Jo-Philipp Wich
|
5609ad736e
|
firewall: don't filter IPv4 ICMP types (#10928)
SVN-Revision: 30363
|
13 years ago |
Jo-Philipp Wich
|
c7ac1b5b0c
|
firewall: do not produce 0.0.0.0/0 if a symbolic masq_src or masq_dest is given but does not resolve to an ip
SVN-Revision: 28628
|
13 years ago |
Jo-Philipp Wich
|
204bf6e5fe
|
firewall: prevent ip6tables -t nat rules (#10265)
SVN-Revision: 28535
|
13 years ago |
Jo-Philipp Wich
|
9a61d9e513
|
firewall: fix possible expansion of "*" when rules with "option src *" are processed
SVN-Revision: 28527
|
13 years ago |
Jo-Philipp Wich
|
e0e73928da
|
firewall: do not check for module availability, let iptables fail if a feature is not present (#7610)
SVN-Revision: 28525
|
13 years ago |
Jo-Philipp Wich
|
dd4934a943
|
firewall: - solve scoping issues when multiple values are used, thanks Daniel Dickinson - ignore src_port/dest_port for proto icmp rules, ignore icmp_type for non-icmp rules - properly handle icmp when proto is given in numerical form (1, 58) - support negated icmp types
SVN-Revision: 27500
|
14 years ago |
Jo-Philipp Wich
|
68a1c8e1e3
|
firewall: - allow multiple ports, protocols, macs, icmp types per rule - implement "limit" and "limit_burst" options for rules - implement "extra" option to rules and redirects for passing arbritary flags to iptables - implement negations for "src_port", "dest_port", "src_dport", "src_mac", "proto" and "icmp_type" options - allow wildcard (*) "src" and "dest" options in rules to allow specifying "any" source or destination - validate symbolic icmp-type names against the selected iptables binary - properly handle forwarded ICMPv6 traffic in the default configuration
SVN-Revision: 27317
|
14 years ago |
Jo-Philipp Wich
|
9f37422f2f
|
firewall: ensure that fw_get_subnet4() sets an empty value if no (valid) IPv4 addr was found
SVN-Revision: 27198
|
14 years ago |
Jo-Philipp Wich
|
c014101d73
|
firewall: allow symbolic names of interfaces and aliases in masq_src and masq_dest
SVN-Revision: 27196
|
14 years ago |
Jo-Philipp Wich
|
6a335579b8
|
fireall: - support negations for src_ip, dest_ip, src_dip options in rules and redirects - add NOTRACK target to rule sections, allows to define fine grained notrack rules
SVN-Revision: 23141
|
14 years ago |
Jo-Philipp Wich
|
f3dd8278bb
|
firewall: - simplify masquerade rule setup - remove various subshell invocations - speedup fw() by not relying on xargs and pipes - rework SNAT support - attach to dest zone, use src_dip/src_dport as snat source
SVN-Revision: 23024
|
14 years ago |
Jo-Philipp Wich
|
5ab58aa39c
|
firewall: - fix possible endless loop when the family option is used for forwardings - only generate forwarding rules in SNAT redirect sections if src_dip is specified
SVN-Revision: 22938
|
14 years ago |
Jo-Philipp Wich
|
ee4dd61b10
|
firewall: - fix processing of rules with an ip family option - append interface rules at the end of internal zone chains, simplifies injecting user or addon rules - support simple file logging (option log + option log_limit per zone)
SVN-Revision: 22847
|
14 years ago |
Jo-Philipp Wich
|
a756114e59
|
firewall: change the order of IPv4/IPv6 address detection, fixes mixed notation v6 improperly detected as v4 address
SVN-Revision: 21642
|
15 years ago |
Jo-Philipp Wich
|
40ad9defcc
|
firewall: - fix ip6tables rules when icmp_type option is set - add "family" option to zones, forwardings, redirects and rules to selectively apply rules to iptables and/or ip6tables
SVN-Revision: 21508
|
15 years ago |
Jo-Philipp Wich
|
3ffd27f905
|
firewall: implement disable_ipv6 uci option
SVN-Revision: 21503
|
15 years ago |
Jo-Philipp Wich
|
e796062a4b
|
firewall: properly unset position for delete command, fixes rule removal in ifdown
SVN-Revision: 21378
|
15 years ago |
Jo-Philipp Wich
|
c284cb51c0
|
firewall: - replace uci firewall with a modular dual stack implementation developed by Malte S. Stretz - bump version to 2
SVN-Revision: 21286
|
15 years ago |