+++ local c=tun3
+++ true
+++ case $c in
+++ echo tun3
+++ return
++ echo tun3_out
+ run_iptables -A OUTPUT -o tun3 -j tun3_out
+ '[' -z '' ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/physdev ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/iprange ']'
+ save_command 'run_iptables -A' OUTPUT -o tun3 -j tun3_out
+ '[' 6 -gt 0 ']'
+ echo '    run_iptables -A' OUTPUT -o tun3 -j tun3_out
++ masq_chain tun3
+++ chain_base tun3
+++ local c=tun3
+++ true
+++ case $c in
+++ echo tun3
+++ return
++ echo tun3_masq
+ addnatjump POSTROUTING tun3_masq -o tun3
+ local sourcechain=POSTROUTING destchain=tun3_masq
+ shift
+ shift
+ havenatchain tun3_masq
+ eval test '"$exists_nat_tun3_masq"' = Yes
++ test '' = Yes
+ '[' -z '' ']'
+ '[' -n Yes -a -f /tmp/shorewall.OM8226/physdev ']'
+ '[' -n Yes -a -f /tmp/shorewall.OM8226/iprange ']'
+ for interface in '$ALL_INTERFACES'
++ forward_chain tun4
+++ chain_base tun4
+++ local c=tun4
+++ true
+++ case $c in
+++ echo tun4
+++ return
++ echo tun4_fwd
+ run_iptables -A FORWARD -i tun4 -j tun4_fwd
+ '[' -z '' ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/physdev ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/iprange ']'
+ save_command 'run_iptables -A' FORWARD -i tun4 -j tun4_fwd
+ '[' 6 -gt 0 ']'
+ echo '    run_iptables -A' FORWARD -i tun4 -j tun4_fwd
++ input_chain tun4
+++ chain_base tun4
+++ local c=tun4
+++ true
+++ case $c in
+++ echo tun4
+++ return
++ echo tun4_in
+ run_iptables -A INPUT -i tun4 -j tun4_in
+ '[' -z '' ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/physdev ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/iprange ']'
+ save_command 'run_iptables -A' INPUT -i tun4 -j tun4_in
+ '[' 6 -gt 0 ']'
+ echo '    run_iptables -A' INPUT -i tun4 -j tun4_in
++ out_chain tun4
+++ chain_base tun4
+++ local c=tun4
+++ true
+++ case $c in
+++ echo tun4
+++ return
++ echo tun4_out
+ run_iptables -A OUTPUT -o tun4 -j tun4_out
+ '[' -z '' ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/physdev ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/iprange ']'
+ save_command 'run_iptables -A' OUTPUT -o tun4 -j tun4_out
+ '[' 6 -gt 0 ']'
+ echo '    run_iptables -A' OUTPUT -o tun4 -j tun4_out
++ masq_chain tun4
+++ chain_base tun4
+++ local c=tun4
+++ true
+++ case $c in
+++ echo tun4
+++ return
++ echo tun4_masq
+ addnatjump POSTROUTING tun4_masq -o tun4
+ local sourcechain=POSTROUTING destchain=tun4_masq
+ shift
+ shift
+ havenatchain tun4_masq
+ eval test '"$exists_nat_tun4_masq"' = Yes
++ test '' = Yes
+ '[' -z '' ']'
+ '[' -n Yes -a -f /tmp/shorewall.OM8226/physdev ']'
+ '[' -n Yes -a -f /tmp/shorewall.OM8226/iprange ']'
+ for interface in '$ALL_INTERFACES'
++ forward_chain tun5
+++ chain_base tun5
+++ local c=tun5
+++ true
+++ case $c in
+++ echo tun5
+++ return
++ echo tun5_fwd
+ run_iptables -A FORWARD -i tun5 -j tun5_fwd
+ '[' -z '' ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/physdev ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/iprange ']'
+ save_command 'run_iptables -A' FORWARD -i tun5 -j tun5_fwd
+ '[' 6 -gt 0 ']'
+ echo '    run_iptables -A' FORWARD -i tun5 -j tun5_fwd
++ input_chain tun5
+++ chain_base tun5
+++ local c=tun5
+++ true
+++ case $c in
+++ echo tun5
+++ return
++ echo tun5_in
+ run_iptables -A INPUT -i tun5 -j tun5_in
+ '[' -z '' ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/physdev ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/iprange ']'
+ save_command 'run_iptables -A' INPUT -i tun5 -j tun5_in
+ '[' 6 -gt 0 ']'
+ echo '    run_iptables -A' INPUT -i tun5 -j tun5_in
++ out_chain tun5
+++ chain_base tun5
+++ local c=tun5
+++ true
+++ case $c in
+++ echo tun5
+++ return
++ echo tun5_out
+ run_iptables -A OUTPUT -o tun5 -j tun5_out
+ '[' -z '' ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/physdev ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/iprange ']'
+ save_command 'run_iptables -A' OUTPUT -o tun5 -j tun5_out
+ '[' 6 -gt 0 ']'
+ echo '    run_iptables -A' OUTPUT -o tun5 -j tun5_out
++ masq_chain tun5
+++ chain_base tun5
+++ local c=tun5
+++ true
+++ case $c in
+++ echo tun5
+++ return
++ echo tun5_masq
+ addnatjump POSTROUTING tun5_masq -o tun5
+ local sourcechain=POSTROUTING destchain=tun5_masq
+ shift
+ shift
+ havenatchain tun5_masq
+ eval test '"$exists_nat_tun5_masq"' = Yes
++ test '' = Yes
+ '[' -z '' ']'
+ '[' -n Yes -a -f /tmp/shorewall.OM8226/physdev ']'
+ '[' -n Yes -a -f /tmp/shorewall.OM8226/iprange ']'
+ chain=fw2fw
+ havechain fw2fw
++ chain_base fw2fw
++ local c=fw2fw
++ true
++ case $c in
++ echo fw2fw
++ return
+ local c=fw2fw
+ eval test '"$exists_fw2fw"' = Yes
++ test '' = Yes
+ complete_standard_chain INPUT all fw
+ local policy=
+ local loglevel=
+ local policychain=
+ local default=
+ run_user_exit INPUT
++ find_file INPUT
++ local saveifs= directory
++ case $1 in
+++ split /etc/shorewall:/usr/share/shorewall
+++ local 'ifs=         
'
+++ IFS=:
+++ echo /etc/shorewall /usr/share/shorewall
+++ IFS='       
'
++ for directory in '$(split $CONFIG_PATH)'
++ '[' -f /etc/shorewall/INPUT ']'
++ for directory in '$(split $CONFIG_PATH)'
++ '[' -f /usr/share/shorewall/INPUT ']'
++ echo /etc/shorewall/INPUT
+ local user_exit=/etc/shorewall/INPUT
+ '[' -f /etc/shorewall/INPUT ']'
+ run_iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
+ '[' -z '' ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/physdev ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/iprange ']'
+ save_command 'run_iptables -A' INPUT -m state --state ESTABLISHED,RELATED -j 
ACCEPT
+ '[' 8 -gt 0 ']'
+ echo '    run_iptables -A' INPUT -m state --state ESTABLISHED,RELATED -j 
ACCEPT
+ eval 'policychain=$all2fw_policychain'
++ policychain=all2all
+ '[' -n all2all ']'
+ eval 'policy=$all2all_policy'
++ policy=REJECT
+ eval 'loglevel=$all2all_loglevel'
++ loglevel=info
+ eval 'default=$all2all_default'
++ default=Reject
+ eval
+ policy_rules INPUT REJECT info Reject
+ local target=REJECT
+ local default=Reject
+ '[' -n Reject ']'
+ '[' Reject = none ']'
+ run_iptables -A INPUT -j Reject
+ '[' -z '' ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/physdev ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/iprange ']'
+ save_command 'run_iptables -A' INPUT -j Reject
+ '[' 4 -gt 0 ']'
+ echo '    run_iptables -A' INPUT -j Reject
+ '[' 4 -ge 3 -a xinfo '!=' x- ']'
+ log_rule info INPUT REJECT
+ local level=info
+ local chain=INPUT
+ local disposition=REJECT
+ shift 3
+ log_rule_limit info INPUT INPUT REJECT '' '' -A
+ local level=info
+ local chain=INPUT
+ local displayChain=INPUT
+ local disposition=REJECT
+ local rulenum=
+ local limit=
+ local tag=
+ local command=-A
+ local prefix
++ chain_base INPUT
++ local c=INPUT
++ true
++ case $c in
++ echo INPUT
++ return
+ local base=INPUT
+ limit=
+ shift 7
++ fix_bang
++ local result=
++ '[' 0 -gt 0 ']'
++ echo
+ save_command 'do_log_rule_limit "info" "INPUT" "INPUT" "REJECT" "" "" "-A" '
+ '[' 1 -gt 0 ']'
+ echo '    do_log_rule_limit "info" "INPUT" "INPUT" "REJECT" "" "" "-A" '
+ '[' -n REJECT ']'
+ case $target in
+ run_iptables -A INPUT -j reject
+ '[' -z '' ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/physdev ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/iprange ']'
+ save_command 'run_iptables -A' INPUT -j reject
+ '[' 4 -gt 0 ']'
+ echo '    run_iptables -A' INPUT -j reject
+ complete_standard_chain OUTPUT fw all
+ local policy=
+ local loglevel=
+ local policychain=
+ local default=
+ run_user_exit OUTPUT
++ find_file OUTPUT
++ local saveifs= directory
++ case $1 in
+++ split /etc/shorewall:/usr/share/shorewall
+++ local 'ifs=         
'
+++ IFS=:
+++ echo /etc/shorewall /usr/share/shorewall
+++ IFS='       
'
++ for directory in '$(split $CONFIG_PATH)'
++ '[' -f /etc/shorewall/OUTPUT ']'
++ for directory in '$(split $CONFIG_PATH)'
++ '[' -f /usr/share/shorewall/OUTPUT ']'
++ echo /etc/shorewall/OUTPUT
+ local user_exit=/etc/shorewall/OUTPUT
+ '[' -f /etc/shorewall/OUTPUT ']'
+ run_iptables -A OUTPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
+ '[' -z '' ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/physdev ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/iprange ']'
+ save_command 'run_iptables -A' OUTPUT -m state --state ESTABLISHED,RELATED -j 
ACCEPT
+ '[' 8 -gt 0 ']'
+ echo '    run_iptables -A' OUTPUT -m state --state ESTABLISHED,RELATED -j 
ACCEPT
+ eval 'policychain=$fw2all_policychain'
++ policychain=all2all
+ '[' -n all2all ']'
+ eval 'policy=$all2all_policy'
++ policy=REJECT
+ eval 'loglevel=$all2all_loglevel'
++ loglevel=info
+ eval 'default=$all2all_default'
++ default=Reject
+ eval
+ policy_rules OUTPUT REJECT info Reject
+ local target=REJECT
+ local default=Reject
+ '[' -n Reject ']'
+ '[' Reject = none ']'
+ run_iptables -A OUTPUT -j Reject
+ '[' -z '' ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/physdev ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/iprange ']'
+ save_command 'run_iptables -A' OUTPUT -j Reject
+ '[' 4 -gt 0 ']'
+ echo '    run_iptables -A' OUTPUT -j Reject
+ '[' 4 -ge 3 -a xinfo '!=' x- ']'
+ log_rule info OUTPUT REJECT
+ local level=info
+ local chain=OUTPUT
+ local disposition=REJECT
+ shift 3
+ log_rule_limit info OUTPUT OUTPUT REJECT '' '' -A
+ local level=info
+ local chain=OUTPUT
+ local displayChain=OUTPUT
+ local disposition=REJECT
+ local rulenum=
+ local limit=
+ local tag=
+ local command=-A
+ local prefix
++ chain_base OUTPUT
++ local c=OUTPUT
++ true
++ case $c in
++ echo OUTPUT
++ return
+ local base=OUTPUT
+ limit=
+ shift 7
++ fix_bang
++ local result=
++ '[' 0 -gt 0 ']'
++ echo
+ save_command 'do_log_rule_limit "info" "OUTPUT" "OUTPUT" "REJECT" "" "" "-A" '
+ '[' 1 -gt 0 ']'
+ echo '    do_log_rule_limit "info" "OUTPUT" "OUTPUT" "REJECT" "" "" "-A" '
+ '[' -n REJECT ']'
+ case $target in
+ run_iptables -A OUTPUT -j reject
+ '[' -z '' ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/physdev ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/iprange ']'
+ save_command 'run_iptables -A' OUTPUT -j reject
+ '[' 4 -gt 0 ']'
+ echo '    run_iptables -A' OUTPUT -j reject
+ complete_standard_chain FORWARD all all
+ local policy=
+ local loglevel=
+ local policychain=
+ local default=
+ run_user_exit FORWARD
++ find_file FORWARD
++ local saveifs= directory
++ case $1 in
+++ split /etc/shorewall:/usr/share/shorewall
+++ local 'ifs=         
'
+++ IFS=:
+++ echo /etc/shorewall /usr/share/shorewall
+++ IFS='       
'
++ for directory in '$(split $CONFIG_PATH)'
++ '[' -f /etc/shorewall/FORWARD ']'
++ for directory in '$(split $CONFIG_PATH)'
++ '[' -f /usr/share/shorewall/FORWARD ']'
++ echo /etc/shorewall/FORWARD
+ local user_exit=/etc/shorewall/FORWARD
+ '[' -f /etc/shorewall/FORWARD ']'
+ run_iptables -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT
+ '[' -z '' ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/physdev ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/iprange ']'
+ save_command 'run_iptables -A' FORWARD -m state --state ESTABLISHED,RELATED 
-j ACCEPT
+ '[' 8 -gt 0 ']'
+ echo '    run_iptables -A' FORWARD -m state --state ESTABLISHED,RELATED -j 
ACCEPT
+ eval 'policychain=$all2all_policychain'
++ policychain=all2all
+ '[' -n all2all ']'
+ eval 'policy=$all2all_policy'
++ policy=REJECT
+ eval 'loglevel=$all2all_loglevel'
++ loglevel=info
+ eval 'default=$all2all_default'
++ default=Reject
+ eval
+ policy_rules FORWARD REJECT info Reject
+ local target=REJECT
+ local default=Reject
+ '[' -n Reject ']'
+ '[' Reject = none ']'
+ run_iptables -A FORWARD -j Reject
+ '[' -z '' ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/physdev ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/iprange ']'
+ save_command 'run_iptables -A' FORWARD -j Reject
+ '[' 4 -gt 0 ']'
+ echo '    run_iptables -A' FORWARD -j Reject
+ '[' 4 -ge 3 -a xinfo '!=' x- ']'
+ log_rule info FORWARD REJECT
+ local level=info
+ local chain=FORWARD
+ local disposition=REJECT
+ shift 3
+ log_rule_limit info FORWARD FORWARD REJECT '' '' -A
+ local level=info
+ local chain=FORWARD
+ local displayChain=FORWARD
+ local disposition=REJECT
+ local rulenum=
+ local limit=
+ local tag=
+ local command=-A
+ local prefix
++ chain_base FORWARD
++ local c=FORWARD
++ true
++ case $c in
++ echo FORWARD
++ return
+ local base=FORWARD
+ limit=
+ shift 7
++ fix_bang
++ local result=
++ '[' 0 -gt 0 ']'
++ echo
+ save_command 'do_log_rule_limit "info" "FORWARD" "FORWARD" "REJECT" "" "" 
"-A" '
+ '[' 1 -gt 0 ']'
+ echo '    do_log_rule_limit "info" "FORWARD" "FORWARD" "REJECT" "" "" "-A" '
+ '[' -n REJECT ']'
+ case $target in
+ run_iptables -A FORWARD -j reject
+ '[' -z '' ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/physdev ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/iprange ']'
+ save_command 'run_iptables -A' FORWARD -j reject
+ '[' 4 -gt 0 ']'
+ echo '    run_iptables -A' FORWARD -j reject
+ disable_critical_hosts
+ for chain in INPUT OUTPUT FORWARD
+ '[' -n '' ']'
+ run_iptables -D INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
+ '[' -z '' ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/physdev ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/iprange ']'
+ save_command 'run_iptables -D' INPUT -m state --state ESTABLISHED,RELATED -j 
ACCEPT
+ '[' 8 -gt 0 ']'
+ echo '    run_iptables -D' INPUT -m state --state ESTABLISHED,RELATED -j 
ACCEPT
+ run_iptables -D INPUT -p udp --dport 53 -j ACCEPT
+ '[' -z '' ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/physdev ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/iprange ']'
+ save_command 'run_iptables -D' INPUT -p udp --dport 53 -j ACCEPT
+ '[' 8 -gt 0 ']'
+ echo '    run_iptables -D' INPUT -p udp --dport 53 -j ACCEPT
+ for chain in INPUT OUTPUT FORWARD
+ '[' -n '' ']'
+ run_iptables -D OUTPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
+ '[' -z '' ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/physdev ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/iprange ']'
+ save_command 'run_iptables -D' OUTPUT -m state --state ESTABLISHED,RELATED -j 
ACCEPT
+ '[' 8 -gt 0 ']'
+ echo '    run_iptables -D' OUTPUT -m state --state ESTABLISHED,RELATED -j 
ACCEPT
+ run_iptables -D OUTPUT -p udp --dport 53 -j ACCEPT
+ '[' -z '' ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/physdev ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/iprange ']'
+ save_command 'run_iptables -D' OUTPUT -p udp --dport 53 -j ACCEPT
+ '[' 8 -gt 0 ']'
+ echo '    run_iptables -D' OUTPUT -p udp --dport 53 -j ACCEPT
+ for chain in INPUT OUTPUT FORWARD
+ '[' -n '' ']'
+ run_iptables -D FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT
+ '[' -z '' ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/physdev ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/iprange ']'
+ save_command 'run_iptables -D' FORWARD -m state --state ESTABLISHED,RELATED 
-j ACCEPT
+ '[' 8 -gt 0 ']'
+ echo '    run_iptables -D' FORWARD -m state --state ESTABLISHED,RELATED -j 
ACCEPT
+ run_iptables -D FORWARD -p udp --dport 53 -j ACCEPT
+ '[' -z '' ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/physdev ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/iprange ']'
+ save_command 'run_iptables -D' FORWARD -p udp --dport 53 -j ACCEPT
+ '[' 8 -gt 0 ']'
+ echo '    run_iptables -D' FORWARD -p udp --dport 53 -j ACCEPT
+ process_routestopped -D
+ local hosts= interface host host1 options networks source= dest= matched
+ read interface host options
+ '[' x192.168.115.0/24 = x- -o -z 192.168.115.0/24 ']'
++ separate_list 192.168.115.0/24
++ local list=192.168.115.0/24
++ local part
++ local newlist
++ local firstpart
++ local lastpart
++ local enclosure
++ case "$list" in
++ list=192.168.115.0/24
++ part=192.168.115.0/24
++ newlist=192.168.115.0/24
++ '[' x192.168.115.0/24 '!=' x192.168.115.0/24 ']'
++ echo 192.168.115.0/24
+ for h in '$(separate_list $host)'
+ hosts=' eth0:192.168.115.0/24'
+ routeback=
+ '[' -n '' ']'
+ read interface host options
+ for host in '$hosts'
+ interface=eth0
+ networks=192.168.115.0/24
++ source_ip_range 192.168.115.0/24
++ '[' 1 -gt 0 ']'
++ case $1 in
++ echo '-s 192.168.115.0/24'
+ source_range='-s 192.168.115.0/24'
++ dest_ip_range 192.168.115.0/24
++ '[' 1 -gt 0 ']'
++ case $1 in
++ echo '-d 192.168.115.0/24'
+ dest_range='-d 192.168.115.0/24'
+ run_iptables -D INPUT -i eth0 -s 192.168.115.0/24 -j ACCEPT
+ '[' -z '' ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/physdev ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/iprange ']'
+ save_command 'run_iptables -D' INPUT -i eth0 -s 192.168.115.0/24 -j ACCEPT
+ '[' 8 -gt 0 ']'
+ echo '    run_iptables -D' INPUT -i eth0 -s 192.168.115.0/24 -j ACCEPT
+ '[' -z Yes ']'
+ matched=
+ list_search eth0:192.168.115.0/24
+ local e=eth0:192.168.115.0/24
+ '[' 1 -gt 1 ']'
+ return 1
+ list_search eth0:192.168.115.0/24
+ local e=eth0:192.168.115.0/24
+ '[' 1 -gt 1 ']'
+ return 1
+ '[' -z '' ']'
+ for host1 in '$hosts'
+ '[' eth0:192.168.115.0/24 '!=' eth0:192.168.115.0/24 ']'
+ '[' -n '' ']'
+ for file in chains nat proxyarp zones
+ save_command 'cat > ${VARDIR}/chains << __EOF__'
+ '[' 1 -gt 0 ']'
+ echo '    cat > ${VARDIR}/chains << __EOF__'
+ cat /tmp/shorewall.OM8226/compiler_state//chains
+ save_command_unindented __EOF__
+ echo __EOF__
+ for file in chains nat proxyarp zones
+ save_command 'cat > ${VARDIR}/nat << __EOF__'
+ '[' 1 -gt 0 ']'
+ echo '    cat > ${VARDIR}/nat << __EOF__'
+ cat /tmp/shorewall.OM8226/compiler_state//nat
+ save_command_unindented __EOF__
+ echo __EOF__
+ for file in chains nat proxyarp zones
+ save_command 'cat > ${VARDIR}/proxyarp << __EOF__'
+ '[' 1 -gt 0 ']'
+ echo '    cat > ${VARDIR}/proxyarp << __EOF__'
+ cat /tmp/shorewall.OM8226/compiler_state//proxyarp
+ save_command_unindented __EOF__
+ echo __EOF__
+ for file in chains nat proxyarp zones
+ save_command 'cat > ${VARDIR}/zones << __EOF__'
+ '[' 1 -gt 0 ']'
+ echo '    cat > ${VARDIR}/zones << __EOF__'
+ cat /tmp/shorewall.OM8226/compiler_state//zones
+ save_command_unindented __EOF__
+ echo __EOF__
+ '[' -n '' ']'
+ cat
+ save_command 'date > ${VARDIR}/restarted'
+ '[' 1 -gt 0 ']'
+ echo '    date > ${VARDIR}/restarted'
+ append_file start
++ find_file start
++ local saveifs= directory
++ case $1 in
+++ split /etc/shorewall:/usr/share/shorewall
+++ local 'ifs=         
'
+++ IFS=:
+++ echo /etc/shorewall /usr/share/shorewall
+++ IFS='       
'
++ for directory in '$(split $CONFIG_PATH)'
++ '[' -f /etc/shorewall/start ']'
++ echo /etc/shorewall/start
++ return
+ local user_exit=/etc/shorewall/start
+ case $user_exit in
+ '[' -f /etc/shorewall/start ']'
+ save_progress_message 'Processing /etc/shorewall/start ...'
+ echo
+ echo '    progress_message2 "Processing /etc/shorewall/start ..."'
+ echo
+ indent1 /etc/shorewall/start
+ '[' -n '    ' ']'
+ '[' -n Yes ']'
+ eval awk ''\''BEGIN { indent=1; }; /^[[:space:]]*$/ { print ""; indent=1; 
next; }; { if (indent == 1) print "    " $0; else print; }; { indent=1; }; 
/\\$/ { indent=0; };'\''' /etc/shorewall/start
++ awk 'BEGIN { indent=1; }; /^[[:space:]]*$/ { print ""; indent=1; next; }; { 
if (indent == 1) print "    " $0; else print; }; { indent=1; }; /\\$/ { 
indent=0; };' /etc/shorewall/start
+ save_command
+ '[' 0 -gt 0 ']'
+ echo
+ '[' -n '' -a -s /tmp/shorewall.OM8226/blacklist ']'
+ createchain shorewall no
++ chain_base shorewall
++ local c=shorewall
++ true
++ case $c in
++ echo shorewall
++ return
+ local c=shorewall
+ run_iptables -N shorewall
+ '[' -z '' ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/physdev ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/iprange ']'
+ save_command 'run_iptables -N' shorewall
+ '[' 2 -gt 0 ']'
+ echo '    run_iptables -N' shorewall
+ '[' no = yes ']'
+ eval exists_shorewall=Yes
++ exists_shorewall=Yes
+ save_command set_state Started
+ '[' 2 -gt 0 ']'
+ echo '    set_state' Started
+ append_file started
++ find_file started
++ local saveifs= directory
++ case $1 in
+++ split /etc/shorewall:/usr/share/shorewall
+++ local 'ifs=         
'
+++ IFS=:
+++ echo /etc/shorewall /usr/share/shorewall
+++ IFS='       
'
++ for directory in '$(split $CONFIG_PATH)'
++ '[' -f /etc/shorewall/started ']'
++ echo /etc/shorewall/started
++ return
+ local user_exit=/etc/shorewall/started
+ case $user_exit in
+ '[' -f /etc/shorewall/started ']'
+ save_progress_message 'Processing /etc/shorewall/started ...'
+ echo
+ echo '    progress_message2 "Processing /etc/shorewall/started ..."'
+ echo
+ indent1 /etc/shorewall/started
+ '[' -n '    ' ']'
+ '[' -n Yes ']'
+ eval awk ''\''BEGIN { indent=1; }; /^[[:space:]]*$/ { print ""; indent=1; 
next; }; { if (indent == 1) print "    " $0; else print; }; { indent=1; }; 
/\\$/ { indent=0; };'\''' /etc/shorewall/started
++ awk 'BEGIN { indent=1; }; /^[[:space:]]*$/ { print ""; indent=1; next; }; { 
if (indent == 1) print "    " $0; else print; }; { indent=1; }; /\\$/ { 
indent=0; };' /etc/shorewall/started
+ save_command
+ '[' 0 -gt 0 ']'
+ echo
+ cat
+ compile_refresh_firewall
+ local INDENT=
+ local 'DOING=Compiling Refresh of'
+ local DONE=Compiled
+ local indent
+ save_command 'refresh_firewall()'
+ '[' 1 -gt 0 ']'
+ echo 'refresh_firewall()'
+ save_command '{'
+ '[' 1 -gt 0 ']'
+ echo '{'
+ INDENT='    '
+ append_file refresh
++ find_file refresh
++ local saveifs= directory
++ case $1 in
+++ split /etc/shorewall:/usr/share/shorewall
+++ local 'ifs=         
'
+++ IFS=:
+++ echo /etc/shorewall /usr/share/shorewall
+++ IFS='       
'
++ for directory in '$(split $CONFIG_PATH)'
++ '[' -f /etc/shorewall/refresh ']'
++ for directory in '$(split $CONFIG_PATH)'
++ '[' -f /usr/share/shorewall/refresh ']'
++ echo /etc/shorewall/refresh
+ local user_exit=/etc/shorewall/refresh
+ case $user_exit in
+ '[' -f /etc/shorewall/refresh ']'
+ save_command 'if chain_exists blacklst; then'
+ '[' 1 -gt 0 ']'
+ echo '    if chain_exists blacklst; then'
+ indent='    '
+ INDENT='        '
+ save_command progress_message2 '"Refreshing' Black 'List..."'
+ '[' 4 -gt 0 ']'
+ echo '        progress_message2' '"Refreshing' Black 'List..."'
+ run_iptables -F blacklst
+ '[' -z '' ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/physdev ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/iprange ']'
+ save_command 'run_iptables -F' blacklst
+ '[' 2 -gt 0 ']'
+ echo '        run_iptables -F' blacklst
+ '[' -s /tmp/shorewall.OM8226/blacklist ']'
+ INDENT='    '
+ save_command fi
+ '[' 1 -gt 0 ']'
+ echo '    fi'
++ find_file ecn
++ local saveifs= directory
++ case $1 in
+++ split /etc/shorewall:/usr/share/shorewall
+++ local 'ifs=         
'
+++ IFS=:
+++ echo /etc/shorewall /usr/share/shorewall
+++ IFS='       
'
++ for directory in '$(split $CONFIG_PATH)'
++ '[' -f /etc/shorewall/ecn ']'
++ echo /etc/shorewall/ecn
++ return
+ ecn=/etc/shorewall/ecn
+ '[' -f /etc/shorewall/ecn ']'
+ '[' -n Yes ']'
+ setup_ecn /etc/shorewall/ecn
+ local interfaces=
+ local hosts=
+ local h
+ '[' -s /tmp/shorewall.OM8226/ecn ']'
+ '[' -n Yes ']'
+ refresh_tc
+ local comment=
+ '[' -n Yes ']'
+ delete_tc
+ save_progress_message 'Clearing Traffic Control/QOS'
+ echo
+ echo '    progress_message2 "Clearing Traffic Control/QOS"'
+ echo
+ append_file tcclear
++ find_file tcclear
++ local saveifs= directory
++ case $1 in
+++ split /etc/shorewall:/usr/share/shorewall
+++ local 'ifs=         
'
+++ IFS=:
+++ echo /etc/shorewall /usr/share/shorewall
+++ IFS='       
'
++ for directory in '$(split $CONFIG_PATH)'
++ '[' -f /etc/shorewall/tcclear ']'
++ for directory in '$(split $CONFIG_PATH)'
++ '[' -f /usr/share/shorewall/tcclear ']'
++ echo /etc/shorewall/tcclear
+ local user_exit=/etc/shorewall/tcclear
+ case $user_exit in
+ '[' -f /etc/shorewall/tcclear ']'
+ indent
+ '[' -n '    ' ']'
+ eval sed ''\''s/^/    /'\'''
++ sed 's/^/    /'
+ save_command
+ '[' 0 -gt 0 ']'
+ echo
+ '[' -n '' ']'
+ chain=tcpre
+ '[' -n Yes ']'
+ run_iptables -t mangle -F tcfor
+ '[' -z '' ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/physdev ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/iprange ']'
+ save_command 'run_iptables -t' mangle -F tcfor
+ '[' 4 -gt 0 ']'
+ echo '    run_iptables -t' mangle -F tcfor
+ run_iptables -t mangle -F tcpost
+ '[' -z '' ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/physdev ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/iprange ']'
+ save_command 'run_iptables -t' mangle -F tcpost
+ '[' 4 -gt 0 ']'
+ echo '    run_iptables -t' mangle -F tcpost
+ run_iptables -t mangle -F tcpre
+ '[' -z '' ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/physdev ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/iprange ']'
+ save_command 'run_iptables -t' mangle -F tcpre
+ '[' 4 -gt 0 ']'
+ echo '    run_iptables -t' mangle -F tcpre
+ run_iptables -t mangle -F tcout
+ '[' -z '' ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/physdev ']'
+ '[' -n Yes ']'
+ '[' -f /tmp/shorewall.OM8226/iprange ']'
+ save_command 'run_iptables -t' mangle -F tcout
+ '[' 4 -gt 0 ']'
+ echo '    run_iptables -t' mangle -F tcout
+ indent
+ '[' -n '    ' ']'
+ eval sed ''\''s/^/    /'\'''
++ sed 's/^/    /'
+ '[' -s /tmp/shorewall.OM8226/tcrules ']'
+ '[' -n Yes ']'
+ save_command
+ '[' 0 -gt 0 ']'
+ echo
+ save_command COMMENT=
+ '[' 1 -gt 0 ']'
+ echo '    COMMENT='
+ save_command
+ '[' 0 -gt 0 ']'
+ echo
+ '[' -n '' ']'
+ '[' Internal = Internal -a -n '' ']'
+ append_file refreshed
++ find_file refreshed
++ local saveifs= directory
++ case $1 in
+++ split /etc/shorewall:/usr/share/shorewall
+++ local 'ifs=         
'
+++ IFS=:
+++ echo /etc/shorewall /usr/share/shorewall
+++ IFS='       
'
++ for directory in '$(split $CONFIG_PATH)'
++ '[' -f /etc/shorewall/refreshed ']'
++ for directory in '$(split $CONFIG_PATH)'
++ '[' -f /usr/share/shorewall/refreshed ']'
++ echo /etc/shorewall/refreshed
+ local user_exit=/etc/shorewall/refreshed
+ case $user_exit in
+ '[' -f /etc/shorewall/refreshed ']'
+ save_command 'cp -f $(my_pathname) ${VARDIR}/.restore'
+ '[' 1 -gt 0 ']'
+ echo '    cp -f $(my_pathname) ${VARDIR}/.restore'
+ INDENT=
+ save_command '}'
+ '[' 1 -gt 0 ']'
+ echo '}'
+ save_command
+ '[' 0 -gt 0 ']'
+ echo
+ exec
+ '[' -n '' ']'
+ INDENT=
+ mycat /usr/share/shorewall/prog.header 
/tmp/shorewall.OM8226/compiler_state/shorewall.xN8737 
/usr/share/shorewall/prog.footer
+ '[' -n Yes ']'
+ awk 'BEGIN {blnk=0;}; /^[[:space:]]*$/ {blnk=1; next; }; { while (/^\t*       
 /) sub(/        /, "\t"   ); if (blnk == 1 ) { print ""; blnk=0; }; print; }' 
/usr/share/shorewall/prog.header 
/tmp/shorewall.OM8226/compiler_state/shorewall.xN8737 
/usr/share/shorewall/prog.footer
+ chmod 700 /var/lib/shorewall/.start
+ '[' -n '' ']'
++ resolve_file /var/lib/shorewall/.start
++ local pwd=/root
++ case $1 in
++ echo /var/lib/shorewall/.start
+ progress_message3 'Shorewall configuration compiled to 
/var/lib/shorewall/.start'
+ local timestamp=
+ '[' 2 -ge 0 ']'
+ '[' -n '' ']'
+ echo 'Shorewall configuration compiled to /var/lib/shorewall/.start'
+ rm -f /tmp/shorewall.OM8226/compiler_state/shorewall.xN8737
+ rm -rf /tmp/shorewall.OM8226
+ shift
+ initialize
+ '[' '!' -f /usr/share/shorewall/version ']'
++ cat /usr/share/shorewall/version
+ local version=3.4.6
+ '[' 30406 -lt 30203 ']'
+ CONFIG_PATH=/etc/shorewall:/usr/share/shorewall
+ '[' -n restart ']'
+ '[' -n 2 ']'
+ '[' -n restore ']'
+ MODULESDIR=
+ MODULE_SUFFIX='o gz ko o.gz ko.gz'
+ LOGLIMIT=
+ LOGTAGONLY=
+ LOGRULENUMBERS=
+ LOGFORMAT=safeROUTE:%s:%s:
+ VERSION=3.4.6
+ SUBSYSLOCK=/var/lock/subsys/shorewall
+ LOCKFILE=
+ PATH=/sbin:/bin:/usr/sbin:/usr/bin:/usr/local/bin:/usr/local/sbin
+ TERMINATOR=fatal_error
+ IPTABLES=/usr/sbin/iptables
+ '[' -x /usr/sbin/iptables ']'
+ progress_message2 'Processing /etc/shorewall/params ...'
+ local timestamp=
+ '[' 2 -gt 0 ']'
+ '[' -n '' ']'
+ echo 'Processing /etc/shorewall/params ...'
+ STOPPING=
+ COMMENT=
+ '[' -d /var/lib/shorewall ']'
+ finished=0
+ '[' 0 -eq 0 -a 1 -gt 0 ']'
+ option=start
+ case $option in
+ finished=1
+ '[' 1 -eq 0 -a 1 -gt 0 ']'
+ '[' 1 -ne 1 ']'
+ COMMAND=start
+ '[' -n Shorewall ']'
+ case "$COMMAND" in
+ shorewall_is_started
+ qt /usr/sbin/iptables -L shorewall -n
+ /usr/sbin/iptables -L shorewall -n
+ progress_message3 'Starting Shorewall....'
+ local timestamp=
+ '[' 2 -ge 0 ']'
+ '[' -n '' ']'
+ echo 'Starting Shorewall....'
+ define_firewall
/sbin/shorewall: line 375:  8151 Segmentation fault      ${VARDIR}/.start 
$debugging start
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems?  Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >>  http://get.splunk.com/
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to