commit shorewall for openSUSE:Factory
Hello community, here is the log from the commit of package shorewall for openSUSE:Factory checked in at 2014-11-24 11:09:30 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/shorewall (Old) and /work/SRC/openSUSE:Factory/.shorewall.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Package is "shorewall" Changes: -------- --- /work/SRC/openSUSE:Factory/shorewall/shorewall.changes 2014-11-06 16:51:01.000000000 +0100 +++ /work/SRC/openSUSE:Factory/.shorewall.new/shorewall.changes 2014-11-24 11:10:14.000000000 +0100 @@ -1,0 +2,27 @@ +Sun Nov 23 23:20:00 UTC 2014 - toganm@opensuse.org + +- Update to version 4.6.5.2 For more details see changelog.txt and + releasenotes.txt + + * LOG_BACKEND=LOG failed at run-time for all but the most recent + kernels. + +- Changes in 4.6.5.1 + + * The generated script can now detect an gateway address assigned + by later versions of that program (Alan Barrett). + + * In 4.6.5, the bash-based configure script would issue the + following diagnostic if SERVICEDIR was not specified in the + shorewallrc file: + + ./configure: line 199: [SERVICEDIR]=: command not found + + This was compounded by the fact that all of the released + shorewallrc files still specified SYSTEMDDIR rather than + SERVICEDIR (Evangelos Foutras) + + * The shorewallrc.archlinux file now reflects a change in SBINDIR + that occurred in Arch Linux in mid 2013 (Evangelos Foutras). + +------------------------------------------------------------------- Old: ---- shorewall-4.6.4.3.tar.bz2 shorewall-core-4.6.4.3.tar.bz2 shorewall-docs-html-4.6.4.3.tar.bz2 shorewall-init-4.6.4.3.tar.bz2 shorewall-lite-4.6.4.3.tar.bz2 shorewall6-4.6.4.3.tar.bz2 shorewall6-lite-4.6.4.3.tar.bz2 New: ---- shorewall-4.6.5.2.tar.bz2 shorewall-core-4.6.5.2.tar.bz2 shorewall-docs-html-4.6.5.2.tar.bz2 shorewall-init-4.6.5.2.tar.bz2 shorewall-lite-4.6.5.2.tar.bz2 shorewall6-4.6.5.2.tar.bz2 shorewall6-lite-4.6.5.2.tar.bz2 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ shorewall.spec ++++++ --- /var/tmp/diff_new_pack.oP0bRP/_old 2014-11-24 11:10:16.000000000 +0100 +++ /var/tmp/diff_new_pack.oP0bRP/_new 2014-11-24 11:10:16.000000000 +0100 @@ -20,19 +20,19 @@ %define have_systemd 1 Name: shorewall -Version: 4.6.4.3 +Version: 4.6.5.2 Release: 0 Summary: Shoreline Firewall is an iptables-based firewall for Linux systems License: GPL-2.0 Group: Productivity/Networking/Security Url: http://www.shorewall.net/ -Source: http://www.shorewall.net/pub/shorewall/4.6/shorewall-4.6.4/%{name}-%version.tar.bz2 -Source1: http://www.shorewall.net/pub/shorewall/4.6/shorewall-4.6.4/%{name}-core-%version.tar.bz2 -Source2: http://www.shorewall.net/pub/shorewall/4.6/shorewall-4.6.4/%{name}-lite-%version.tar.bz2 -Source3: http://www.shorewall.net/pub/shorewall/4.6/shorewall-4.6.4/%{name}-init-%version.tar.bz2 -Source4: http://www.shorewall.net/pub/shorewall/4.6/shorewall-4.6.4/%{name}6-lite-%version.tar.bz2 -Source5: http://www.shorewall.net/pub/shorewall/4.6/shorewall-4.6.4/%{name}6-%version.tar.bz2 -Source6: http://www.shorewall.net/pub/shorewall/4.6/shorewall-4.6.4/%{name}-docs-html-%version.tar.bz2 +Source: http://www.shorewall.net/pub/shorewall/4.6/shorewall-4.6.5/%{name}-%version.tar.bz2 +Source1: http://www.shorewall.net/pub/shorewall/4.6/shorewall-4.6.5/%{name}-core-%version.tar.bz2 +Source2: http://www.shorewall.net/pub/shorewall/4.6/shorewall-4.6.5/%{name}-lite-%version.tar.bz2 +Source3: http://www.shorewall.net/pub/shorewall/4.6/shorewall-4.6.5/%{name}-init-%version.tar.bz2 +Source4: http://www.shorewall.net/pub/shorewall/4.6/shorewall-4.6.5/%{name}6-lite-%version.tar.bz2 +Source5: http://www.shorewall.net/pub/shorewall/4.6/shorewall-4.6.5/%{name}6-%version.tar.bz2 +Source6: http://www.shorewall.net/pub/shorewall/4.6/shorewall-4.6.5/%{name}-docs-html-%version.tar.bz2 Source7: %{name}-4.4.22.rpmlintrc Source8: README.openSUSE # PATCH-FIX-UPSTREAM toganm@opensuse.org Shorewall-lite init.suse.sh Required Stop @@ -360,6 +360,7 @@ # FIXME # somehow shorewall-init is not installed for opensuse 11.4 +# systemd changed to servicedir for i in $targets; do pushd ${i}-%{version} @@ -371,7 +372,7 @@ libexecdir=%{_libexecdir} \ sbindir=%_sbindir \ %if 0%{?have_systemd} - systemd=%_unitdir \ + servicedir=%_unitdir \ %endif # %%if 0%%{?suse_version} >= 1210 # systemd=%%_unitdir \ ++++++ shorewall-4.6.4.3.tar.bz2 -> shorewall-4.6.5.2.tar.bz2 ++++++ ++++ 3251 lines of diff (skipped) ++++++ shorewall-core-4.6.4.3.tar.bz2 -> shorewall-core-4.6.5.2.tar.bz2 ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-core-4.6.4.3/changelog.txt new/shorewall-core-4.6.5.2/changelog.txt --- old/shorewall-core-4.6.4.3/changelog.txt 2014-10-19 16:59:58.000000000 +0200 +++ new/shorewall-core-4.6.5.2/changelog.txt 2014-11-17 16:17:15.000000000 +0100 @@ -1,14 +1,66 @@ -Changes in 4.6.4.3 +Changes in 4.6.5.1 -1) Update release documents +1) Update release documents. -2) Add xt_LOG to the helpers files. +2) Fix IPv6 LOG_BACKEND=LOG -Changes in 4.6.4.2 +Changes in 4.6.5.1 -1) Update release documents +1) Update release documents. -2) Add ipt_LOG to the helpers files. +2) Apply Alan Barrett's dhclient patch + +3) Make emacs sh-mode work better with lib.core + +4) Fix setting of options[SERVICEDIR] in configure + +5) Rename SYSTEMDDIR to SERVICEDIR in shorewallrc.* + +6) Eliminate redundant "/" in the installers + +Changes in 4.6.5 Final + +1) Update release documents. + +2) Apply Thomas D's manpage fixes. + +3) Correct .service files. + +Changes in 4.6.5 RC 1 + +1) Update release documents. + +2) Correct a couple of defects in the -C code. + +3) Fix LOG_BACKEND on kernel 3.17. + +Changes in 4.6.5 Beta 3 + +1) Update release documents. + +2) Process params files with $SHOREWALL_SHELL. + +3) Implement the -C option. + +Changes in 4.6.5 Beta 2 + +1) Update release documents. + +2) Defect repair from the 4.6.4 branch. + +3) Allow both source and dest limits in the RATE LIMIT column. + +Changes in 4.6.5 Beta 1 + +1) Update release documents. + +2) Merge defect repair from 4.6.4. + +Changes in 4.6.5 Beta 1 + +1) Update release documents. + +2) New .service file strategy. Changes in 4.6.4.1 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-core-4.6.4.3/configure new/shorewall-core-4.6.5.2/configure --- old/shorewall-core-4.6.4.3/configure 2014-10-19 16:59:57.000000000 +0200 +++ new/shorewall-core-4.6.5.2/configure 2014-11-17 16:17:14.000000000 +0100 @@ -28,7 +28,7 @@ # # Build updates this # -VERSION=4.6.4.3 +VERSION=4.6.5.2 case "$BASH_VERSION" in [4-9].*) @@ -195,6 +195,10 @@ fi fi +if [ -z "${options[SERVICEDIR]}" ]; then + options[SERVICEDIR]="${options[SYSTEMD]}" +fi + for on in \ HOST \ PREFIX \ @@ -209,7 +213,7 @@ INITFILE \ AUXINITSOURCE \ AUXINITFILE \ - SYSTEMD \ + SERVICEDIR \ SERVICEFILE \ SYSCONFFILE \ SYSCONFDIR \ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-core-4.6.4.3/configure.pl new/shorewall-core-4.6.5.2/configure.pl --- old/shorewall-core-4.6.4.3/configure.pl 2014-10-19 16:59:57.000000000 +0200 +++ new/shorewall-core-4.6.5.2/configure.pl 2014-11-17 16:17:14.000000000 +0100 @@ -31,7 +31,7 @@ # Build updates this # use constant { - VERSION => '4.6.4.3' + VERSION => '4.6.5.2' }; my %params; @@ -154,6 +154,8 @@ $options{VARDIR} = '${VARLIB}/${PRODUCT}'; } +$options{SERVICEDIR}=$options{SYSTEMD} unless $options{SERVICEDIR}; + for ( qw/ HOST PREFIX SHAREDIR @@ -167,8 +169,8 @@ INITFILE AUXINITSOURCE AUXINITFILE - SYSTEMD - SERVICEFILE + SERVICEDIR + SERVICEFILE SYSCONFFILE SYSCONFDIR SPARSE diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-core-4.6.4.3/install.sh new/shorewall-core-4.6.5.2/install.sh --- old/shorewall-core-4.6.4.3/install.sh 2014-10-19 16:59:57.000000000 +0200 +++ new/shorewall-core-4.6.5.2/install.sh 2014-11-17 16:17:14.000000000 +0100 @@ -22,7 +22,7 @@ # along with this program; if not, see <http://www.gnu.org/licenses/>. # -VERSION=4.6.4.3 +VERSION=4.6.5.2 usage() # $1 = exit status { @@ -329,9 +329,13 @@ chmod 755 ${DESTDIR}${SYSCONFDIR} fi -if [ -n "${SYSTEMD}" ]; then - mkdir -p ${DESTDIR}${SYSTEMD} - chmod 755 ${DESTDIR}${SYSTEMD} +if [ -z "${SERVICEDIR}" ]; then + SERVICEDIR="$SYSTEMD" +fi + +if [ -n "${SERVICEDIR}" ]; then + mkdir -p ${DESTDIR}${SERVICEDIR} + chmod 755 ${DESTDIR}${SERVICEDIR} fi mkdir -p ${DESTDIR}${SBINDIR} diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-core-4.6.4.3/known_problems.txt new/shorewall-core-4.6.5.2/known_problems.txt --- old/shorewall-core-4.6.4.3/known_problems.txt 2014-10-19 16:59:58.000000000 +0200 +++ new/shorewall-core-4.6.5.2/known_problems.txt 2014-11-17 16:17:15.000000000 +0100 @@ -1,74 +1,25 @@ 1) On systems running Upstart, shorewall-init cannot reliably secure the firewall before interfaces are brought up. -2) If you install 4.6.4 and then use the 'safe-restart' command to - restart your firewall, confusing output is produced: +2) The generated firewall cannot detect the gateway added by recent + versions of dhclient. - # shorewall safe-restart - Compiling... - Processing /etc/shorewall/params ... - Processing /etc/shorewall/shorewall.conf... - ... - Optimizing Ruleset... - Creating iptables-restore input... - Shorewall configuration compiled to /var/lib/shorewall/.restart - Currently-running Configuration Saved to /var/lib/shorewall/.safe - Usage: /var/lib/shorewall/firewall [ options ] <command> - - <command> is one of: - start - stop - clear - disable <interface> - down <interface> - enable <interface> - reset - refresh - restart - run <command> [ <parameter> ... ] - status - up <interface> - version - - Options are: - - -v and -q Standard Shorewall verbosity controls - -n Don't update routing configuration - -p Purge Conntrack Table - -t Timestamp progress Messages - -V <verbosity> Set verbosity explicitly - -R <file> Override RESTOREFILE setting - Restarting... - Restarting Shorewall.... - Initializing... - Processing /etc/shorewall/init ... - ... - Processing /etc/shorewall/start ... - Processing /etc/shorewall/started ... - done. - Do you want to accept the new firewall configuration? [y/n] - - The above 'usage' information, while confusing, does not represent a - problem and it is safe to answer 'y'. - - - Corrected in Shorewall 4.6.4.1. - -3) The 'Universal' sample configuration fails to start. - - Workaround: Remove the 'optional' option from the interfaces file - entry. - - Corrected in Shorewall 4.6.4.1. - -4) Setting LOGBACKEND=ipt_LOG may result in the following startup - failure at boot: - - Starting shorewall ... - /var/lib/shorewall/firewall: line 2080: echo: write error: No such file or directory - WARNING: Unable to set log backend to ipt_LOG + Corrected in 4.6.5.1. - Partially corrected in Shorewall 4.6.4.2. Fixed on Squeeze and - RHEL6 (and derivatives). Not fixed on Fedora, Ubuntu and OpenSuSE. +3) In 4.6.5, the bash-based configure script would issue the following + diagnostic if SERVICEDIR was not specified in the shorewallrc + file. + + ./configure: line 199: [SERVICEDIR]=: command not found + + This is compounded by the fact that all of the released + shorewallrc files still specify SYSTEMDDIR rather than SERVICEDIR + (Evangelos Foutras) + + Corrected in 4.6.5.1. + +4) LOG_BACKEND=LOG is broken in Shorewall6 on all but the most recent + kernel versions. + + Corrected in 4.6.5.2. - Corrected on other distros in 4.6.4.3. diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-core-4.6.4.3/lib.cli new/shorewall-core-4.6.5.2/lib.cli --- old/shorewall-core-4.6.4.3/lib.cli 2014-10-19 16:44:01.000000000 +0200 +++ new/shorewall-core-4.6.5.2/lib.cli 2014-11-15 17:56:42.000000000 +0100 @@ -493,6 +493,8 @@ [ -x $iptables_save ] || echo "$iptables-save does not exist or is not executable" >&2 + [ -n "$g_counters" ] && iptables_save="$iptables_save --counters" + if product_is_started ; then [ -d ${VARDIR} ] || mkdir -p ${VARDIR} @@ -1624,6 +1626,15 @@ g_noroutes=Yes option=${option#n} ;; + p*) + [ -n "$(which conntrack)" ] || fatal_error "The '-p' option requires the conntrack utility which does not appear to be installed on this system" + g_purge=Yes + option=${option%p} + ;; + C*) + g_counters=Yes + option=${option#C} + ;; *) usage 1 ;; @@ -3108,11 +3119,45 @@ } save_command() { + local finished + finished=0 + + shift + + while [ $finished -eq 0 -a $# -gt 0 ]; do + option=$1 + case $option in + -*) + option=${option#-} + + while [ -n "$option" ]; do + case $option in + -) + finished=1 + option= + ;; + C*) + g_counters=Yes + option=${option#C} + ;; + *) + usage 1 + ;; + esac + done + shift + ;; + *) + finished=1 + ;; + esac + done + case $# in - 1) + 0) ;; - 2) - RESTOREFILE="$2" + 1) + RESTOREFILE="$1" validate_restorefile '<restore file>' ;; *) @@ -3407,7 +3452,11 @@ [ -n "$g_nolock" ] || mutex_on if [ -x ${VARDIR}/firewall ]; then - run_it ${VARDIR}/firewall $g_debugging start + if [ -n "$g_fast" -a -x ${VARDIR}/${RESTOREFILE} -a ! ${VARDIR}/firewall -nt ${VARDIR}/${RESTOREFILE} ]; then + run_it ${VARDIR}/${RESTOREFILE} $g_debugging restore + else + run_it ${VARDIR}/firewall $g_debugging start + fi rc=$? else error_message "${VARDIR}/firewall is missing or is not executable" @@ -3443,6 +3492,14 @@ finished=1 option= ;; + f*) + g_fast=Yes + option=${option#f} + ;; + C*) + g_counters=Yes + option=${option#C} + ;; p*) [ -n "$(which conntrack)" ] || fatal_error "The '-p' option requires the conntrack utility which does not appear to be installed on this system" g_purge=Yes @@ -3504,6 +3561,10 @@ g_purge=Yes option=${option%p} ;; + C*) + g_counters=Yes + option=${option#C} + ;; *) usage 1 ;; @@ -3577,10 +3638,10 @@ echo " logwatch [<refresh interval>]" echo " reject <address> ..." echo " reset [ <chain> ... ]" - echo " restart [ -n ] [ -p ] [ -f ] [ <directory> ]" - echo " restore [ -n ] [ <file name> ]" + echo " restart [ -n ] [ -p ] [ -f ] [ -C ] [ <directory> ]" + echo " restore [ -n ] [ -p ] [ -C ] [ <file name> ]" echo " run <command> [ <parameter> ... ]" - echo " save [ <file name> ]" + echo " save [ -C ] [ <file name> ]" echo " [ show | list | ls ] [ -b ] [ -x ] [ -t {filter|mangle|nat} ] [ {chain [<chain> [ <chain> ... ]" echo " [ show | list | ls ] [ -f ] capabilities" echo " [ show | list | ls ] arptables" @@ -3605,7 +3666,7 @@ echo " [ show | list | ls ] tc [ device ]" echo " [ show | list | ls ] vardir" echo " [ show | list | ls ] zones" - echo " start [ -f ] [ -p ] [ <directory> ]" + echo " start [ -f ] [ -p ] [ -C ] [ <directory> ]" echo " stop" echo " status [ -i ]" echo " version [ -a ]" @@ -3657,6 +3718,7 @@ g_directives= g_inline= g_tcrules= + g_counters= VERBOSE= VERBOSITY=1 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-core-4.6.4.3/lib.common new/shorewall-core-4.6.5.2/lib.common --- old/shorewall-core-4.6.4.3/lib.common 2014-10-19 16:44:01.000000000 +0200 +++ new/shorewall-core-4.6.5.2/lib.common 2014-11-15 17:56:42.000000000 +0100 @@ -157,6 +157,7 @@ [ -n "$g_timestamp" ] && options=${options}t [ -n "$g_purge" ] && options=${options}p [ -n "$g_recovering" ] && options=${options}r + [ -n "$g_counters" ] && options=${options}c options="${options}V $VERBOSITY" diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-core-4.6.4.3/releasenotes.txt new/shorewall-core-4.6.5.2/releasenotes.txt --- old/shorewall-core-4.6.4.3/releasenotes.txt 2014-10-19 16:59:58.000000000 +0200 +++ new/shorewall-core-4.6.5.2/releasenotes.txt 2014-11-17 16:17:15.000000000 +0100 @@ -1,7 +1,7 @@ ---------------------------------------------------------------------------- - S H O R E W A L L 4 . 6 . 4 . 3 + S H O R E W A L L 4 . 6 . 5 . 2 ------------------------------------ - O c t o b e r 2 0 , 2 0 1 4 + N o v e m b e r 1 8 , 2 0 1 4 ---------------------------------------------------------------------------- I. PROBLEMS CORRECTED IN THIS RELEASE @@ -14,82 +14,45 @@ I. P R O B L E M S C O R R E C T E D I N T H I S R E L E A S E ---------------------------------------------------------------------------- -4.6.4.3 +4.6.5.2 -1) The fix for LOGBACKEND in 4.6.4.2 worked on some older - distributions but not on newer ones. This release fixes the problem - in the remaining cases. +1) LOG_BACKEND=LOG failed at run-time for all but the most recent + kernels. -4.6.4.2 +4.6.5.1 -1) Setting LOGBACKEND=ipt_LOG could result in the following startup - failure at boot: +1) The generated script can now detect an gateway address assigned by + later versions of that program (Alan Barrett). - Starting shorewall ... - /var/lib/shorewall/firewall: line 2080: echo: write error: No such file or directory - WARNING: Unable to set log backend to ipt_LOG +2) In 4.6.5, the bash-based configure script would issue the following + diagnostic if SERVICEDIR was not specified in the shorewallrc + file: -4.6.4.1 - -1) Confusing 'usage' output was produced under the following - conditions: - - a) 4.6.4 installed - - b) The running firewall was compiled on an earlier release. - - c) A 'safe-start', 'save-restart', 'save' or 'try' command is - executed. - - This problem has been corrected. - -2) The 'optional' option has been removed from the IPv4 Universal - interfaces file, as that option caused startup failures. - -4.6.4 Final. + ./configure: line 199: [SERVICEDIR]=: command not found -1) This release includes defect repair through release 4.6.3.4. - -2) Two corrections have been made to the .service files: + This was compounded by the fact that all of the released + shorewallrc files still specified SYSTEMDDIR rather than SERVICEDIR + (Evangelos Foutras) - - The .service files now correctly specify - - WantedBy=basic.target +3) The shorewallrc.archlinux file now reflects a change in SBINDIR + that occurred in Arch Linux in mid 2013 (Evangelos Foutras). - - Conflicting services have been added. - -3) A warning message generated during stoppedrules processing - previously referred to the file as routestopped. - -4) Previously, the stoppedrules file did not work properly when - ADMINISABSENTMINDED=No. - - - A warning message was issued stating that the file would be - processed as if ADMINISABSENTMINDED=Yes, and it was. - - - Unfortunately, part of the surrounding rule-generating logic - proceded as if ADMINISABSENTMINDED=No, leading to an unusable - ruleset. - - This problem has been corrected by changing the way that - stoppedrules works with ADMINISABSENTMINDED=No. In the new - implementation: - - - All existing connections continue to work. - - Response packets and related connection requests to new accepted - connections are accepted (in other words, the resulting ruleset - is stateful). +4.6.5 - See shorewall[6].conf(5) for additional details. +1) This release includes defect repair through release 4.6.4.3. -5) The .spec files now set SBINDIR correctly. +2) On kernel 3.17, LOG_BACKEND=LOG previously failed with the + diagnostics: -6) The -lite installers now create INITDIR if it doesn't exist. + Setting up log backend + /var/lib/shorewall/.restart: line 2075: echo: write error: + No such file or directory + WARNING: Unable to set log backend to ipt_LOG -7) The installers no longer attempt to create a symbolic link to the - init script when no init script is installed. +3) A number of corrections have been made to the manpages (Thomas D). -8) A large number of defects in the uninstallers have been corrected. +4) Previously, if $OPTIONS was set in /etc/sysconfig/shorewall-init, + then servicd failed to start/stop Shorewall-init. ---------------------------------------------------------------------------- I I. K N O W N P R O B L E M S R E M A I N I N G @@ -102,39 +65,83 @@ I I I. N E W F E A T U R E S I N T H I S R E L E A S E ---------------------------------------------------------------------------- -1) Install support for Centos 7 and Foobar 7 has been added (Tuomo - Soini). - -2) A 'terminating' option has been added to shorewall[6].actions. - this option, when used with the 'builtin' option, indicates to the - compiler that the built-in action is terminating. This allows the - optimizer to omit rules after an unconditional jump to the - built-in. - -3) A LOG_BACKEND option has been added to allow specification of the - default logging backends. See shorewall.conf(5) and - shorewall6.conf(5) for details. - -4) The SAVE_IPSETS option may now specify a list of ipsets to be - saved. When such a list is specified, only those ipsets together - with the ipsets supporting dynamic zones are saved. - - Shorewall6 now supports the SAVE_IPSETS option. When - SAVE_IPSETS=Yes, only ipv6 ipsets are saved. For Shorewall, if - SAVE_IPSETS=ipv4, then only ipv4 ipsets are saved. Both features - require ipset version 5 or later. - - Note that shorewall.conf and shorewall6.conf may now both specify - SAVE_IPSETS. - -5) The SBINDIR setting for SuSE now defaults to /usr/sbin/. - -6) With the exception of Shorewall-core, the tarball installers and - uninstallers now support a -n option which inhibits any attempt to - change the startup configuration. The -n option can be - automatically invoked by setting the SANDBOX variable to a - non-empty value, either in the environment or in your shorewallrc - file. +1) The configure scripts and installers now support SERVICEDIR as an + alternative to SYSTEMD. For compatability, SERVICED is an alias + for SERVICEDIR. + +2) The installers now offer a choice of .service files, selected by + the SERVICEFILE option. The default remains $PRODUCT.service. Each + product supplying a .service file now supplies a .service.214. The + differences between the standard .service files and the service.214 + files are: + + a) They specify 'after=network-online.target' rather than + 'after=network.target'. + + b) The file shorewall-init.service.214 specifies + 'before=network-pre.target' rather than + 'before=network.target'. That file requires serviced 214 or + later, hence the names of the new files. + + Regardless of which file is selected, it is installed in + $SERVICEDIR/$PRODUCT.service. + +3) The RATE LIMIT column of the rules files now allows specification + of both a per-source and per-destination limit. See + shorewall[6]-rules(5) for details. + +4) Previously, /bin/sh was used unconditionally to process the helper + script 'getparams'. That shell script reads the params file and + passes back the (variable,value) pairs to the compiler. Beginning + with this release, $SHOREWALL_SHELL is used to process that script, + unless the compilation is for export, in which case /bin/sh is + still used. + + Note that the default value of $SHOREWALL_SHELL is /bin/sh, so + unless your configuration sets that variable, this enhancement will + have no effect. Similarly, on an administrative system, this + enhancement has no effect on the processing of the 'compile -e', + 'load', 'reload' and 'export' commands. + +5) A -C option has been added to several commands to allow the + ip[6]tables packet and byte counters to be preserved. + + - save command + + Causes the packet and byte counters to be saved along with the + chains and rules. + + - restore command + + Causes the packet and byte counters (if saved) to be restored + along with the chains and rules. + + - start command + + With Shorewall and Shorewall6, the -C option only has an effect + if the -f option is also specified. If a previously-saved + configuration is restored, then the packet and byte counters (if + saved) will be restored along with the chains and rules. + + - restart command + + If an existing compiled script is used (no recompilation + required) and if that script generated the current running + configuration, then the current netfilter configuration is + reloaded as is so as to preserve the current packet and byte + counters. + + If you wish to (approximately) preserve the counters over a + possibly unexpected reboot, then: + + - Create a cron job that periodically does 'shorewall save -C' + + - Specify the -C and -f option in the STARTOPTIONS variable in + either /etc/default/shorewall[6][-lite] or + /etc/sysconfig/shorewall[6][-lite], whichever is supported by your + distribution. Note that some distributions do not distribute these + files so you may have to create the one(s) you need (such as + /etc/sysconfig/shorewall). ---------------------------------------------------------------------------- I V. M I G R A T I O N I S S U E S @@ -429,6 +436,110 @@ ---------------------------------------------------------------------------- V. N O T E S F R O M O T H E R 4 . 6 R E L E A S E S ---------------------------------------------------------------------------- + P R O B L E M S C O R R E C T E D I N 4 . 6 . 4 +---------------------------------------------------------------------------- + +4.6.4.1 + +1) Confusing 'usage' output was produced under the following + conditions: + + a) 4.6.4 installed + + b) The running firewall was compiled on an earlier release. + + c) A 'safe-start', 'save-restart', 'save' or 'try' command is + executed. + + This problem has been corrected. + +2) The 'optional' option has been removed from the IPv4 Universal + interfaces file, as that option caused startup failures. + +4.6.4 Final. + +1) This release includes defect repair through release 4.6.3.4. + +2) Two corrections have been made to the .service files: + + - The .service files now correctly specify + + WantedBy=basic.target + + - Conflicting services have been added. + +3) A warning message generated during stoppedrules processing + previously referred to the file as routestopped. + +4) Previously, the stoppedrules file did not work properly when + ADMINISABSENTMINDED=No. + + - A warning message was issued stating that the file would be + processed as if ADMINISABSENTMINDED=Yes, and it was. + + - Unfortunately, part of the surrounding rule-generating logic + proceded as if ADMINISABSENTMINDED=No, leading to an unusable + ruleset. + + This problem has been corrected by changing the way that + stoppedrules works with ADMINISABSENTMINDED=No. In the new + implementation: + + - All existing connections continue to work. + - Response packets and related connection requests to new accepted + connections are accepted (in other words, the resulting ruleset + is stateful). + + See shorewall[6].conf(5) for additional details. + +5) The .spec files now set SBINDIR correctly. + +6) The -lite installers now create INITDIR if it doesn't exist. + +7) The installers no longer attempt to create a symbolic link to the + init script when no init script is installed. + +8) A large number of defects in the uninstallers have been corrected. + +---------------------------------------------------------------------------- + N E W F E A T U R E S I N 4 . 6 . 4 +---------------------------------------------------------------------------- + +1) Install support for Centos 7 and Foobar 7 has been added (Tuomo + Soini). + +2) A 'terminating' option has been added to shorewall[6].actions. + this option, when used with the 'builtin' option, indicates to the + compiler that the built-in action is terminating. This allows the + optimizer to omit rules after an unconditional jump to the + built-in. + +3) A LOG_BACKEND option has been added to allow specification of the + default logging backends. See shorewall.conf(5) and + shorewall6.conf(5) for details. + +4) The SAVE_IPSETS option may now specify a list of ipsets to be + saved. When such a list is specified, only those ipsets together + with the ipsets supporting dynamic zones are saved. + + Shorewall6 now supports the SAVE_IPSETS option. When + SAVE_IPSETS=Yes, only ipv6 ipsets are saved. For Shorewall, if + SAVE_IPSETS=ipv4, then only ipv4 ipsets are saved. Both features + require ipset version 5 or later. + + Note that shorewall.conf and shorewall6.conf may now both specify + SAVE_IPSETS. + +5) The SBINDIR setting for SuSE now defaults to /usr/sbin/. + +6) With the exception of Shorewall-core, the tarball installers and + uninstallers now support a -n option which inhibits any attempt to + change the startup configuration. The -n option can be + automatically invoked by setting the SANDBOX variable to a + non-empty value, either in the environment or in your shorewallrc + file. + +---------------------------------------------------------------------------- P R O B L E M S C O R R E C T E D I N 4 . 6 . 3 ---------------------------------------------------------------------------- diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-core-4.6.4.3/shorewall-core.spec new/shorewall-core-4.6.5.2/shorewall-core.spec --- old/shorewall-core-4.6.4.3/shorewall-core.spec 2014-10-19 16:59:58.000000000 +0200 +++ new/shorewall-core-4.6.5.2/shorewall-core.spec 2014-11-17 16:17:15.000000000 +0100 @@ -1,6 +1,6 @@ %define name shorewall-core -%define version 4.6.4 -%define release 3 +%define version 4.6.5 +%define release 2 Summary: Shoreline Firewall is an iptables-based firewall for Linux systems. Name: %{name} @@ -63,12 +63,20 @@ %doc COPYING INSTALL changelog.txt releasenotes.txt %changelog -* Sun Oct 19 2014 Tom Eastep tom@shorewall.net -- Updated to 4.6.4-3 -* Wed Oct 15 2014 Tom Eastep tom@shorewall.net -- Updated to 4.6.4-2 -* Fri Oct 10 2014 Tom Eastep tom@shorewall.net -- Updated to 4.6.4-1 +* Sat Nov 15 2014 Tom Eastep tom@shorewall.net +- Updated to 4.6.5-2 +* Fri Nov 14 2014 Tom Eastep tom@shorewall.net +- Updated to 4.6.5-1 +* Thu Nov 06 2014 Tom Eastep tom@shorewall.net +- Updated to 4.6.5-0base +* Sat Nov 01 2014 Tom Eastep tom@shorewall.net +- Updated to 4.6.5-0RC1 +* Thu Oct 30 2014 Tom Eastep tom@shorewall.net +- Updated to 4.6.5-0Beta3 +* Mon Oct 20 2014 Tom Eastep tom@shorewall.net +- Updated to 4.6.5-0Beta2 +* Wed Oct 08 2014 Tom Eastep tom@shorewall.net +- Updated to 4.6.5-0Beta1 * Mon Oct 06 2014 Tom Eastep tom@shorewall.net - Updated to 4.6.4-0base * Thu Oct 02 2014 Tom Eastep tom@shorewall.net diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-core-4.6.4.3/shorewallrc.apple new/shorewall-core-4.6.5.2/shorewallrc.apple --- old/shorewall-core-4.6.4.3/shorewallrc.apple 2014-10-19 16:44:01.000000000 +0200 +++ new/shorewall-core-4.6.5.2/shorewallrc.apple 2014-11-15 17:56:42.000000000 +0100 @@ -14,7 +14,7 @@ INITFILE= #Unused on OS X INITSOURCE= #Unused on OS X ANNOTATED= #Unused on OS X -SYSTEMD= #Unused on OS X +SERVICEDIR= #Unused on OS X SERVICEFILE= #Unused on OS X SYSCONFDIR= #Unused on OS X SPARSE=Yes #Only install $PRODUCT/$PRODUCT.conf in $CONFDIR. diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-core-4.6.4.3/shorewallrc.archlinux new/shorewall-core-4.6.5.2/shorewallrc.archlinux --- old/shorewall-core-4.6.4.3/shorewallrc.archlinux 2014-10-19 16:44:01.000000000 +0200 +++ new/shorewall-core-4.6.5.2/shorewallrc.archlinux 2014-11-15 17:56:42.000000000 +0100 @@ -8,14 +8,14 @@ LIBEXECDIR=${PREFIX}/share #Directory for executable scripts. PERLLIBDIR=${PREFIX}/share/shorewall #Directory to install Shorewall Perl module directory CONFDIR=/etc #Directory where subsystem configurations are installed -SBINDIR=/usr/sbin #Directory where system administration programs are installed +SBINDIR=/usr/bin #Directory where system administration programs are installed MANDIR=${SHAREDIR}/man #Directory where manpages are installed. INITDIR= #Directory where SysV init scripts are installed. INITFILE= #Name of the product's installed SysV init script INITSOURCE= #Name of the distributed file to be installed as the SysV init script ANNOTATED= #If non-zero, annotated configuration files are installed SYSCONFDIR= #Directory where SysV init parameter files are installed -SYSTEMD=/usr/lib/systemd/system #Directory where .service files are installed (systems running systemd only) +SERVICEDIR=/usr/lib/systemd/system #Directory where .service files are installed (systems running systemd only) SERVICEFILE= #Name of the file to install in $SYSTEMD. Default is $PRODUCT.service SPARSE= #If non-empty, only install $PRODUCT/$PRODUCT.conf in $CONFDIR VARLIB=/var/lib #Directory where product variable data is stored. diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-core-4.6.4.3/shorewallrc.cygwin new/shorewall-core-4.6.5.2/shorewallrc.cygwin --- old/shorewall-core-4.6.4.3/shorewallrc.cygwin 2014-10-19 16:44:01.000000000 +0200 +++ new/shorewall-core-4.6.5.2/shorewallrc.cygwin 2014-11-15 17:56:42.000000000 +0100 @@ -14,7 +14,7 @@ INITFILE= #Unused on Cygwin INITSOURCE= #Unused on Cygwin ANNOTATED= #Unused on Cygwin -SYSTEMD= #Unused on Cygwin +SERVICEDIR= #Unused on Cygwin SERVICEFILE= #Unused on Cygwin SYSCONFDIR= #Unused on Cygwin SPARSE=Yes #Only install $PRODUCT/$PRODUCT.conf in $CONFDIR. diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-core-4.6.4.3/shorewallrc.debian new/shorewall-core-4.6.5.2/shorewallrc.debian --- old/shorewall-core-4.6.4.3/shorewallrc.debian 2014-10-19 16:44:01.000000000 +0200 +++ new/shorewall-core-4.6.5.2/shorewallrc.debian 2014-11-15 17:56:42.000000000 +0100 @@ -17,7 +17,7 @@ SYSCONFFILE=default.debian #Name of the distributed file to be installed in $SYSCONFDIR SERVICEFILE= #Name of the file to install in $SYSTEMD. Default is $PRODUCT.service SYSCONFDIR=/etc/default #Directory where SysV init parameter files are installed -SYSTEMD= #Directory where .service files are installed (systems running systemd only) +SERVICEDIR= #Directory where .service files are installed (systems running systemd only) SPARSE=Yes #If non-empty, only install $PRODUCT/$PRODUCT.conf in $CONFDIR VARLIB=/var/lib #Directory where product variable data is stored. VARDIR=${VARLIB}/$PRODUCT #Directory where product variable data is stored. diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-core-4.6.4.3/shorewallrc.default new/shorewall-core-4.6.5.2/shorewallrc.default --- old/shorewall-core-4.6.4.3/shorewallrc.default 2014-10-19 16:44:01.000000000 +0200 +++ new/shorewall-core-4.6.5.2/shorewallrc.default 2014-11-15 17:56:42.000000000 +0100 @@ -14,7 +14,7 @@ INITFILE=$PRODUCT #Name of the product's installed SysV init script INITSOURCE=init.sh #Name of the distributed file to be installed as the SysV init script ANNOTATED= #If non-zero, annotated configuration files are installed -SYSTEMD= #Directory where .service files are installed (systems running systemd only) +SERVICEDIR= #Directory where .service files are installed (systems running systemd only) SERVICEFILE= #Name of the file to install in $SYSTEMD. Default is $PRODUCT.service SYSCONFFILE= #Name of the distributed file to be installed in $SYSCONFDIR SYSCONFDIR= #Directory where SysV init parameter files are installed diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-core-4.6.4.3/shorewallrc.redhat new/shorewall-core-4.6.5.2/shorewallrc.redhat --- old/shorewall-core-4.6.4.3/shorewallrc.redhat 2014-10-19 16:44:01.000000000 +0200 +++ new/shorewall-core-4.6.5.2/shorewallrc.redhat 2014-11-15 17:56:42.000000000 +0100 @@ -14,7 +14,7 @@ INITFILE=$PRODUCT #Name of the product's installed SysV init script INITSOURCE=init.fedora.sh #Name of the distributed file to be installed as the SysV init script ANNOTATED= #If non-zero, annotated configuration files are installed -SYSTEMD=/lib/systemd/system #Directory where .service files are installed (systems running systemd only) +SERVICEDIR=/lib/systemd/system #Directory where .service files are installed (systems running systemd only) SYSCONFFILE=sysconfig #Name of the distributed file to be installed as $SYSCONFDIR/$PRODUCT SERVICEFILE= #Name of the file to install in $SYSTEMD. Default is $PRODUCT.service SYSCONFDIR=/etc/sysconfig/ #Directory where SysV init parameter files are installed diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-core-4.6.4.3/shorewallrc.slackware new/shorewall-core-4.6.5.2/shorewallrc.slackware --- old/shorewall-core-4.6.4.3/shorewallrc.slackware 2014-10-19 16:44:01.000000000 +0200 +++ new/shorewall-core-4.6.5.2/shorewallrc.slackware 2014-11-15 17:56:42.000000000 +0100 @@ -15,7 +15,7 @@ AUXINITFILE=rc.firewall #Name of the product's installed SysV init script INITSOURCE=init.slackware.$PRODUCT.sh #Name of the distributed file to be installed as a second SysV init script INITFILE=rc.$PRODUCT #Name of the product's installed second init script -SYSTEMD= #Name of the directory where .service files are installed (systems running systemd only) +SERVICEDIR= #Name of the directory where .service files are installed (systems running systemd only) SERVICEFILE= #Name of the file to install in $SYSTEMD. Default is $PRODUCT.service SYSCONFFILE= #Name of the distributed file to be installed in $SYSCONFDIR SYSCONFDIR= #Name of the directory where SysV init parameter files are installed. diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-core-4.6.4.3/shorewallrc.suse new/shorewall-core-4.6.5.2/shorewallrc.suse --- old/shorewall-core-4.6.4.3/shorewallrc.suse 2014-10-19 16:44:01.000000000 +0200 +++ new/shorewall-core-4.6.5.2/shorewallrc.suse 2014-11-15 17:56:42.000000000 +0100 @@ -14,7 +14,7 @@ INITFILE=$PRODUCT #Name of the product's SysV init script INITSOURCE=init.suse.sh #Name of the distributed file to be installed as the SysV init script ANNOTATED= #If non-zero, annotated configuration files are installed -SYSTEMD= #Directory where .service files are installed (systems running systemd only) +SERVICEDIR= #Directory where .service files are installed (systems running systemd only) SERVICEFILE= #Name of the file to install in $SYSTEMD. Default is $PRODUCT.service SYSCONFFILE=sysconfig #Name of the distributed file to be installed in $SYSCONFDIR SYSCONFDIR=/etc/sysconfig/ #Directory where SysV init parameter files are installed diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-core-4.6.4.3/uninstall.sh new/shorewall-core-4.6.5.2/uninstall.sh --- old/shorewall-core-4.6.4.3/uninstall.sh 2014-10-19 16:59:57.000000000 +0200 +++ new/shorewall-core-4.6.5.2/uninstall.sh 2014-11-17 16:17:14.000000000 +0100 @@ -26,7 +26,7 @@ # You may only use this script to uninstall the version # shown below. Simply run this script to remove Shorewall Firewall -VERSION=4.6.4.3 +VERSION=4.6.5.2 usage() # $1 = exit status { ++++++ shorewall-docs-html-4.6.4.3.tar.bz2 -> shorewall-docs-html-4.6.5.2.tar.bz2 ++++++ ++++ 7715 lines of diff (skipped) ++++++ shorewall-init-4.6.4.3.tar.bz2 -> shorewall-init-4.6.5.2.tar.bz2 ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-init-4.6.4.3/changelog.txt new/shorewall-init-4.6.5.2/changelog.txt --- old/shorewall-init-4.6.4.3/changelog.txt 2014-10-19 17:16:42.000000000 +0200 +++ new/shorewall-init-4.6.5.2/changelog.txt 2014-11-17 16:17:15.000000000 +0100 @@ -1,14 +1,66 @@ -Changes in 4.6.4.3 +Changes in 4.6.5.1 -1) Update release documents +1) Update release documents. -2) Add xt_LOG to the helpers files. +2) Fix IPv6 LOG_BACKEND=LOG -Changes in 4.6.4.2 +Changes in 4.6.5.1 -1) Update release documents +1) Update release documents. -2) Add ipt_LOG to the helpers files. +2) Apply Alan Barrett's dhclient patch + +3) Make emacs sh-mode work better with lib.core + +4) Fix setting of options[SERVICEDIR] in configure + +5) Rename SYSTEMDDIR to SERVICEDIR in shorewallrc.* + +6) Eliminate redundant "/" in the installers + +Changes in 4.6.5 Final + +1) Update release documents. + +2) Apply Thomas D's manpage fixes. + +3) Correct .service files. + +Changes in 4.6.5 RC 1 + +1) Update release documents. + +2) Correct a couple of defects in the -C code. + +3) Fix LOG_BACKEND on kernel 3.17. + +Changes in 4.6.5 Beta 3 + +1) Update release documents. + +2) Process params files with $SHOREWALL_SHELL. + +3) Implement the -C option. + +Changes in 4.6.5 Beta 2 + +1) Update release documents. + +2) Defect repair from the 4.6.4 branch. + +3) Allow both source and dest limits in the RATE LIMIT column. + +Changes in 4.6.5 Beta 1 + +1) Update release documents. + +2) Merge defect repair from 4.6.4. + +Changes in 4.6.5 Beta 1 + +1) Update release documents. + +2) New .service file strategy. Changes in 4.6.4.1 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-init-4.6.4.3/configure new/shorewall-init-4.6.5.2/configure --- old/shorewall-init-4.6.4.3/configure 2014-10-19 17:16:42.000000000 +0200 +++ new/shorewall-init-4.6.5.2/configure 2014-11-17 16:17:15.000000000 +0100 @@ -28,7 +28,7 @@ # # Build updates this # -VERSION=4.6.4.3 +VERSION=4.6.5.2 case "$BASH_VERSION" in [4-9].*) @@ -195,6 +195,10 @@ fi fi +if [ -z "${options[SERVICEDIR]}" ]; then + options[SERVICEDIR]="${options[SYSTEMD]}" +fi + for on in \ HOST \ PREFIX \ @@ -209,7 +213,7 @@ INITFILE \ AUXINITSOURCE \ AUXINITFILE \ - SYSTEMD \ + SERVICEDIR \ SERVICEFILE \ SYSCONFFILE \ SYSCONFDIR \ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-init-4.6.4.3/configure.pl new/shorewall-init-4.6.5.2/configure.pl --- old/shorewall-init-4.6.4.3/configure.pl 2014-10-19 17:16:42.000000000 +0200 +++ new/shorewall-init-4.6.5.2/configure.pl 2014-11-17 16:17:15.000000000 +0100 @@ -31,7 +31,7 @@ # Build updates this # use constant { - VERSION => '4.6.4.3' + VERSION => '4.6.5.2' }; my %params; @@ -154,6 +154,8 @@ $options{VARDIR} = '${VARLIB}/${PRODUCT}'; } +$options{SERVICEDIR}=$options{SYSTEMD} unless $options{SERVICEDIR}; + for ( qw/ HOST PREFIX SHAREDIR @@ -167,8 +169,8 @@ INITFILE AUXINITSOURCE AUXINITFILE - SYSTEMD - SERVICEFILE + SERVICEDIR + SERVICEFILE SYSCONFFILE SYSCONFDIR SPARSE diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-init-4.6.4.3/install.sh new/shorewall-init-4.6.5.2/install.sh --- old/shorewall-init-4.6.4.3/install.sh 2014-10-19 17:16:42.000000000 +0200 +++ new/shorewall-init-4.6.5.2/install.sh 2014-11-17 16:17:15.000000000 +0100 @@ -27,7 +27,7 @@ # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. # -VERSION=4.6.4.3 +VERSION=4.6.5.2 usage() # $1 = exit status { @@ -330,12 +330,16 @@ # # Install the .service file # -if [ -n "$SYSTEMD" ]; then - mkdir -p ${DESTDIR}${SYSTEMD} +if [ -z "${SERVICEDIR}" ]; then + SERVICEDIR="$SYSTEMD" +fi + +if [ -n "$SERVICEDIR" ]; then + mkdir -p ${DESTDIR}${SERVICEDIR} [ -z "$SERVICEFILE" ] && SERVICEFILE=$PRODUCT.service - run_install $OWNERSHIP -m 644 $SERVICEFILE ${DESTDIR}${SYSTEMD}/$PRODUCT.service - [ ${SBINDIR} != /sbin ] && eval sed -i \'s\|/sbin/\|${SBINDIR}/\|\' ${DESTDIR}${SYSTEMD}/$PRODUCT.service - echo "Service file $SERVICEFILE installed as ${DESTDIR}${SYSTEMD}/$PRODUCT.service" + run_install $OWNERSHIP -m 644 $SERVICEFILE ${DESTDIR}${SERVICEDIR}/$PRODUCT.service + [ ${SBINDIR} != /sbin ] && eval sed -i \'s\|/sbin/\|${SBINDIR}/\|\' ${DESTDIR}${SERVICEDIR}/$PRODUCT.service + echo "Service file $SERVICEFILE installed as ${DESTDIR}${SERVICEDIR}/$PRODUCT.service" if [ -n "$DESTDIR" -o $configure -eq 0 ]; then mkdir -p ${DESTDIR}${SBINDIR} chmod 755 ${DESTDIR}${SBINDIR} @@ -513,7 +517,7 @@ # not by the installer /bin/true else - if [ -n "$SYSTEMD" ]; then + if [ -n "$SERVICEDIR" ]; then if systemctl enable shorewall-init.service; then echo "Shorewall Init will start automatically at boot" fi diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-init-4.6.4.3/releasenotes.txt new/shorewall-init-4.6.5.2/releasenotes.txt --- old/shorewall-init-4.6.4.3/releasenotes.txt 2014-10-19 17:16:42.000000000 +0200 +++ new/shorewall-init-4.6.5.2/releasenotes.txt 2014-11-17 16:17:15.000000000 +0100 @@ -1,7 +1,7 @@ ---------------------------------------------------------------------------- - S H O R E W A L L 4 . 6 . 4 . 3 + S H O R E W A L L 4 . 6 . 5 . 2 ------------------------------------ - O c t o b e r 2 0 , 2 0 1 4 + N o v e m b e r 1 8 , 2 0 1 4 ---------------------------------------------------------------------------- I. PROBLEMS CORRECTED IN THIS RELEASE @@ -14,82 +14,45 @@ I. P R O B L E M S C O R R E C T E D I N T H I S R E L E A S E ---------------------------------------------------------------------------- -4.6.4.3 +4.6.5.2 -1) The fix for LOGBACKEND in 4.6.4.2 worked on some older - distributions but not on newer ones. This release fixes the problem - in the remaining cases. +1) LOG_BACKEND=LOG failed at run-time for all but the most recent + kernels. -4.6.4.2 +4.6.5.1 -1) Setting LOGBACKEND=ipt_LOG could result in the following startup - failure at boot: +1) The generated script can now detect an gateway address assigned by + later versions of that program (Alan Barrett). - Starting shorewall ... - /var/lib/shorewall/firewall: line 2080: echo: write error: No such file or directory - WARNING: Unable to set log backend to ipt_LOG +2) In 4.6.5, the bash-based configure script would issue the following + diagnostic if SERVICEDIR was not specified in the shorewallrc + file: -4.6.4.1 - -1) Confusing 'usage' output was produced under the following - conditions: - - a) 4.6.4 installed - - b) The running firewall was compiled on an earlier release. - - c) A 'safe-start', 'save-restart', 'save' or 'try' command is - executed. - - This problem has been corrected. - -2) The 'optional' option has been removed from the IPv4 Universal - interfaces file, as that option caused startup failures. - -4.6.4 Final. + ./configure: line 199: [SERVICEDIR]=: command not found -1) This release includes defect repair through release 4.6.3.4. - -2) Two corrections have been made to the .service files: + This was compounded by the fact that all of the released + shorewallrc files still specified SYSTEMDDIR rather than SERVICEDIR + (Evangelos Foutras) - - The .service files now correctly specify - - WantedBy=basic.target +3) The shorewallrc.archlinux file now reflects a change in SBINDIR + that occurred in Arch Linux in mid 2013 (Evangelos Foutras). - - Conflicting services have been added. - -3) A warning message generated during stoppedrules processing - previously referred to the file as routestopped. - -4) Previously, the stoppedrules file did not work properly when - ADMINISABSENTMINDED=No. - - - A warning message was issued stating that the file would be - processed as if ADMINISABSENTMINDED=Yes, and it was. - - - Unfortunately, part of the surrounding rule-generating logic - proceded as if ADMINISABSENTMINDED=No, leading to an unusable - ruleset. - - This problem has been corrected by changing the way that - stoppedrules works with ADMINISABSENTMINDED=No. In the new - implementation: - - - All existing connections continue to work. - - Response packets and related connection requests to new accepted - connections are accepted (in other words, the resulting ruleset - is stateful). +4.6.5 - See shorewall[6].conf(5) for additional details. +1) This release includes defect repair through release 4.6.4.3. -5) The .spec files now set SBINDIR correctly. +2) On kernel 3.17, LOG_BACKEND=LOG previously failed with the + diagnostics: -6) The -lite installers now create INITDIR if it doesn't exist. + Setting up log backend + /var/lib/shorewall/.restart: line 2075: echo: write error: + No such file or directory + WARNING: Unable to set log backend to ipt_LOG -7) The installers no longer attempt to create a symbolic link to the - init script when no init script is installed. +3) A number of corrections have been made to the manpages (Thomas D). -8) A large number of defects in the uninstallers have been corrected. +4) Previously, if $OPTIONS was set in /etc/sysconfig/shorewall-init, + then servicd failed to start/stop Shorewall-init. ---------------------------------------------------------------------------- I I. K N O W N P R O B L E M S R E M A I N I N G @@ -102,39 +65,83 @@ I I I. N E W F E A T U R E S I N T H I S R E L E A S E ---------------------------------------------------------------------------- -1) Install support for Centos 7 and Foobar 7 has been added (Tuomo - Soini). - -2) A 'terminating' option has been added to shorewall[6].actions. - this option, when used with the 'builtin' option, indicates to the - compiler that the built-in action is terminating. This allows the - optimizer to omit rules after an unconditional jump to the - built-in. - -3) A LOG_BACKEND option has been added to allow specification of the - default logging backends. See shorewall.conf(5) and - shorewall6.conf(5) for details. - -4) The SAVE_IPSETS option may now specify a list of ipsets to be - saved. When such a list is specified, only those ipsets together - with the ipsets supporting dynamic zones are saved. - - Shorewall6 now supports the SAVE_IPSETS option. When - SAVE_IPSETS=Yes, only ipv6 ipsets are saved. For Shorewall, if - SAVE_IPSETS=ipv4, then only ipv4 ipsets are saved. Both features - require ipset version 5 or later. - - Note that shorewall.conf and shorewall6.conf may now both specify - SAVE_IPSETS. - -5) The SBINDIR setting for SuSE now defaults to /usr/sbin/. - -6) With the exception of Shorewall-core, the tarball installers and - uninstallers now support a -n option which inhibits any attempt to - change the startup configuration. The -n option can be - automatically invoked by setting the SANDBOX variable to a - non-empty value, either in the environment or in your shorewallrc - file. +1) The configure scripts and installers now support SERVICEDIR as an + alternative to SYSTEMD. For compatability, SERVICED is an alias + for SERVICEDIR. + +2) The installers now offer a choice of .service files, selected by + the SERVICEFILE option. The default remains $PRODUCT.service. Each + product supplying a .service file now supplies a .service.214. The + differences between the standard .service files and the service.214 + files are: + + a) They specify 'after=network-online.target' rather than + 'after=network.target'. + + b) The file shorewall-init.service.214 specifies + 'before=network-pre.target' rather than + 'before=network.target'. That file requires serviced 214 or + later, hence the names of the new files. + + Regardless of which file is selected, it is installed in + $SERVICEDIR/$PRODUCT.service. + +3) The RATE LIMIT column of the rules files now allows specification + of both a per-source and per-destination limit. See + shorewall[6]-rules(5) for details. + +4) Previously, /bin/sh was used unconditionally to process the helper + script 'getparams'. That shell script reads the params file and + passes back the (variable,value) pairs to the compiler. Beginning + with this release, $SHOREWALL_SHELL is used to process that script, + unless the compilation is for export, in which case /bin/sh is + still used. + + Note that the default value of $SHOREWALL_SHELL is /bin/sh, so + unless your configuration sets that variable, this enhancement will + have no effect. Similarly, on an administrative system, this + enhancement has no effect on the processing of the 'compile -e', + 'load', 'reload' and 'export' commands. + +5) A -C option has been added to several commands to allow the + ip[6]tables packet and byte counters to be preserved. + + - save command + + Causes the packet and byte counters to be saved along with the + chains and rules. + + - restore command + + Causes the packet and byte counters (if saved) to be restored + along with the chains and rules. + + - start command + + With Shorewall and Shorewall6, the -C option only has an effect + if the -f option is also specified. If a previously-saved + configuration is restored, then the packet and byte counters (if + saved) will be restored along with the chains and rules. + + - restart command + + If an existing compiled script is used (no recompilation + required) and if that script generated the current running + configuration, then the current netfilter configuration is + reloaded as is so as to preserve the current packet and byte + counters. + + If you wish to (approximately) preserve the counters over a + possibly unexpected reboot, then: + + - Create a cron job that periodically does 'shorewall save -C' + + - Specify the -C and -f option in the STARTOPTIONS variable in + either /etc/default/shorewall[6][-lite] or + /etc/sysconfig/shorewall[6][-lite], whichever is supported by your + distribution. Note that some distributions do not distribute these + files so you may have to create the one(s) you need (such as + /etc/sysconfig/shorewall). ---------------------------------------------------------------------------- I V. M I G R A T I O N I S S U E S @@ -429,6 +436,110 @@ ---------------------------------------------------------------------------- V. N O T E S F R O M O T H E R 4 . 6 R E L E A S E S ---------------------------------------------------------------------------- + P R O B L E M S C O R R E C T E D I N 4 . 6 . 4 +---------------------------------------------------------------------------- + +4.6.4.1 + +1) Confusing 'usage' output was produced under the following + conditions: + + a) 4.6.4 installed + + b) The running firewall was compiled on an earlier release. + + c) A 'safe-start', 'save-restart', 'save' or 'try' command is + executed. + + This problem has been corrected. + +2) The 'optional' option has been removed from the IPv4 Universal + interfaces file, as that option caused startup failures. + +4.6.4 Final. + +1) This release includes defect repair through release 4.6.3.4. + +2) Two corrections have been made to the .service files: + + - The .service files now correctly specify + + WantedBy=basic.target + + - Conflicting services have been added. + +3) A warning message generated during stoppedrules processing + previously referred to the file as routestopped. + +4) Previously, the stoppedrules file did not work properly when + ADMINISABSENTMINDED=No. + + - A warning message was issued stating that the file would be + processed as if ADMINISABSENTMINDED=Yes, and it was. + + - Unfortunately, part of the surrounding rule-generating logic + proceded as if ADMINISABSENTMINDED=No, leading to an unusable + ruleset. + + This problem has been corrected by changing the way that + stoppedrules works with ADMINISABSENTMINDED=No. In the new + implementation: + + - All existing connections continue to work. + - Response packets and related connection requests to new accepted + connections are accepted (in other words, the resulting ruleset + is stateful). + + See shorewall[6].conf(5) for additional details. + +5) The .spec files now set SBINDIR correctly. + +6) The -lite installers now create INITDIR if it doesn't exist. + +7) The installers no longer attempt to create a symbolic link to the + init script when no init script is installed. + +8) A large number of defects in the uninstallers have been corrected. + +---------------------------------------------------------------------------- + N E W F E A T U R E S I N 4 . 6 . 4 +---------------------------------------------------------------------------- + +1) Install support for Centos 7 and Foobar 7 has been added (Tuomo + Soini). + +2) A 'terminating' option has been added to shorewall[6].actions. + this option, when used with the 'builtin' option, indicates to the + compiler that the built-in action is terminating. This allows the + optimizer to omit rules after an unconditional jump to the + built-in. + +3) A LOG_BACKEND option has been added to allow specification of the + default logging backends. See shorewall.conf(5) and + shorewall6.conf(5) for details. + +4) The SAVE_IPSETS option may now specify a list of ipsets to be + saved. When such a list is specified, only those ipsets together + with the ipsets supporting dynamic zones are saved. + + Shorewall6 now supports the SAVE_IPSETS option. When + SAVE_IPSETS=Yes, only ipv6 ipsets are saved. For Shorewall, if + SAVE_IPSETS=ipv4, then only ipv4 ipsets are saved. Both features + require ipset version 5 or later. + + Note that shorewall.conf and shorewall6.conf may now both specify + SAVE_IPSETS. + +5) The SBINDIR setting for SuSE now defaults to /usr/sbin/. + +6) With the exception of Shorewall-core, the tarball installers and + uninstallers now support a -n option which inhibits any attempt to + change the startup configuration. The -n option can be + automatically invoked by setting the SANDBOX variable to a + non-empty value, either in the environment or in your shorewallrc + file. + +---------------------------------------------------------------------------- P R O B L E M S C O R R E C T E D I N 4 . 6 . 3 ---------------------------------------------------------------------------- diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-init-4.6.4.3/shorewall-init.service new/shorewall-init-4.6.5.2/shorewall-init.service --- old/shorewall-init-4.6.4.3/shorewall-init.service 2014-10-19 17:16:02.000000000 +0200 +++ new/shorewall-init-4.6.5.2/shorewall-init.service 2014-11-15 17:56:42.000000000 +0100 @@ -13,8 +13,8 @@ RemainAfterExit=yes EnvironmentFile=-/etc/sysconfig/shorewall-init StandardOutput=syslog -ExecStart=/sbin/shorewall-init $OPTIONS start -ExecStop=/sbin/shorewall-init $OPTIONS stop +ExecStart=/sbin/shorewall-init start +ExecStop=/sbin/shorewall-init stop [Install] WantedBy=basic.target diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-init-4.6.4.3/shorewall-init.service.214 new/shorewall-init-4.6.5.2/shorewall-init.service.214 --- old/shorewall-init-4.6.4.3/shorewall-init.service.214 1970-01-01 01:00:00.000000000 +0100 +++ new/shorewall-init-4.6.5.2/shorewall-init.service.214 2014-11-15 17:56:42.000000000 +0100 @@ -0,0 +1,21 @@ +# +# The Shoreline Firewall (Shorewall) Packet Filtering Firewall +# +# Copyright 2011 Jonathan Underwood <jonathan.underwood@gmail.com> +# +[Unit] +Description=Shorewall IPv4 firewall (bootup security) +Before=network-pre.target +Wants=network-pre.target +Conflicts=iptables.service firewalld.service + +[Service] +Type=oneshot +RemainAfterExit=yes +EnvironmentFile=-/etc/sysconfig/shorewall-init +StandardOutput=syslog +ExecStart=/sbin/shorewall-init start +ExecStop=/sbin/shorewall-init stop + +[Install] +WantedBy=basic.target diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-init-4.6.4.3/shorewall-init.spec new/shorewall-init-4.6.5.2/shorewall-init.spec --- old/shorewall-init-4.6.4.3/shorewall-init.spec 2014-10-19 17:16:42.000000000 +0200 +++ new/shorewall-init-4.6.5.2/shorewall-init.spec 2014-11-17 16:17:15.000000000 +0100 @@ -1,6 +1,6 @@ %define name shorewall-init -%define version 4.6.4 -%define release 3 +%define version 4.6.5 +%define release 2 Summary: Shorewall-init adds functionality to Shoreline Firewall (Shorewall). Name: %{name} @@ -126,12 +126,20 @@ %doc COPYING changelog.txt releasenotes.txt %changelog -* Sun Oct 19 2014 Tom Eastep tom@shorewall.net -- Updated to 4.6.4-3 -* Wed Oct 15 2014 Tom Eastep tom@shorewall.net -- Updated to 4.6.4-2 -* Fri Oct 10 2014 Tom Eastep tom@shorewall.net -- Updated to 4.6.4-1 +* Sat Nov 15 2014 Tom Eastep tom@shorewall.net +- Updated to 4.6.5-2 +* Fri Nov 14 2014 Tom Eastep tom@shorewall.net +- Updated to 4.6.5-1 +* Thu Nov 06 2014 Tom Eastep tom@shorewall.net +- Updated to 4.6.5-0base +* Sat Nov 01 2014 Tom Eastep tom@shorewall.net +- Updated to 4.6.5-0RC1 +* Thu Oct 30 2014 Tom Eastep tom@shorewall.net +- Updated to 4.6.5-0Beta3 +* Mon Oct 20 2014 Tom Eastep tom@shorewall.net +- Updated to 4.6.5-0Beta2 +* Wed Oct 08 2014 Tom Eastep tom@shorewall.net +- Updated to 4.6.5-0Beta1 * Mon Oct 06 2014 Tom Eastep tom@shorewall.net - Updated to 4.6.4-0base * Thu Oct 02 2014 Tom Eastep tom@shorewall.net diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-init-4.6.4.3/shorewallrc.apple new/shorewall-init-4.6.5.2/shorewallrc.apple --- old/shorewall-init-4.6.4.3/shorewallrc.apple 2014-10-19 17:16:42.000000000 +0200 +++ new/shorewall-init-4.6.5.2/shorewallrc.apple 2014-11-17 16:17:15.000000000 +0100 @@ -14,7 +14,7 @@ INITFILE= #Unused on OS X INITSOURCE= #Unused on OS X ANNOTATED= #Unused on OS X -SYSTEMD= #Unused on OS X +SERVICEDIR= #Unused on OS X SERVICEFILE= #Unused on OS X SYSCONFDIR= #Unused on OS X SPARSE=Yes #Only install $PRODUCT/$PRODUCT.conf in $CONFDIR. diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-init-4.6.4.3/shorewallrc.archlinux new/shorewall-init-4.6.5.2/shorewallrc.archlinux --- old/shorewall-init-4.6.4.3/shorewallrc.archlinux 2014-10-19 17:16:42.000000000 +0200 +++ new/shorewall-init-4.6.5.2/shorewallrc.archlinux 2014-11-17 16:17:15.000000000 +0100 @@ -8,14 +8,14 @@ LIBEXECDIR=${PREFIX}/share #Directory for executable scripts. PERLLIBDIR=${PREFIX}/share/shorewall #Directory to install Shorewall Perl module directory CONFDIR=/etc #Directory where subsystem configurations are installed -SBINDIR=/usr/sbin #Directory where system administration programs are installed +SBINDIR=/usr/bin #Directory where system administration programs are installed MANDIR=${SHAREDIR}/man #Directory where manpages are installed. INITDIR= #Directory where SysV init scripts are installed. INITFILE= #Name of the product's installed SysV init script INITSOURCE= #Name of the distributed file to be installed as the SysV init script ANNOTATED= #If non-zero, annotated configuration files are installed SYSCONFDIR= #Directory where SysV init parameter files are installed -SYSTEMD=/usr/lib/systemd/system #Directory where .service files are installed (systems running systemd only) +SERVICEDIR=/usr/lib/systemd/system #Directory where .service files are installed (systems running systemd only) SERVICEFILE= #Name of the file to install in $SYSTEMD. Default is $PRODUCT.service SPARSE= #If non-empty, only install $PRODUCT/$PRODUCT.conf in $CONFDIR VARLIB=/var/lib #Directory where product variable data is stored. diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-init-4.6.4.3/shorewallrc.cygwin new/shorewall-init-4.6.5.2/shorewallrc.cygwin --- old/shorewall-init-4.6.4.3/shorewallrc.cygwin 2014-10-19 17:16:42.000000000 +0200 +++ new/shorewall-init-4.6.5.2/shorewallrc.cygwin 2014-11-17 16:17:15.000000000 +0100 @@ -14,7 +14,7 @@ INITFILE= #Unused on Cygwin INITSOURCE= #Unused on Cygwin ANNOTATED= #Unused on Cygwin -SYSTEMD= #Unused on Cygwin +SERVICEDIR= #Unused on Cygwin SERVICEFILE= #Unused on Cygwin SYSCONFDIR= #Unused on Cygwin SPARSE=Yes #Only install $PRODUCT/$PRODUCT.conf in $CONFDIR. diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-init-4.6.4.3/shorewallrc.debian new/shorewall-init-4.6.5.2/shorewallrc.debian --- old/shorewall-init-4.6.4.3/shorewallrc.debian 2014-10-19 17:16:42.000000000 +0200 +++ new/shorewall-init-4.6.5.2/shorewallrc.debian 2014-11-17 16:17:15.000000000 +0100 @@ -17,7 +17,7 @@ SYSCONFFILE=default.debian #Name of the distributed file to be installed in $SYSCONFDIR SERVICEFILE= #Name of the file to install in $SYSTEMD. Default is $PRODUCT.service SYSCONFDIR=/etc/default #Directory where SysV init parameter files are installed -SYSTEMD= #Directory where .service files are installed (systems running systemd only) +SERVICEDIR= #Directory where .service files are installed (systems running systemd only) SPARSE=Yes #If non-empty, only install $PRODUCT/$PRODUCT.conf in $CONFDIR VARLIB=/var/lib #Directory where product variable data is stored. VARDIR=${VARLIB}/$PRODUCT #Directory where product variable data is stored. diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-init-4.6.4.3/shorewallrc.default new/shorewall-init-4.6.5.2/shorewallrc.default --- old/shorewall-init-4.6.4.3/shorewallrc.default 2014-10-19 17:16:42.000000000 +0200 +++ new/shorewall-init-4.6.5.2/shorewallrc.default 2014-11-17 16:17:15.000000000 +0100 @@ -14,7 +14,7 @@ INITFILE=$PRODUCT #Name of the product's installed SysV init script INITSOURCE=init.sh #Name of the distributed file to be installed as the SysV init script ANNOTATED= #If non-zero, annotated configuration files are installed -SYSTEMD= #Directory where .service files are installed (systems running systemd only) +SERVICEDIR= #Directory where .service files are installed (systems running systemd only) SERVICEFILE= #Name of the file to install in $SYSTEMD. Default is $PRODUCT.service SYSCONFFILE= #Name of the distributed file to be installed in $SYSCONFDIR SYSCONFDIR= #Directory where SysV init parameter files are installed diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-init-4.6.4.3/shorewallrc.redhat new/shorewall-init-4.6.5.2/shorewallrc.redhat --- old/shorewall-init-4.6.4.3/shorewallrc.redhat 2014-10-19 17:16:42.000000000 +0200 +++ new/shorewall-init-4.6.5.2/shorewallrc.redhat 2014-11-17 16:17:15.000000000 +0100 @@ -14,7 +14,7 @@ INITFILE=$PRODUCT #Name of the product's installed SysV init script INITSOURCE=init.fedora.sh #Name of the distributed file to be installed as the SysV init script ANNOTATED= #If non-zero, annotated configuration files are installed -SYSTEMD=/lib/systemd/system #Directory where .service files are installed (systems running systemd only) +SERVICEDIR=/lib/systemd/system #Directory where .service files are installed (systems running systemd only) SYSCONFFILE=sysconfig #Name of the distributed file to be installed as $SYSCONFDIR/$PRODUCT SERVICEFILE= #Name of the file to install in $SYSTEMD. Default is $PRODUCT.service SYSCONFDIR=/etc/sysconfig/ #Directory where SysV init parameter files are installed diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-init-4.6.4.3/shorewallrc.slackware new/shorewall-init-4.6.5.2/shorewallrc.slackware --- old/shorewall-init-4.6.4.3/shorewallrc.slackware 2014-10-19 17:16:42.000000000 +0200 +++ new/shorewall-init-4.6.5.2/shorewallrc.slackware 2014-11-17 16:17:15.000000000 +0100 @@ -15,7 +15,7 @@ AUXINITFILE=rc.firewall #Name of the product's installed SysV init script INITSOURCE=init.slackware.$PRODUCT.sh #Name of the distributed file to be installed as a second SysV init script INITFILE=rc.$PRODUCT #Name of the product's installed second init script -SYSTEMD= #Name of the directory where .service files are installed (systems running systemd only) +SERVICEDIR= #Name of the directory where .service files are installed (systems running systemd only) SERVICEFILE= #Name of the file to install in $SYSTEMD. Default is $PRODUCT.service SYSCONFFILE= #Name of the distributed file to be installed in $SYSCONFDIR SYSCONFDIR= #Name of the directory where SysV init parameter files are installed. diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-init-4.6.4.3/shorewallrc.suse new/shorewall-init-4.6.5.2/shorewallrc.suse --- old/shorewall-init-4.6.4.3/shorewallrc.suse 2014-10-19 17:16:42.000000000 +0200 +++ new/shorewall-init-4.6.5.2/shorewallrc.suse 2014-11-17 16:17:15.000000000 +0100 @@ -14,7 +14,7 @@ INITFILE=$PRODUCT #Name of the product's SysV init script INITSOURCE=init.suse.sh #Name of the distributed file to be installed as the SysV init script ANNOTATED= #If non-zero, annotated configuration files are installed -SYSTEMD= #Directory where .service files are installed (systems running systemd only) +SERVICEDIR= #Directory where .service files are installed (systems running systemd only) SERVICEFILE= #Name of the file to install in $SYSTEMD. Default is $PRODUCT.service SYSCONFFILE=sysconfig #Name of the distributed file to be installed in $SYSCONFDIR SYSCONFDIR=/etc/sysconfig/ #Directory where SysV init parameter files are installed diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-init-4.6.4.3/uninstall.sh new/shorewall-init-4.6.5.2/uninstall.sh --- old/shorewall-init-4.6.4.3/uninstall.sh 2014-10-19 17:16:42.000000000 +0200 +++ new/shorewall-init-4.6.5.2/uninstall.sh 2014-11-17 16:17:15.000000000 +0100 @@ -26,7 +26,7 @@ # You may only use this script to uninstall the version # shown below. Simply run this script to remove Shorewall Firewall -VERSION=4.6.4.3 +VERSION=4.6.5.2 usage() # $1 = exit status { ++++++ shorewall-lite-4.6.4.3.tar.bz2 -> shorewall-lite-4.6.5.2.tar.bz2 ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-lite-4.6.4.3/changelog.txt new/shorewall-lite-4.6.5.2/changelog.txt --- old/shorewall-lite-4.6.4.3/changelog.txt 2014-10-19 16:59:58.000000000 +0200 +++ new/shorewall-lite-4.6.5.2/changelog.txt 2014-11-17 16:17:15.000000000 +0100 @@ -1,14 +1,66 @@ -Changes in 4.6.4.3 +Changes in 4.6.5.1 -1) Update release documents +1) Update release documents. -2) Add xt_LOG to the helpers files. +2) Fix IPv6 LOG_BACKEND=LOG -Changes in 4.6.4.2 +Changes in 4.6.5.1 -1) Update release documents +1) Update release documents. -2) Add ipt_LOG to the helpers files. +2) Apply Alan Barrett's dhclient patch + +3) Make emacs sh-mode work better with lib.core + +4) Fix setting of options[SERVICEDIR] in configure + +5) Rename SYSTEMDDIR to SERVICEDIR in shorewallrc.* + +6) Eliminate redundant "/" in the installers + +Changes in 4.6.5 Final + +1) Update release documents. + +2) Apply Thomas D's manpage fixes. + +3) Correct .service files. + +Changes in 4.6.5 RC 1 + +1) Update release documents. + +2) Correct a couple of defects in the -C code. + +3) Fix LOG_BACKEND on kernel 3.17. + +Changes in 4.6.5 Beta 3 + +1) Update release documents. + +2) Process params files with $SHOREWALL_SHELL. + +3) Implement the -C option. + +Changes in 4.6.5 Beta 2 + +1) Update release documents. + +2) Defect repair from the 4.6.4 branch. + +3) Allow both source and dest limits in the RATE LIMIT column. + +Changes in 4.6.5 Beta 1 + +1) Update release documents. + +2) Merge defect repair from 4.6.4. + +Changes in 4.6.5 Beta 1 + +1) Update release documents. + +2) New .service file strategy. Changes in 4.6.4.1 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-lite-4.6.4.3/configure new/shorewall-lite-4.6.5.2/configure --- old/shorewall-lite-4.6.4.3/configure 2014-10-19 16:59:59.000000000 +0200 +++ new/shorewall-lite-4.6.5.2/configure 2014-11-17 16:17:15.000000000 +0100 @@ -28,7 +28,7 @@ # # Build updates this # -VERSION=4.6.4.3 +VERSION=4.6.5.2 case "$BASH_VERSION" in [4-9].*) @@ -195,6 +195,10 @@ fi fi +if [ -z "${options[SERVICEDIR]}" ]; then + options[SERVICEDIR]="${options[SYSTEMD]}" +fi + for on in \ HOST \ PREFIX \ @@ -209,7 +213,7 @@ INITFILE \ AUXINITSOURCE \ AUXINITFILE \ - SYSTEMD \ + SERVICEDIR \ SERVICEFILE \ SYSCONFFILE \ SYSCONFDIR \ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-lite-4.6.4.3/configure.pl new/shorewall-lite-4.6.5.2/configure.pl --- old/shorewall-lite-4.6.4.3/configure.pl 2014-10-19 16:59:59.000000000 +0200 +++ new/shorewall-lite-4.6.5.2/configure.pl 2014-11-17 16:17:15.000000000 +0100 @@ -31,7 +31,7 @@ # Build updates this # use constant { - VERSION => '4.6.4.3' + VERSION => '4.6.5.2' }; my %params; @@ -154,6 +154,8 @@ $options{VARDIR} = '${VARLIB}/${PRODUCT}'; } +$options{SERVICEDIR}=$options{SYSTEMD} unless $options{SERVICEDIR}; + for ( qw/ HOST PREFIX SHAREDIR @@ -167,8 +169,8 @@ INITFILE AUXINITSOURCE AUXINITFILE - SYSTEMD - SERVICEFILE + SERVICEDIR + SERVICEFILE SYSCONFFILE SYSCONFDIR SPARSE diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-lite-4.6.4.3/helpers new/shorewall-lite-4.6.5.2/helpers --- old/shorewall-lite-4.6.4.3/helpers 2014-10-19 16:59:58.000000000 +0200 +++ new/shorewall-lite-4.6.5.2/helpers 2014-11-17 16:17:15.000000000 +0100 @@ -58,11 +58,13 @@ loadmodule nf_nat_snmp_basic loadmodule nf_nat_tftp # -# While not actually helpers, these are handy to have. Not -# all of these will be found on any given system, since -# some are aliases on later kernels. +# While not actually helpers, these are included here so that +# LOG_BACKEND can work correctly. Not all of them will be +# loaded, since at least one of them will be an alias on any +# given system. # loadmodule ipt_LOG +loadmodule nf_log_ipv4 loadmodule xt_LOG loadmodule xt_NFLOG loadmodule ipt_ULOG diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-lite-4.6.4.3/init.fedora.sh new/shorewall-lite-4.6.5.2/init.fedora.sh --- old/shorewall-lite-4.6.4.3/init.fedora.sh 2014-10-19 16:44:01.000000000 +0200 +++ new/shorewall-lite-4.6.5.2/init.fedora.sh 2014-11-15 17:56:42.000000000 +0100 @@ -39,7 +39,7 @@ start() { echo -n $"Starting Shorewall: " - $shorewall $OPTIONS start 2>&1 | $logger + $shorewall $OPTIONS start $STARTOPTIONS 2>&1 | $logger retval=${PIPESTATUS[0]} if [[ $retval == 0 ]]; then touch $lockfile @@ -69,7 +69,7 @@ # Note that we don't simply stop and start since shorewall has a built in # restart which stops the firewall if running and then starts it. echo -n $"Restarting Shorewall: " - $shorewall $OPTIONS restart 2>&1 | $logger + $shorewall $OPTIONS restart $RESTARTOPTIONS 2>&1 | $logger retval=${PIPESTATUS[0]} if [[ $retval == 0 ]]; then touch $lockfile diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-lite-4.6.4.3/install.sh new/shorewall-lite-4.6.5.2/install.sh --- old/shorewall-lite-4.6.4.3/install.sh 2014-10-19 16:59:58.000000000 +0200 +++ new/shorewall-lite-4.6.5.2/install.sh 2014-11-17 16:17:15.000000000 +0100 @@ -22,7 +22,7 @@ # along with this program; if not, see <http://www.gnu.org/licenses/>. # -VERSION=4.6.4.3 +VERSION=4.6.5.2 usage() # $1 = exit status { @@ -381,7 +381,7 @@ if [ -n "$INITFILE" ]; then if [ -f "${INITSOURCE}" ]; then - initfile="${DESTDIR}/${INITDIR}/${INITFILE}" + initfile="${DESTDIR}${INITDIR}/${INITFILE}" install_file ${INITSOURCE} "$initfile" 0544 [ "${SHAREDIR}" = /usr/share ] || eval sed -i \'s\|/usr/share/\|${SHAREDIR}/\|\' "$initfile" @@ -392,12 +392,16 @@ # # Install the .service file # -if [ -n "$SYSTEMD" ]; then - mkdir -p ${DESTDIR}${SYSTEMD} +if [ -z "${SERVICEDIR}" ]; then + SERVICEDIR="$SYSTEMD" +fi + +if [ -n "$SERVICEDIR" ]; then + mkdir -p ${DESTDIR}${SERVICEDIR} [ -z "$SERVICEFILE" ] && SERVICEFILE=$PRODUCT.service - run_install $OWNERSHIP -m 644 $SERVICEFILE ${DESTDIR}${SYSTEMD}/$PRODUCT.service - [ ${SBINDIR} != /sbin ] && eval sed -i \'s\|/sbin/\|${SBINDIR}/\|\' ${DESTDIR}${SYSTEMD}/$PRODUCT.service - echo "Service file $SERVICEFILE installed as ${DESTDIR}${SYSTEMD}/$PRODUCT.service" + run_install $OWNERSHIP -m 644 $SERVICEFILE ${DESTDIR}${SERVICEDIR}/$PRODUCT.service + [ ${SBINDIR} != /sbin ] && eval sed -i \'s\|/sbin/\|${SBINDIR}/\|\' ${DESTDIR}${SERVICEDIR}/$PRODUCT.service + echo "Service file $SERVICEFILE installed as ${DESTDIR}${SERVICEDIR}/$PRODUCT.service" fi # # Install the config file @@ -539,7 +543,7 @@ fi if [ $configure -eq 1 -a -z "$DESTDIR" -a -n "$first_install" -a -z "${cygwin}${mac}" ]; then - if [ -n "$SYSTEMD" ]; then + if [ -n "$SERVICEDIR" ]; then if systemctl enable ${PRODUCT}.service; then echo "$Product will start automatically at boot" fi diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-lite-4.6.4.3/manpages/shorewall-lite-vardir.5 new/shorewall-lite-4.6.5.2/manpages/shorewall-lite-vardir.5 --- old/shorewall-lite-4.6.4.3/manpages/shorewall-lite-vardir.5 2014-10-19 17:03:23.000000000 +0200 +++ new/shorewall-lite-4.6.5.2/manpages/shorewall-lite-vardir.5 2014-11-17 16:20:35.000000000 +0100 @@ -2,12 +2,12 @@ .\" Title: shorewall-lite-vardir .\" Author: [FIXME: author] [see http://docbook.sf.net/el/author] .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/> -.\" Date: 10/19/2014 +.\" Date: 11/17/2014 .\" Manual: Configuration Files .\" Source: Configuration Files .\" Language: English .\" -.TH "SHOREWALL\-LITE\-VAR" "5" "10/19/2014" "Configuration Files" "Configuration Files" +.TH "SHOREWALL\-LITE\-VAR" "5" "11/17/2014" "Configuration Files" "Configuration Files" .\" ----------------------------------------------------------------- .\" * Define some portability stuff .\" ----------------------------------------------------------------- diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-lite-4.6.4.3/manpages/shorewall-lite.8 new/shorewall-lite-4.6.5.2/manpages/shorewall-lite.8 --- old/shorewall-lite-4.6.4.3/manpages/shorewall-lite.8 2014-10-19 17:03:24.000000000 +0200 +++ new/shorewall-lite-4.6.5.2/manpages/shorewall-lite.8 2014-11-17 16:20:36.000000000 +0100 @@ -2,12 +2,12 @@ .\" Title: shorewall-lite .\" Author: [FIXME: author] [see http://docbook.sf.net/el/author] .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/> -.\" Date: 10/19/2014 +.\" Date: 11/17/2014 .\" Manual: Administrative Commands .\" Source: Administrative Commands .\" Language: English .\" -.TH "SHOREWALL\-LITE" "8" "10/19/2014" "Administrative Commands" "Administrative Commands" +.TH "SHOREWALL\-LITE" "8" "11/17/2014" "Administrative Commands" "Administrative Commands" .\" ----------------------------------------------------------------- .\" * Define some portability stuff .\" ----------------------------------------------------------------- @@ -71,13 +71,13 @@ .HP \w'\fBshorewall\-lite\fR\ 'u \fBshorewall\-lite\fR [\fBtrace\fR|\fBdebug\fR\ [\fBnolock\fR]] [\-\fIoptions\fR] \fBreset\fR .HP \w'\fBshorewall\-lite\fR\ 'u -\fBshorewall\-lite\fR [\fBtrace\fR|\fBdebug\fR\ [\fBnolock\fR]] [\-\fIoptions\fR] \fBrestart\fR [\fB\-n\fR] [\fB\-p\fR] [\fIdirectory\fR] +\fBshorewall\-lite\fR [\fBtrace\fR|\fBdebug\fR\ [\fBnolock\fR]] [\-\fIoptions\fR] \fBrestart\fR [\fB\-n\fR] [\fB\-p\fR\ [\fB\-C\fR]] [\fIdirectory\fR] .HP \w'\fBshorewall\-lite\fR\ 'u -\fBshorewall\-lite\fR [\fBtrace\fR|\fBdebug\fR\ [\fBnolock\fR]] [\-\fIoptions\fR] \fBrestore\fR [\fIfilename\fR] +\fBshorewall\-lite\fR [\fBtrace\fR|\fBdebug\fR\ [\fBnolock\fR]] [\-\fIoptions\fR] \fBrestore\fR [\fB\-C\fR] [\fIfilename\fR] .HP \w'\fBshorewall\-lite\fR\ 'u \fBshorewall\-lite\fR [\fBtrace\fR|\fBdebug\fR\ [\fBnolock\fR]] [\-\fIoptions\fR] \fBrun\fR function [\fIparameter\ \&.\&.\&.\fR] .HP \w'\fBshorewall\-lite\fR\ 'u -\fBshorewall\-lite\fR [\fBtrace\fR|\fBdebug\fR\ [\fBnolock\fR]] [\-\fIoptions\fR] \fBsave\fR [\fIfilename\fR] +\fBshorewall\-lite\fR [\fBtrace\fR|\fBdebug\fR\ [\fBnolock\fR]] [\-\fIoptions\fR] \fBsave\fR\ [\fB\-C\fR] [\fIfilename\fR] .HP \w'\fBshorewall\-lite\fR\ 'u \fBshorewall\-lite\fR [\fBtrace\fR|\fBdebug\fR] [\-\fIoptions\fR] [\fBshow\ |\ list\ |\ ls\ \fR] [\fB\-b\fR] [\fB\-x\fR] [\fB\-l\fR] [\fB\-t\fR\ {\fBfilter\fR|\fBmangle\fR|\fBnat\fR|\fBraw|rawpost\fR}] [[\fBchain\fR]\ \fIchain\fR...] .HP \w'\fBshorewall\-lite\fR\ 'u @@ -95,7 +95,7 @@ .HP \w'\fBshorewall\-lite\fR\ 'u \fBshorewall\-lite\fR [\fBtrace\fR|\fBdebug\fR] [\-\fIoptions\fR] [\fBshow\ |\ list\ |\ ls\ \fR] [\fB\-m\fR] \fBlog\fR .HP \w'\fBshorewall\-lite\fR\ 'u -\fBshorewall\-lite\fR [\fBtrace\fR|\fBdebug\fR\ [\fBnolock\fR]] [\-\fIoptions\fR] \fBstart\fR [\fB\-n\fR] [\fB\-p\fR] +\fBshorewall\-lite\fR [\fBtrace\fR|\fBdebug\fR\ [\fBnolock\fR]] [\-\fIoptions\fR] \fBstart\fR [\fB\-n\fR] [\fB\-p\fR] [\fB\-f\fR] [\fB\-C\fR] .HP \w'\fBshorewall\-lite\fR\ 'u \fBshorewall\-lite\fR [\fBtrace\fR|\fBdebug\fR\ [\fBnolock\fR]] [\-\fIoptions\fR] \fBstop\fR .HP \w'\fBshorewall\-lite\fR\ 'u @@ -118,8 +118,9 @@ \fBoption\fR prevents the command from attempting to acquire the Shorewall\-lite lockfile\&. It is useful if you need to include \fBshorewall\fR -commands in -/etc/shorewall/started\&. +commands in the +started +\m[blue]\fBextension script\fR\m[]\&\s-2\u[1]\d\s+2\&. .PP The \fIoptions\fR @@ -127,13 +128,13 @@ \fBv\fR and \fBq\fR\&. If the options are omitted, the amount of output is determined by the setting of the VERBOSITY parameter in -\m[blue]\fBshorewall\&.conf\fR\m[]\&\s-2\u[1]\d\s+2(5)\&. Each +\m[blue]\fBshorewall\&.conf\fR\m[]\&\s-2\u[2]\d\s+2(5)\&. Each \fBv\fR adds one to the effective verbosity and each \fBq\fR subtracts one from the effective VERBOSITY\&. Alternately, \fBv\fR -may be followed immediately with one of \-1,0,1,2 to specify a specify VERBOSITY\&. There may be no white\-space between +may be followed immediately with one of \-1,0,1,2 to specify VERBOSITY\&. There may be no white\-space between \fBv\fR and the VERBOSITY\&. .PP @@ -153,7 +154,7 @@ The \fIinterface\fR argument names an interface defined in the -\m[blue]\fBshorewall\-interfaces\fR\m[]\&\s-2\u[2]\d\s+2(5) file\&. A +\m[blue]\fBshorewall\-interfaces\fR\m[]\&\s-2\u[3]\d\s+2(5) file\&. A \fIhost\-list\fR is comma\-separated list whose elements are host or network addresses\&. .if n \{\ @@ -215,7 +216,7 @@ The \fIinterface\fR argument names an interface defined in the -\m[blue]\fBshorewall\-interfaces\fR\m[]\&\s-2\u[2]\d\s+2(5) file\&. A +\m[blue]\fBshorewall\-interfaces\fR\m[]\&\s-2\u[3]\d\s+2(5) file\&. A \fIhost\-list\fR is comma\-separated list whose elements are a host or network address\&. .RE @@ -267,7 +268,7 @@ and /var/lib/shorewall\-lite/save\&. If no \fIfilename\fR is given then the file specified by RESTOREFILE in -\m[blue]\fBshorewall\&.conf\fR\m[]\&\s-2\u[1]\d\s+2(5) is assumed\&. +\m[blue]\fBshorewall\&.conf\fR\m[]\&\s-2\u[2]\d\s+2(5) is assumed\&. .RE .PP \fBhelp\fR @@ -307,14 +308,14 @@ .RS 4 Causes traffic from the listed \fIaddress\fRes to be logged then discarded\&. Logging occurs at the log level specified by the BLACKLIST_LOGLEVEL setting in -\m[blue]\fBshorewall\&.conf\fR\m[]\&\s-2\u[1]\d\s+2 +\m[blue]\fBshorewall\&.conf\fR\m[]\&\s-2\u[2]\d\s+2 (5)\&. .RE .PP \fBlogwatch\fR .RS 4 Monitors the log file specified by the LOGFILE option in -\m[blue]\fBshorewall\&.conf\fR\m[]\&\s-2\u[1]\d\s+2(5) and produces an audible alarm when new Shorewall\-lite messages are logged\&. The +\m[blue]\fBshorewall\&.conf\fR\m[]\&\s-2\u[2]\d\s+2(5) and produces an audible alarm when new Shorewall\-lite messages are logged\&. The \fB\-m\fR option causes the MAC address of each packet source to be displayed if that information is available\&. The \fIrefresh\-interval\fR @@ -326,7 +327,7 @@ .RS 4 Causes traffic from the listed \fIaddress\fRes to be logged then rejected\&. Logging occurs at the log level specified by the BLACKLIST_LOGLEVEL setting in -\m[blue]\fBshorewall\&.conf\fR\m[]\&\s-2\u[1]\d\s+2 +\m[blue]\fBshorewall\&.conf\fR\m[]\&\s-2\u[2]\d\s+2 (5)\&. .RE .PP @@ -363,6 +364,10 @@ option causes the connection tracking table to be flushed; the \fBconntrack\fR utility must be installed to use this option\&. +.sp +The +\fB\-C\fR +option was added in Shorewall 4\&.6\&.5\&. If the specified (or implicit) firewall script is the one that generated the current running configuration, then the running netfilter configuration will be reloaded as is so as to preserve the iptables packet and byte counters\&. .RE .PP \fBrestore\fR @@ -375,7 +380,30 @@ \fBshorewall\-lite save\fR; if no \fIfilename\fR is given then Shorewall\-lite will be restored from the file specified by the RESTOREFILE option in -\m[blue]\fBshorewall\&.conf\fR\m[]\&\s-2\u[1]\d\s+2(5)\&. +\m[blue]\fBshorewall\&.conf\fR\m[]\&\s-2\u[2]\d\s+2(5)\&. +.if n \{\ +.sp +.\} +.RS 4 +.it 1 an-trap +.nr an-no-space-flag 1 +.nr an-break-flag 1 +.br +.ps +1 +\fBCaution\fR +.ps -1 +.br +If your iptables ruleset depends on variables that are detected at run\-time, either in your params file or by Shorewall\-generated code, +\fBrestore\fR +will use the values that were current when the ruleset was saved, which may be different from the current values\&. +.sp .5v +.RE +The +\fB\-C\fR +option was added in Shorewall 4\&.6\&.5\&. If the +\fB\-C\fR +option was specified during +\fBshorewall save\fR, then the counters saved by that operation will be restored\&. .RE .PP \fBrun\fR @@ -401,7 +429,11 @@ \fBshorewall\-lite restore\fR\&. If \fIfilename\fR is not given then the state is saved in the file specified by the RESTOREFILE option in -\m[blue]\fBshorewall\&.conf\fR\m[]\&\s-2\u[1]\d\s+2(5)\&. +\m[blue]\fBshorewall\&.conf\fR\m[]\&\s-2\u[2]\d\s+2(5)\&. +.sp +The +\fB\-C\fR +option, added in Shorewall 4\&.6\&.5, causes the iptables packet and byte counters to be saved along with the chains and rules\&. .RE .PP \fBshow\fR @@ -488,14 +520,14 @@ .PP \fBipa\fR .RS 4 -Added in Shorewall 4\&.4\&.17\&. Displays the per\-IP accounting counters (\m[blue]\fBshorewall\-accounting\fR\m[]\&\s-2\u[3]\d\s+2 +Added in Shorewall 4\&.4\&.17\&. Displays the per\-IP accounting counters (\m[blue]\fBshorewall\-accounting\fR\m[]\&\s-2\u[4]\d\s+2 (5))\&. .RE .PP \fBlog\fR .RS 4 Displays the last 20 Shorewall\-lite messages from the log file specified by the LOGFILE option in -\m[blue]\fBshorewall\&.conf\fR\m[]\&\s-2\u[1]\d\s+2(5)\&. The +\m[blue]\fBshorewall\&.conf\fR\m[]\&\s-2\u[2]\d\s+2(5)\&. The \fB\-m\fR option causes the MAC address of each packet source to be displayed if that information is available\&. .RE @@ -552,14 +584,33 @@ option causes the connection tracking table to be flushed; the \fBconntrack\fR utility must be installed to use this option\&. +.sp +The +\fB\-m\fR +option prevents the firewall script from modifying the current routing configuration\&. +.sp +The +\fB\-f\fR +option was added in Shorewall 4\&.6\&.5\&. If the RESTOREFILE named in +\m[blue]\fBshorewall\&.conf\fR\m[]\&\s-2\u[2]\d\s+2(5) exists, is executable and is not older than the current filewall script, then that saved configuration is restored\&. +.sp +The +\fB\-C\fR +option was added in Shorewall 4\&.6\&.5 and is only meaningful when the +\fB\-f\fR +option is also specified\&. If the previously\-saved configuration is restored, and if the +\fB\-C\fR +option was also specified in the +\fBsave\fR +command, then the packet and byte counters will be restored\&. .RE .PP \fBstop\fR .RS 4 Stops the firewall\&. All existing connections, except those listed in -\m[blue]\fBshorewall\-routestopped\fR\m[]\&\s-2\u[4]\d\s+2(5) or permitted by the ADMINISABSENTMINDED option in -\m[blue]\fBshorewall\&.conf\fR\m[]\&\s-2\u[1]\d\s+2(5), are taken down\&. The only new traffic permitted through the firewall is from systems listed in -\m[blue]\fBshorewall\-routestopped\fR\m[]\&\s-2\u[4]\d\s+2(5) or by ADMINISABSENTMINDED\&. +\m[blue]\fBshorewall\-routestopped\fR\m[]\&\s-2\u[5]\d\s+2(5) or permitted by the ADMINISABSENTMINDED option in +\m[blue]\fBshorewall\&.conf\fR\m[]\&\s-2\u[2]\d\s+2(5), are taken down\&. The only new traffic permitted through the firewall is from systems listed in +\m[blue]\fBshorewall\-routestopped\fR\m[]\&\s-2\u[5]\d\s+2(5) or by ADMINISABSENTMINDED\&. .sp If \fB\-f\fR @@ -608,21 +659,26 @@ shorewall\-accounting(5), shorewall\-actions(5), shorewall\-blacklist(5), shorewall\-hosts(5), shorewall_interfaces(5), shorewall\-ipsets(5), shorewall\-maclist(5), shorewall\-masq(5), shorewall\-nat(5), shorewall\-netmap(5), shorewall\-params(5), shorewall\-policy(5), shorewall\-providers(5), shorewall\-proxyarp(5), shorewall\-rtrules(5), shorewall\-routestopped(5), shorewall\-rules(5), shorewall\&.conf(5), shorewall\-secmarks(5), shorewall\-tcclasses(5), shorewall\-tcdevices(5), shorewall\-tcrules(5), shorewall\-tos(5), shorewall\-tunnels(5), shorewall\-zones(5) .SH "NOTES" .IP " 1." 4 +extension script +.RS 4 +\%http://www.shorewall.net../shorewall_extension_scripts.html +.RE +.IP " 2." 4 shorewall.conf .RS 4 \%http://www.shorewall.netshorewall.conf.html .RE -.IP " 2." 4 +.IP " 3." 4 shorewall-interfaces .RS 4 \%http://www.shorewall.netshorewall-interfaces.html .RE -.IP " 3." 4 +.IP " 4." 4 shorewall-accounting .RS 4 \%http://www.shorewall.netmanpages/shorewall-accounting.html .RE -.IP " 4." 4 +.IP " 5." 4 shorewall-routestopped .RS 4 \%http://www.shorewall.netshorewall-routestopped.html diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-lite-4.6.4.3/manpages/shorewall-lite.conf.5 new/shorewall-lite-4.6.5.2/manpages/shorewall-lite.conf.5 --- old/shorewall-lite-4.6.4.3/manpages/shorewall-lite.conf.5 2014-10-19 17:03:21.000000000 +0200 +++ new/shorewall-lite-4.6.5.2/manpages/shorewall-lite.conf.5 2014-11-17 16:20:33.000000000 +0100 @@ -2,12 +2,12 @@ .\" Title: shorewall-lite.conf .\" Author: [FIXME: author] [see http://docbook.sf.net/el/author] .\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/> -.\" Date: 10/19/2014 +.\" Date: 11/17/2014 .\" Manual: Configuration Files .\" Source: Configuration Files .\" Language: English .\" -.TH "SHOREWALL\-LITE\&.CO" "5" "10/19/2014" "Configuration Files" "Configuration Files" +.TH "SHOREWALL\-LITE\&.CO" "5" "11/17/2014" "Configuration Files" "Configuration Files" .\" ----------------------------------------------------------------- .\" * Define some portability stuff .\" ----------------------------------------------------------------- diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-lite-4.6.4.3/manpages/shorewall-lite.xml new/shorewall-lite-4.6.5.2/manpages/shorewall-lite.xml --- old/shorewall-lite-4.6.4.3/manpages/shorewall-lite.xml 2014-10-19 17:03:25.000000000 +0200 +++ new/shorewall-lite-4.6.5.2/manpages/shorewall-lite.xml 2014-11-17 16:20:36.000000000 +0100 @@ -299,7 +299,7 @@ <arg><option>-n</option></arg> - <arg><option>-p</option></arg> + <arg><option>-p</option><arg><option>-C</option></arg></arg> <arg><replaceable>directory</replaceable></arg> </cmdsynopsis> @@ -314,6 +314,8 @@ <arg choice="plain"><option>restore</option></arg> + <arg><option>-C</option></arg> + <arg><replaceable>filename</replaceable></arg> </cmdsynopsis> @@ -340,7 +342,8 @@ <arg>-<replaceable>options</replaceable></arg> - <arg choice="plain"><option>save</option></arg> + <arg + choice="plain"><option>save</option><arg><option>-C</option></arg></arg> <arg choice="opt"><replaceable>filename</replaceable></arg> </cmdsynopsis> @@ -474,6 +477,10 @@ <arg><option>-n</option></arg> <arg><option>-p</option></arg> + + <arg><option>-f</option></arg> + + <arg><option>-C</option></arg> </cmdsynopsis> <cmdsynopsis> @@ -526,8 +533,9 @@ <para>The nolock <option>option</option> prevents the command from attempting to acquire the Shorewall-lite lockfile. It is useful if you - need to include <command>shorewall</command> commands in - <filename>/etc/shorewall/started</filename>.</para> + need to include <command>shorewall</command> commands in the + <filename>started</filename> <ulink + url="../shorewall_extension_scripts.html">extension script</ulink>.</para> <para>The <emphasis>options</emphasis> control the amount of output that the command produces. They consist of a sequence of the letters <emphasis @@ -538,8 +546,8 @@ role="bold">v</emphasis> adds one to the effective verbosity and each <emphasis role="bold">q</emphasis> subtracts one from the effective VERBOSITY. Alternately, <emphasis role="bold">v</emphasis> may be followed - immediately with one of -1,0,1,2 to specify a specify VERBOSITY. There may - be no white-space between <emphasis role="bold">v</emphasis> and the + immediately with one of -1,0,1,2 to specify VERBOSITY. There may be no + white-space between <emphasis role="bold">v</emphasis> and the VERBOSITY.</para> <para>The <emphasis>options</emphasis> may also include the letter @@ -819,6 +827,12 @@ <para>The <option>-p</option> option causes the connection tracking table to be flushed; the <command>conntrack</command> utility must be installed to use this option.</para> + + <para>The <option>-C</option> option was added in Shorewall 4.6.5. + If the specified (or implicit) firewall script is the one that + generated the current running configuration, then the running + netfilter configuration will be reloaded as is so as to preserve the + iptables packet and byte counters.</para> </listitem> </varlistentry> @@ -834,6 +848,19 @@ <emphasis>filename</emphasis> is given then Shorewall-lite will be restored from the file specified by the RESTOREFILE option in <ulink url="shorewall.conf.html">shorewall.conf</ulink>(5).</para> + + <caution> + <para>If your iptables ruleset depends on variables that are + detected at run-time, either in your params file or by + Shorewall-generated code, <command>restore</command> will use the + values that were current when the ruleset was saved, which may be + different from the current values.</para> + </caution> + + <para>The <option>-C</option> option was added in Shorewall 4.6.5. + If the <option>-C</option> option was specified during <emphasis + role="bold">shorewall save</emphasis>, then the counters saved by + that operation will be restored.</para> </listitem> </varlistentry> @@ -865,6 +892,10 @@ <emphasis>filename</emphasis> is not given then the state is saved in the file specified by the RESTOREFILE option in <ulink url="shorewall.conf.html">shorewall.conf</ulink>(5).</para> + + <para>The <option>-C</option> option, added in Shorewall 4.6.5, + causes the iptables packet and byte counters to be saved along with + the chains and rules.</para> </listitem> </varlistentry> @@ -1102,6 +1133,22 @@ <para>The <option>-p</option> option causes the connection tracking table to be flushed; the <command>conntrack</command> utility must be installed to use this option.</para> + + <para>The <option>-m</option> option prevents the firewall script + from modifying the current routing configuration.</para> + + <para>The <option>-f</option> option was added in Shorewall 4.6.5. + If the RESTOREFILE named in <ulink + url="shorewall.conf.html">shorewall.conf</ulink>(5) exists, is + executable and is not older than the current filewall script, then + that saved configuration is restored.</para> + + <para>The <option>-C</option> option was added in Shorewall 4.6.5 + and is only meaningful when the <option>-f</option> option is also + specified. If the previously-saved configuration is restored, and if + the <option>-C</option> option was also specified in the <emphasis + role="bold">save</emphasis> command, then the packet and byte + counters will be restored.</para> </listitem> </varlistentry> diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-lite-4.6.4.3/modules.essential new/shorewall-lite-4.6.5.2/modules.essential --- old/shorewall-lite-4.6.4.3/modules.essential 2014-10-19 16:59:58.000000000 +0200 +++ new/shorewall-lite-4.6.5.2/modules.essential 2014-11-17 16:17:15.000000000 +0100 @@ -28,4 +28,3 @@ loadmodule iptable_raw loadmodule xt_state loadmodule xt_tcpudp -loadmodule ipt_LOG diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-lite-4.6.4.3/modules.extensions new/shorewall-lite-4.6.5.2/modules.extensions --- old/shorewall-lite-4.6.4.3/modules.extensions 2014-10-19 16:59:58.000000000 +0200 +++ new/shorewall-lite-4.6.5.2/modules.extensions 2014-11-17 16:17:15.000000000 +0100 @@ -32,7 +32,6 @@ loadmodule ipt_iprange loadmodule ipt_length loadmodule ipt_limit -loadmodule ipt_LOG loadmodule ipt_mac loadmodule ipt_mark loadmodule ipt_MARK @@ -58,4 +57,3 @@ loadmodule ipt_TOS loadmodule ipt_ttl loadmodule ipt_TTL -loadmodule ipt_ULOG diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-lite-4.6.4.3/modules.xtables new/shorewall-lite-4.6.5.2/modules.xtables --- old/shorewall-lite-4.6.4.3/modules.xtables 2014-10-19 16:59:58.000000000 +0200 +++ new/shorewall-lite-4.6.5.2/modules.xtables 2014-11-17 16:17:15.000000000 +0100 @@ -31,7 +31,6 @@ loadmodule xt_mark loadmodule xt_MARK loadmodule xt_multiport -loadmodule xt_NFLOG loadmodule xt_NFQUEUE loadmodule xt_owner loadmodule xt_physdev diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-lite-4.6.4.3/releasenotes.txt new/shorewall-lite-4.6.5.2/releasenotes.txt --- old/shorewall-lite-4.6.4.3/releasenotes.txt 2014-10-19 16:59:58.000000000 +0200 +++ new/shorewall-lite-4.6.5.2/releasenotes.txt 2014-11-17 16:17:15.000000000 +0100 @@ -1,7 +1,7 @@ ---------------------------------------------------------------------------- - S H O R E W A L L 4 . 6 . 4 . 3 + S H O R E W A L L 4 . 6 . 5 . 2 ------------------------------------ - O c t o b e r 2 0 , 2 0 1 4 + N o v e m b e r 1 8 , 2 0 1 4 ---------------------------------------------------------------------------- I. PROBLEMS CORRECTED IN THIS RELEASE @@ -14,82 +14,45 @@ I. P R O B L E M S C O R R E C T E D I N T H I S R E L E A S E ---------------------------------------------------------------------------- -4.6.4.3 +4.6.5.2 -1) The fix for LOGBACKEND in 4.6.4.2 worked on some older - distributions but not on newer ones. This release fixes the problem - in the remaining cases. +1) LOG_BACKEND=LOG failed at run-time for all but the most recent + kernels. -4.6.4.2 +4.6.5.1 -1) Setting LOGBACKEND=ipt_LOG could result in the following startup - failure at boot: +1) The generated script can now detect an gateway address assigned by + later versions of that program (Alan Barrett). - Starting shorewall ... - /var/lib/shorewall/firewall: line 2080: echo: write error: No such file or directory - WARNING: Unable to set log backend to ipt_LOG +2) In 4.6.5, the bash-based configure script would issue the following + diagnostic if SERVICEDIR was not specified in the shorewallrc + file: -4.6.4.1 - -1) Confusing 'usage' output was produced under the following - conditions: - - a) 4.6.4 installed - - b) The running firewall was compiled on an earlier release. - - c) A 'safe-start', 'save-restart', 'save' or 'try' command is - executed. - - This problem has been corrected. - -2) The 'optional' option has been removed from the IPv4 Universal - interfaces file, as that option caused startup failures. - -4.6.4 Final. + ./configure: line 199: [SERVICEDIR]=: command not found -1) This release includes defect repair through release 4.6.3.4. - -2) Two corrections have been made to the .service files: + This was compounded by the fact that all of the released + shorewallrc files still specified SYSTEMDDIR rather than SERVICEDIR + (Evangelos Foutras) - - The .service files now correctly specify - - WantedBy=basic.target +3) The shorewallrc.archlinux file now reflects a change in SBINDIR + that occurred in Arch Linux in mid 2013 (Evangelos Foutras). - - Conflicting services have been added. - -3) A warning message generated during stoppedrules processing - previously referred to the file as routestopped. - -4) Previously, the stoppedrules file did not work properly when - ADMINISABSENTMINDED=No. - - - A warning message was issued stating that the file would be - processed as if ADMINISABSENTMINDED=Yes, and it was. - - - Unfortunately, part of the surrounding rule-generating logic - proceded as if ADMINISABSENTMINDED=No, leading to an unusable - ruleset. - - This problem has been corrected by changing the way that - stoppedrules works with ADMINISABSENTMINDED=No. In the new - implementation: - - - All existing connections continue to work. - - Response packets and related connection requests to new accepted - connections are accepted (in other words, the resulting ruleset - is stateful). +4.6.5 - See shorewall[6].conf(5) for additional details. +1) This release includes defect repair through release 4.6.4.3. -5) The .spec files now set SBINDIR correctly. +2) On kernel 3.17, LOG_BACKEND=LOG previously failed with the + diagnostics: -6) The -lite installers now create INITDIR if it doesn't exist. + Setting up log backend + /var/lib/shorewall/.restart: line 2075: echo: write error: + No such file or directory + WARNING: Unable to set log backend to ipt_LOG -7) The installers no longer attempt to create a symbolic link to the - init script when no init script is installed. +3) A number of corrections have been made to the manpages (Thomas D). -8) A large number of defects in the uninstallers have been corrected. +4) Previously, if $OPTIONS was set in /etc/sysconfig/shorewall-init, + then servicd failed to start/stop Shorewall-init. ---------------------------------------------------------------------------- I I. K N O W N P R O B L E M S R E M A I N I N G @@ -102,39 +65,83 @@ I I I. N E W F E A T U R E S I N T H I S R E L E A S E ---------------------------------------------------------------------------- -1) Install support for Centos 7 and Foobar 7 has been added (Tuomo - Soini). - -2) A 'terminating' option has been added to shorewall[6].actions. - this option, when used with the 'builtin' option, indicates to the - compiler that the built-in action is terminating. This allows the - optimizer to omit rules after an unconditional jump to the - built-in. - -3) A LOG_BACKEND option has been added to allow specification of the - default logging backends. See shorewall.conf(5) and - shorewall6.conf(5) for details. - -4) The SAVE_IPSETS option may now specify a list of ipsets to be - saved. When such a list is specified, only those ipsets together - with the ipsets supporting dynamic zones are saved. - - Shorewall6 now supports the SAVE_IPSETS option. When - SAVE_IPSETS=Yes, only ipv6 ipsets are saved. For Shorewall, if - SAVE_IPSETS=ipv4, then only ipv4 ipsets are saved. Both features - require ipset version 5 or later. - - Note that shorewall.conf and shorewall6.conf may now both specify - SAVE_IPSETS. - -5) The SBINDIR setting for SuSE now defaults to /usr/sbin/. - -6) With the exception of Shorewall-core, the tarball installers and - uninstallers now support a -n option which inhibits any attempt to - change the startup configuration. The -n option can be - automatically invoked by setting the SANDBOX variable to a - non-empty value, either in the environment or in your shorewallrc - file. +1) The configure scripts and installers now support SERVICEDIR as an + alternative to SYSTEMD. For compatability, SERVICED is an alias + for SERVICEDIR. + +2) The installers now offer a choice of .service files, selected by + the SERVICEFILE option. The default remains $PRODUCT.service. Each + product supplying a .service file now supplies a .service.214. The + differences between the standard .service files and the service.214 + files are: + + a) They specify 'after=network-online.target' rather than + 'after=network.target'. + + b) The file shorewall-init.service.214 specifies + 'before=network-pre.target' rather than + 'before=network.target'. That file requires serviced 214 or + later, hence the names of the new files. + + Regardless of which file is selected, it is installed in + $SERVICEDIR/$PRODUCT.service. + +3) The RATE LIMIT column of the rules files now allows specification + of both a per-source and per-destination limit. See + shorewall[6]-rules(5) for details. + +4) Previously, /bin/sh was used unconditionally to process the helper + script 'getparams'. That shell script reads the params file and + passes back the (variable,value) pairs to the compiler. Beginning + with this release, $SHOREWALL_SHELL is used to process that script, + unless the compilation is for export, in which case /bin/sh is + still used. + + Note that the default value of $SHOREWALL_SHELL is /bin/sh, so + unless your configuration sets that variable, this enhancement will + have no effect. Similarly, on an administrative system, this + enhancement has no effect on the processing of the 'compile -e', + 'load', 'reload' and 'export' commands. + +5) A -C option has been added to several commands to allow the + ip[6]tables packet and byte counters to be preserved. + + - save command + + Causes the packet and byte counters to be saved along with the + chains and rules. + + - restore command + + Causes the packet and byte counters (if saved) to be restored + along with the chains and rules. + + - start command + + With Shorewall and Shorewall6, the -C option only has an effect + if the -f option is also specified. If a previously-saved + configuration is restored, then the packet and byte counters (if + saved) will be restored along with the chains and rules. + + - restart command + + If an existing compiled script is used (no recompilation + required) and if that script generated the current running + configuration, then the current netfilter configuration is + reloaded as is so as to preserve the current packet and byte + counters. + + If you wish to (approximately) preserve the counters over a + possibly unexpected reboot, then: + + - Create a cron job that periodically does 'shorewall save -C' + + - Specify the -C and -f option in the STARTOPTIONS variable in + either /etc/default/shorewall[6][-lite] or + /etc/sysconfig/shorewall[6][-lite], whichever is supported by your + distribution. Note that some distributions do not distribute these + files so you may have to create the one(s) you need (such as + /etc/sysconfig/shorewall). ---------------------------------------------------------------------------- I V. M I G R A T I O N I S S U E S @@ -429,6 +436,110 @@ ---------------------------------------------------------------------------- V. N O T E S F R O M O T H E R 4 . 6 R E L E A S E S ---------------------------------------------------------------------------- + P R O B L E M S C O R R E C T E D I N 4 . 6 . 4 +---------------------------------------------------------------------------- + +4.6.4.1 + +1) Confusing 'usage' output was produced under the following + conditions: + + a) 4.6.4 installed + + b) The running firewall was compiled on an earlier release. + + c) A 'safe-start', 'save-restart', 'save' or 'try' command is + executed. + + This problem has been corrected. + +2) The 'optional' option has been removed from the IPv4 Universal + interfaces file, as that option caused startup failures. + +4.6.4 Final. + +1) This release includes defect repair through release 4.6.3.4. + +2) Two corrections have been made to the .service files: + + - The .service files now correctly specify + + WantedBy=basic.target + + - Conflicting services have been added. + +3) A warning message generated during stoppedrules processing + previously referred to the file as routestopped. + +4) Previously, the stoppedrules file did not work properly when + ADMINISABSENTMINDED=No. + + - A warning message was issued stating that the file would be + processed as if ADMINISABSENTMINDED=Yes, and it was. + + - Unfortunately, part of the surrounding rule-generating logic + proceded as if ADMINISABSENTMINDED=No, leading to an unusable + ruleset. + + This problem has been corrected by changing the way that + stoppedrules works with ADMINISABSENTMINDED=No. In the new + implementation: + + - All existing connections continue to work. + - Response packets and related connection requests to new accepted + connections are accepted (in other words, the resulting ruleset + is stateful). + + See shorewall[6].conf(5) for additional details. + +5) The .spec files now set SBINDIR correctly. + +6) The -lite installers now create INITDIR if it doesn't exist. + +7) The installers no longer attempt to create a symbolic link to the + init script when no init script is installed. + +8) A large number of defects in the uninstallers have been corrected. + +---------------------------------------------------------------------------- + N E W F E A T U R E S I N 4 . 6 . 4 +---------------------------------------------------------------------------- + +1) Install support for Centos 7 and Foobar 7 has been added (Tuomo + Soini). + +2) A 'terminating' option has been added to shorewall[6].actions. + this option, when used with the 'builtin' option, indicates to the + compiler that the built-in action is terminating. This allows the + optimizer to omit rules after an unconditional jump to the + built-in. + +3) A LOG_BACKEND option has been added to allow specification of the + default logging backends. See shorewall.conf(5) and + shorewall6.conf(5) for details. + +4) The SAVE_IPSETS option may now specify a list of ipsets to be + saved. When such a list is specified, only those ipsets together + with the ipsets supporting dynamic zones are saved. + + Shorewall6 now supports the SAVE_IPSETS option. When + SAVE_IPSETS=Yes, only ipv6 ipsets are saved. For Shorewall, if + SAVE_IPSETS=ipv4, then only ipv4 ipsets are saved. Both features + require ipset version 5 or later. + + Note that shorewall.conf and shorewall6.conf may now both specify + SAVE_IPSETS. + +5) The SBINDIR setting for SuSE now defaults to /usr/sbin/. + +6) With the exception of Shorewall-core, the tarball installers and + uninstallers now support a -n option which inhibits any attempt to + change the startup configuration. The -n option can be + automatically invoked by setting the SANDBOX variable to a + non-empty value, either in the environment or in your shorewallrc + file. + +---------------------------------------------------------------------------- P R O B L E M S C O R R E C T E D I N 4 . 6 . 3 ---------------------------------------------------------------------------- diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-lite-4.6.4.3/shorewall-lite.service new/shorewall-lite-4.6.5.2/shorewall-lite.service --- old/shorewall-lite-4.6.4.3/shorewall-lite.service 2014-10-19 16:44:01.000000000 +0200 +++ new/shorewall-lite-4.6.5.2/shorewall-lite.service 2014-11-15 17:56:42.000000000 +0100 @@ -13,7 +13,7 @@ RemainAfterExit=yes EnvironmentFile=-/etc/sysconfig/shorewall-lite StandardOutput=syslog -ExecStart=/sbin/shorewall-lite $OPTIONS start +ExecStart=/sbin/shorewall-lite $OPTIONS start $STARTOPTIONS ExecStop=/sbin/shorewall-lite $OPTIONS stop [Install] diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-lite-4.6.4.3/shorewall-lite.service.214 new/shorewall-lite-4.6.5.2/shorewall-lite.service.214 --- old/shorewall-lite-4.6.4.3/shorewall-lite.service.214 1970-01-01 01:00:00.000000000 +0100 +++ new/shorewall-lite-4.6.5.2/shorewall-lite.service.214 2014-11-15 17:56:42.000000000 +0100 @@ -0,0 +1,20 @@ +# +# The Shoreline Firewall (Shorewall) Packet Filtering Firewall +# +# Copyright 2011 Jonathan Underwood <jonathan.underwood@gmail.com> +# +[Unit] +Description=Shorewall IPv4 firewall (lite) +After=network-online.target +Conflicts=iptables.service firewalld.service + +[Service] +Type=oneshot +RemainAfterExit=yes +EnvironmentFile=-/etc/sysconfig/shorewall-lite +StandardOutput=syslog +ExecStart=/sbin/shorewall-lite $OPTIONS start $STARTOPTIONS +ExecStop=/sbin/shorewall-lite $OPTIONS stop + +[Install] +WantedBy=basic.target diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-lite-4.6.4.3/shorewall-lite.spec new/shorewall-lite-4.6.5.2/shorewall-lite.spec --- old/shorewall-lite-4.6.4.3/shorewall-lite.spec 2014-10-19 16:59:58.000000000 +0200 +++ new/shorewall-lite-4.6.5.2/shorewall-lite.spec 2014-11-17 16:17:15.000000000 +0100 @@ -1,6 +1,6 @@ %define name shorewall-lite -%define version 4.6.4 -%define release 3 +%define version 4.6.5 +%define release 2 %define initdir /etc/init.d Summary: Shoreline Firewall Lite is an iptables-based firewall for Linux systems. @@ -106,12 +106,20 @@ %doc COPYING changelog.txt releasenotes.txt %changelog -* Sun Oct 19 2014 Tom Eastep tom@shorewall.net -- Updated to 4.6.4-3 -* Wed Oct 15 2014 Tom Eastep tom@shorewall.net -- Updated to 4.6.4-2 -* Fri Oct 10 2014 Tom Eastep tom@shorewall.net -- Updated to 4.6.4-1 +* Sat Nov 15 2014 Tom Eastep tom@shorewall.net +- Updated to 4.6.5-2 +* Fri Nov 14 2014 Tom Eastep tom@shorewall.net +- Updated to 4.6.5-1 +* Thu Nov 06 2014 Tom Eastep tom@shorewall.net +- Updated to 4.6.5-0base +* Sat Nov 01 2014 Tom Eastep tom@shorewall.net +- Updated to 4.6.5-0RC1 +* Thu Oct 30 2014 Tom Eastep tom@shorewall.net +- Updated to 4.6.5-0Beta3 +* Mon Oct 20 2014 Tom Eastep tom@shorewall.net +- Updated to 4.6.5-0Beta2 +* Wed Oct 08 2014 Tom Eastep tom@shorewall.net +- Updated to 4.6.5-0Beta1 * Mon Oct 06 2014 Tom Eastep tom@shorewall.net - Updated to 4.6.4-0base * Thu Oct 02 2014 Tom Eastep tom@shorewall.net diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-lite-4.6.4.3/shorewallrc.apple new/shorewall-lite-4.6.5.2/shorewallrc.apple --- old/shorewall-lite-4.6.4.3/shorewallrc.apple 2014-10-19 16:59:59.000000000 +0200 +++ new/shorewall-lite-4.6.5.2/shorewallrc.apple 2014-11-17 16:17:15.000000000 +0100 @@ -14,7 +14,7 @@ INITFILE= #Unused on OS X INITSOURCE= #Unused on OS X ANNOTATED= #Unused on OS X -SYSTEMD= #Unused on OS X +SERVICEDIR= #Unused on OS X SERVICEFILE= #Unused on OS X SYSCONFDIR= #Unused on OS X SPARSE=Yes #Only install $PRODUCT/$PRODUCT.conf in $CONFDIR. diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-lite-4.6.4.3/shorewallrc.archlinux new/shorewall-lite-4.6.5.2/shorewallrc.archlinux --- old/shorewall-lite-4.6.4.3/shorewallrc.archlinux 2014-10-19 16:59:59.000000000 +0200 +++ new/shorewall-lite-4.6.5.2/shorewallrc.archlinux 2014-11-17 16:17:15.000000000 +0100 @@ -8,14 +8,14 @@ LIBEXECDIR=${PREFIX}/share #Directory for executable scripts. PERLLIBDIR=${PREFIX}/share/shorewall #Directory to install Shorewall Perl module directory CONFDIR=/etc #Directory where subsystem configurations are installed -SBINDIR=/usr/sbin #Directory where system administration programs are installed +SBINDIR=/usr/bin #Directory where system administration programs are installed MANDIR=${SHAREDIR}/man #Directory where manpages are installed. INITDIR= #Directory where SysV init scripts are installed. INITFILE= #Name of the product's installed SysV init script INITSOURCE= #Name of the distributed file to be installed as the SysV init script ANNOTATED= #If non-zero, annotated configuration files are installed SYSCONFDIR= #Directory where SysV init parameter files are installed -SYSTEMD=/usr/lib/systemd/system #Directory where .service files are installed (systems running systemd only) +SERVICEDIR=/usr/lib/systemd/system #Directory where .service files are installed (systems running systemd only) SERVICEFILE= #Name of the file to install in $SYSTEMD. Default is $PRODUCT.service SPARSE= #If non-empty, only install $PRODUCT/$PRODUCT.conf in $CONFDIR VARLIB=/var/lib #Directory where product variable data is stored. diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-lite-4.6.4.3/shorewallrc.cygwin new/shorewall-lite-4.6.5.2/shorewallrc.cygwin --- old/shorewall-lite-4.6.4.3/shorewallrc.cygwin 2014-10-19 16:59:59.000000000 +0200 +++ new/shorewall-lite-4.6.5.2/shorewallrc.cygwin 2014-11-17 16:17:15.000000000 +0100 @@ -14,7 +14,7 @@ INITFILE= #Unused on Cygwin INITSOURCE= #Unused on Cygwin ANNOTATED= #Unused on Cygwin -SYSTEMD= #Unused on Cygwin +SERVICEDIR= #Unused on Cygwin SERVICEFILE= #Unused on Cygwin SYSCONFDIR= #Unused on Cygwin SPARSE=Yes #Only install $PRODUCT/$PRODUCT.conf in $CONFDIR. diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-lite-4.6.4.3/shorewallrc.debian new/shorewall-lite-4.6.5.2/shorewallrc.debian --- old/shorewall-lite-4.6.4.3/shorewallrc.debian 2014-10-19 16:59:59.000000000 +0200 +++ new/shorewall-lite-4.6.5.2/shorewallrc.debian 2014-11-17 16:17:15.000000000 +0100 @@ -17,7 +17,7 @@ SYSCONFFILE=default.debian #Name of the distributed file to be installed in $SYSCONFDIR SERVICEFILE= #Name of the file to install in $SYSTEMD. Default is $PRODUCT.service SYSCONFDIR=/etc/default #Directory where SysV init parameter files are installed -SYSTEMD= #Directory where .service files are installed (systems running systemd only) +SERVICEDIR= #Directory where .service files are installed (systems running systemd only) SPARSE=Yes #If non-empty, only install $PRODUCT/$PRODUCT.conf in $CONFDIR VARLIB=/var/lib #Directory where product variable data is stored. VARDIR=${VARLIB}/$PRODUCT #Directory where product variable data is stored. diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-lite-4.6.4.3/shorewallrc.default new/shorewall-lite-4.6.5.2/shorewallrc.default --- old/shorewall-lite-4.6.4.3/shorewallrc.default 2014-10-19 16:59:59.000000000 +0200 +++ new/shorewall-lite-4.6.5.2/shorewallrc.default 2014-11-17 16:17:15.000000000 +0100 @@ -14,7 +14,7 @@ INITFILE=$PRODUCT #Name of the product's installed SysV init script INITSOURCE=init.sh #Name of the distributed file to be installed as the SysV init script ANNOTATED= #If non-zero, annotated configuration files are installed -SYSTEMD= #Directory where .service files are installed (systems running systemd only) +SERVICEDIR= #Directory where .service files are installed (systems running systemd only) SERVICEFILE= #Name of the file to install in $SYSTEMD. Default is $PRODUCT.service SYSCONFFILE= #Name of the distributed file to be installed in $SYSCONFDIR SYSCONFDIR= #Directory where SysV init parameter files are installed diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-lite-4.6.4.3/shorewallrc.redhat new/shorewall-lite-4.6.5.2/shorewallrc.redhat --- old/shorewall-lite-4.6.4.3/shorewallrc.redhat 2014-10-19 16:59:59.000000000 +0200 +++ new/shorewall-lite-4.6.5.2/shorewallrc.redhat 2014-11-17 16:17:15.000000000 +0100 @@ -14,7 +14,7 @@ INITFILE=$PRODUCT #Name of the product's installed SysV init script INITSOURCE=init.fedora.sh #Name of the distributed file to be installed as the SysV init script ANNOTATED= #If non-zero, annotated configuration files are installed -SYSTEMD=/lib/systemd/system #Directory where .service files are installed (systems running systemd only) +SERVICEDIR=/lib/systemd/system #Directory where .service files are installed (systems running systemd only) SYSCONFFILE=sysconfig #Name of the distributed file to be installed as $SYSCONFDIR/$PRODUCT SERVICEFILE= #Name of the file to install in $SYSTEMD. Default is $PRODUCT.service SYSCONFDIR=/etc/sysconfig/ #Directory where SysV init parameter files are installed diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-lite-4.6.4.3/shorewallrc.slackware new/shorewall-lite-4.6.5.2/shorewallrc.slackware --- old/shorewall-lite-4.6.4.3/shorewallrc.slackware 2014-10-19 16:59:59.000000000 +0200 +++ new/shorewall-lite-4.6.5.2/shorewallrc.slackware 2014-11-17 16:17:15.000000000 +0100 @@ -15,7 +15,7 @@ AUXINITFILE=rc.firewall #Name of the product's installed SysV init script INITSOURCE=init.slackware.$PRODUCT.sh #Name of the distributed file to be installed as a second SysV init script INITFILE=rc.$PRODUCT #Name of the product's installed second init script -SYSTEMD= #Name of the directory where .service files are installed (systems running systemd only) +SERVICEDIR= #Name of the directory where .service files are installed (systems running systemd only) SERVICEFILE= #Name of the file to install in $SYSTEMD. Default is $PRODUCT.service SYSCONFFILE= #Name of the distributed file to be installed in $SYSCONFDIR SYSCONFDIR= #Name of the directory where SysV init parameter files are installed. diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-lite-4.6.4.3/shorewallrc.suse new/shorewall-lite-4.6.5.2/shorewallrc.suse --- old/shorewall-lite-4.6.4.3/shorewallrc.suse 2014-10-19 16:59:59.000000000 +0200 +++ new/shorewall-lite-4.6.5.2/shorewallrc.suse 2014-11-17 16:17:15.000000000 +0100 @@ -14,7 +14,7 @@ INITFILE=$PRODUCT #Name of the product's SysV init script INITSOURCE=init.suse.sh #Name of the distributed file to be installed as the SysV init script ANNOTATED= #If non-zero, annotated configuration files are installed -SYSTEMD= #Directory where .service files are installed (systems running systemd only) +SERVICEDIR= #Directory where .service files are installed (systems running systemd only) SERVICEFILE= #Name of the file to install in $SYSTEMD. Default is $PRODUCT.service SYSCONFFILE=sysconfig #Name of the distributed file to be installed in $SYSCONFDIR SYSCONFDIR=/etc/sysconfig/ #Directory where SysV init parameter files are installed diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/shorewall-lite-4.6.4.3/uninstall.sh new/shorewall-lite-4.6.5.2/uninstall.sh --- old/shorewall-lite-4.6.4.3/uninstall.sh 2014-10-19 16:59:58.000000000 +0200 +++ new/shorewall-lite-4.6.5.2/uninstall.sh 2014-11-17 16:17:15.000000000 +0100 @@ -26,7 +26,7 @@ # You may only use this script to uninstall the version # shown below. Simply run this script to remove Shorewall Firewall -VERSION=4.6.4.3 +VERSION=4.6.5.2 PRODUCT=shorewall-lite usage() # $1 = exit status ++++++ shorewall-4.6.4.3.tar.bz2 -> shorewall6-4.6.5.2.tar.bz2 ++++++ ++++ 127074 lines of diff (skipped) ++++++ shorewall-lite-4.6.4.3.tar.bz2 -> shorewall6-lite-4.6.5.2.tar.bz2 ++++++ ++++ 8349 lines of diff (skipped) -- To unsubscribe, e-mail: opensuse-commit+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-commit+help@opensuse.org
participants (1)
-
root@hilbert.suse.de