On Sat, Sep 27, 2014, at 08:04 AM, Tom Eastep wrote:
>     default_yes_no 'DYNAMIC_BLACKLIST'          , 'Yes', 'ipset';
> 
> The loading of the chains during 'start', and saving them during 'stop'
> can be piggybacked onto the SAVE_IPSETS option.
> 
> Does that sound reasonable?


I've not (yet) used SAVE_IPSET.

External init/mgmt/etc of IPv4 & IPv6 IPSETs is yet another one of the 
pre-shorewall legacy functions I'd carried over and stuffed into lib.private 
(one of the many advantages of having external `run` support for lib.private 
functions), and still haven't gotten around to properly integrating :-/

I've now read @

        Shorewall6 and Shorewall-init Support for Ipsets
        http://shorewall.net/ipsets.html

                "...
                Unlike iptables, which has separate configurations for IPv4 and 
IPv6, ipset has a single configuration that handles both. This means the 
SAVE_IPSETS=Yes in shorewall.conf or shorewall6.conf won't work correctly 
because . To work around this issue, Shorewall-init is now capable restoring 
ipset contents during 'start' and saving them during 'stop'.
                ..."

Since I do, now,

        - use shorewall-init
        - have both IPv4 & IPv6 IPSETs

AND

        - currently use these DIY'd 'fast_drop' scripts for dynamic 
blacklisting outside of SW

'piggybacking' DYNAMIC_BLACKLIST saving in/on-to SAVE_IPSET sounds like a good 
solution that leverages what's already there.

Couple of questions:

For efficiency's sake, I manage dual IPSET hash forms -- a hash:ip & a hash:net 
-- conditionally adding the drop target to one, or the other, based on the 
target's CIDR;  The former for CIDR = /32, and the latter for CIDR = /1 - /31.

In the dynamic blacklist management/saving specifically, and SAVE_IPSET mgmt in 
general, (how) do you differentiate between single addresses and ranges?

Also, since I'm using IPv4 *AND* IPv6, IIUC, that mandates

        /shorewall.conf
                SAVE_IPSETS=No

        /shorewall6.conf
                SAVE_IPSETS=No

        /etc/sysconfig/shorewall-init
                SAVE_IPSETS=Yes

(How) Does that effect SW command/usage for `drop`?  Is it still separate, i.e.,

        shorewall(-lite)  drop 1.2.3.4
        shorewall(-lite)  drop 1.2.3.0/17
        shorewall6(-lite) drop 2001:aaaa:...::1
        shorewall6(-lite)  drop 2001:aaaa:...::/48

?

------------------------------------------------------------------------------
Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer
Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports
Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper
Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer
http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to