21 Commits (3491d8c01799eedc6bb00405d306b206242abe40)

Author SHA1 Message Date
Mirko Vogt 075618c6e3 minor change: adjust formatting of firewall.config 13 years ago
Jo-Philipp Wich 9aaca7f1b1 firewall: allow ICMPv6 type 129 (echo reply) - this fixes basic ICMPv6 in case no connection tracking is used 13 years ago
Jo-Philipp Wich 77dda8d67a firewall: - introduce per-section "option enabled" which defaults to "1" - useful to disable rules or zones without having to delete them - annotate default traffic rules with names - bump version 13 years ago
Jo-Philipp Wich 10f199d832 firewall: add DHCPv6 default rule (#10381) 13 years ago
Jo-Philipp Wich f1e7045d30 firewall: further tune ICMPv6 default rules according to RFC4890 (#9893) 13 years ago
Jo-Philipp Wich 07abf4a81e firewall: refine default ICMPv6 rules to better conform with RFC4890, do not forward link local ICMP message types, allow parameter problem 14 years ago
Jo-Philipp Wich 68a1c8e1e3 firewall: - allow multiple ports, protocols, macs, icmp types per rule - implement "limit" and "limit_burst" options for rules - implement "extra" option to rules and redirects for passing arbritary flags to iptables - implement negations for "src_port", "dest_port", "src_dport", "src_mac", "proto" and "icmp_type" options - allow wildcard (*) "src" and "dest" options in rules to allow specifying "any" source or destination - validate symbolic icmp-type names against the selected iptables binary - properly handle forwarded ICMPv6 traffic in the default configuration 14 years ago
Jo-Philipp Wich f2b7c81d46 firewall: explictely mention network in default configuration, makes it less confusing 14 years ago
Jo-Philipp Wich ad23dd94b6 firewall: provide examples of ssh port relocation on firewall and IPsec passthrough Two examples of potentially useful configurations (commented out, of course): 14 years ago
Jo-Philipp Wich cc84e0672b firewall: don't apply default udp/68 rule to ip6tables 15 years ago
Jo-Philipp Wich 3875f85110 firewall: add commented disable_ipv6 option to default config 15 years ago
Travis Kemen 431808b5bf allow ping 15 years ago
Nicolas Thill b3d3e5d752 firewall: fix MSS issue affection RELATED new connections (closes: #5173) 15 years ago
Jo-Philipp Wich b44b066543 firewall: allow incoming udp/68 packets in the default configuration (#4108, #4781) 15 years ago
Jo-Philipp Wich 97100e0248 firewall: enable /etc/firewall.user by default and install sample firewall.user file 16 years ago
Felix Fietkau 50be634a3c re-enable the mss fix by default for now - see discussion at http://lists.openwrt.org/pipermail/openwrt-devel/2009-January/003724.html for more information 16 years ago
Felix Fietkau 359ce7f97e disable the MSS fixup hack by default (most ISPs don't require this as a workaround for MTU problems, only some do). this should give a nice speedup for routing on standard-compliant ISPs 16 years ago
Felix Fietkau aaf31c36f1 set default input policy to ACCEPT to bring the firewall behavior closer to the one of previous versions 16 years ago
Nicolas Thill d7810ed63e firewall changes: - implement a REJECT policy and enable it by default, reject packets with approriate response (closes: #3970) - cleanup syn_flood and remove logging 16 years ago
John Crispin aa6c019c11 use proto instead of protocol in uci firewall 16 years ago
John Crispin 5627667654 uci firewall - make uci firewall default and remove old code - fix up dependencies 16 years ago
John Crispin 21bbdc24c3 adds a new uci firewall - iptbales and netfilter packages need to be rewrapped when we switch to this firewall as default - there are some examples in the file /etc/config/firewall - iptables-save/restore are still missing - hotplug takes care of adding/removing netdevs during runtime - misisng features ? wishes ? let me know ... 17 years ago