A firewall service daemon with D-BUS interface managing a dynamic firewall

Edit Package firewalld

firewalld provides a dynamically managed firewall with support for network/firewall zones to define the trust level of network connections or interfaces. It has support for IPv4, IPv6 firewall settings and for ethernet bridges and has a separation of runtime and permanent configuration options. It also supports an interface for services or applications to add firewall rules directly.

Refresh
Refresh
Source Files
Filename Size Changed
0001-firewall-backend-Switch-default-backend-to-iptables.patch 0000002190 2.14 KB
_service 0000000655 655 Bytes
_servicedata 0000000236 236 Bytes
firewalld-0.7.5.obscpio 0007351309 7.01 MB
firewalld.changes 0000044539 43.5 KB
firewalld.obsinfo 0000000099 99 Bytes
firewalld.spec 0000010343 10.1 KB
Revision 48 (latest revision is 88)
Dominique Leuenberger's avatar Dominique Leuenberger (dimstar_suse) accepted request 826047 from Michał Rostecki's avatar Michał Rostecki (mrostecki) (revision 48)
- Update to version 0.7.5:
  * release: v0.7.5
  * chore(translation): merge from master
  * fix(cli): add ipset type hash:mac is incompatible with the family parameter Fixes: rhbz1541077
  * test(rhbz1483921): better test name
  * fix(cli): add --zone is an invalid option with --direct
  * fix: core: rich: Catch ValueError on non-numeric priority values
  * fix: update dynamic DCE RPC ports in freeipa-trust service
  * docs: replace occurrences of the term blacklist with denylist
  * docs(README): add libxslt for doc generation
  * test(rich): source mac with nftables backend
  * fix(firewall-offline-cmd): remove instances of "[P]" in help text
  * test(check-container): add support for centos8 stream
  * test(functions): use IndividualCalls if host doesn't support nft rule index
  * test(functions): add macro IF_HOST_SUPPORTS_NFT_RULE_INDEX
  * test(dbus): better way to check IPv6_rpfilter expected value
  * fix(ipset): flush the set if IndividiualCalls=yes
  * test(ipv6): skip square bracket address tests if ipv6 not available
  * test(gh509): only run test for nftables backend
  * fix(dbus): service: don't cleanup config for old set APIs
  * fix(config): bool values in dict based import/export
  * fix(doc): dbus: signatures for zone tuple based APIs
  * test(dbus): zone: fix zone runtime functional test title
  * test(dbus): zone: fix false failure due to list order
  * fix(client): addService needs to reduce tuple size
  * test(direct): rule in a zone chain
  * fix(direct): rule in a zone chain
  * test(dbus): zone: verify runtime config APIs
  * test(dbus): zone: verify permanent config APIs
  * fix(systemd): Conflict with nftables.service (forwarded request 826046 from mrostecki)
Comments 0
openSUSE Build Service is sponsored by