Shoreline Firewall is an iptables-based firewall for Linux systems
The Shoreline Firewall, more commonly known as "Shorewall", is a Netfilter
(iptables) based firewall that can be used on a dedicated firewall system,
a multi-function gateway/ router/server or on a standalone GNU/Linux system.
- Developed at security:netfilter
-
3
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Factory/shorewall && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
0001-fillup-install.patch | 0000001102 1.08 KB | |
0001-remote_fs.patch | 0000000548 548 Bytes | |
0001-required-stop-fix.patch | 0000000617 617 Bytes | |
README.openSUSE | 0000000879 879 Bytes | |
shorewall-4.4.22.rpmlintrc | 0000000682 682 Bytes | |
shorewall-4.6.13.tar.bz2 | 0000500076 488 KB | |
shorewall-core-4.6.13.tar.bz2 | 0000061679 60.2 KB | |
shorewall-docs-html-4.6.13.tar.bz2 | 0004280790 4.08 MB | |
shorewall-init-4.6.13.tar.bz2 | 0000040574 39.6 KB | |
shorewall-lite-4.6.13.tar.bz2 | 0000056490 55.2 KB | |
shorewall.changes | 0000112762 110 KB | |
shorewall.spec | 0000025562 25 KB | |
shorewall6-4.6.13.tar.bz2 | 0000235132 230 KB | |
shorewall6-lite-4.6.13.tar.bz2 | 0000055646 54.3 KB |
Revision 90 (latest revision is 125)
Dominique Leuenberger (dimstar_suse)
accepted
request 331030
from
Togan Muftuoglu (toganm)
(revision 90)
- Update to version 4.6.13 For more details see changelog.txt and realeasenotes.txt * The 'rules' file manpages have been corrected regarding the packets that are processed by rules in the NEW section. * Parsing of IPv6 address ranges has been corrected. Previously, use of ranges resulted in 'Invalid IPv6 Address' errors. * The shorewall6-hosts man page has been corrected to show the proper contents of the HOST(S) column. * Previously, INLINE statements in the mangle file were not recognized if a chain designator (:F, :P, etc.) followingowed INLINE(...). As a consequence, additional matches following a semicolon were interpreted as column/value pairs unless INLINE_MATCHES=Yes, resulting in compilation failure. * Inline matches on IP[6]TABLE rules could be ignored if INLINE_MATCHES=No. They are now recognized. * Specifying an action with a logging level in one of the _DEFAULT options in shorewall[6].conf (e.g., REJECT_DEFAULT=Reject:info) produced a compilation error: ERROR: Invalid value (:info) for first Reject parameter /usr/share/shorewall/action.Rejectect (line 52) That has been corrected. Note, however, that specifying logging with a default action tends to defeat one of the main purposes of default actions which is to suppress logging. * Previously, it was necessary to set TC_EXPERT=Yes to have full access to the user mark in fw marks. That has been corrected so that any place that a mark or mask can be specified, both the TC mark and the User mark are accessible. (forwarded request 331029 from toganm)
Comments 0