54 Commits (69853cc4e861a6b589577535b1bf4a72fc267ca9)

Author SHA1 Message Date
Jo-Philipp Wich 204bf6e5fe firewall: prevent ip6tables -t nat rules (#10265) 13 years ago
Jo-Philipp Wich 69df551be3 firewall: fix another instance of unquoted "*" 13 years ago
Jo-Philipp Wich 9a61d9e513 firewall: fix possible expansion of "*" when rules with "option src *" are processed 13 years ago
Jo-Philipp Wich e0e73928da firewall: do not check for module availability, let iptables fail if a feature is not present (#7610) 13 years ago
Jo-Philipp Wich 995face56d firewall: make ESTABLISHED,RELATED rules match before INVALID, use conntrack instead of state match (#10038) 13 years ago
Jo-Philipp Wich 7a206885df firewall: prevent redundant rules if multiple ports and multiple icmp types are given in a rule block for both icmp and other protocols 14 years ago
Jo-Philipp Wich 90ac92e8be firewall: fix serious bug in state var handling (#9746) 14 years ago
Jo-Philipp Wich 78fa88ca81 firewall: rework state variable handling, use uci_toggle_state() where applicable and properly handle duplicates in add and del state helpers (#9152, #9710) 14 years ago
Jo-Philipp Wich a92ed1808c firewall: make sure that -m mac is used with --mac-source, follow up to r27508 14 years ago
Daniel Dickinson ca7383e701 firewall: also correct another variable missed in previous commit 14 years ago
Daniel Dickinson c8531fca5d firewall: fix wrong variable names for protocol command line parameter - were missed during r27500 14 years ago
Jo-Philipp Wich dd4934a943 firewall: - solve scoping issues when multiple values are used, thanks Daniel Dickinson - ignore src_port/dest_port for proto icmp rules, ignore icmp_type for non-icmp rules - properly handle icmp when proto is given in numerical form (1, 58) - support negated icmp types 14 years ago
Daniel Dickinson 05c45f0f5e firewall: fix udp rules for tcpudp proto rules using src_port and dest_port after modification by the parsing of the tcp rule 14 years ago
Jo-Philipp Wich 8f0fb81dfe firewall: restore local port relocation ability from r26617 14 years ago
Jo-Philipp Wich 68a1c8e1e3 firewall: - allow multiple ports, protocols, macs, icmp types per rule - implement "limit" and "limit_burst" options for rules - implement "extra" option to rules and redirects for passing arbritary flags to iptables - implement negations for "src_port", "dest_port", "src_dport", "src_mac", "proto" and "icmp_type" options - allow wildcard (*) "src" and "dest" options in rules to allow specifying "any" source or destination - validate symbolic icmp-type names against the selected iptables binary - properly handle forwarded ICMPv6 traffic in the default configuration 14 years ago
Jo-Philipp Wich 9f37422f2f firewall: ensure that fw_get_subnet4() sets an empty value if no (valid) IPv4 addr was found 14 years ago
Jo-Philipp Wich c014101d73 firewall: allow symbolic names of interfaces and aliases in masq_src and masq_dest 14 years ago
Jo-Philipp Wich 2e9e4c435f firewall: revert accidential committed changes from r26805 14 years ago
Jo-Philipp Wich ad23dd94b6 firewall: provide examples of ssh port relocation on firewall and IPsec passthrough Two examples of potentially useful configurations (commented out, of course): 14 years ago
Jo-Philipp Wich 2a386cee99 firewall: prevent excessive uci state data aggregation (#9152) 14 years ago
Jo-Philipp Wich a9977eca91 firewall: allow local redirection of ports 14 years ago
Jo-Philipp Wich af82471525 firewall: prevent duplicate values in interface state vars 14 years ago
Jo-Philipp Wich 13333a6742 firewall: move include sourcing into a subshell, this makes the firewall init immune against exit in the include scripts 14 years ago
Jo-Philipp Wich 1ca64678bb firewall: fix rule generation for v4 or v6 only zones (#8955) 14 years ago
Jo-Philipp Wich 04b20727d8 firewall: fix wrong rule order if multiple protocols are used 14 years ago
Jo-Philipp Wich a43f5b5038 firewall: insert SNAT and DNAT rules according to the order of the configuration file (#8052) 14 years ago
Jo-Philipp Wich 1a0d7a3612 firewall: fix chain selection logic, option dest must be ignored for notrack targets 14 years ago
Jo-Philipp Wich 6a335579b8 fireall: - support negations for src_ip, dest_ip, src_dip options in rules and redirects - add NOTRACK target to rule sections, allows to define fine grained notrack rules 14 years ago
Jo-Philipp Wich b07620df31 firewall: protect iptables invocations with locks in interface ops, it might run concurrently due to hotplug invocations on network restart 14 years ago
Jo-Philipp Wich f90328f26e firewall: make invalid redirects and duplicate zones non-fatal, print a notice and discard them 14 years ago
Jo-Philipp Wich 7557011cb1 firewall: run ifdown hotplug events synchronized, fixes a racecondition on "ifup iface" when ifdown and ifup events are delivered with a small dealy 14 years ago
Jo-Philipp Wich 1fe50da4bb firewall: deliver remove hotplug events for all active zones/networks when restarting the firewall 14 years ago
Jo-Philipp Wich f3dd8278bb firewall: - simplify masquerade rule setup - remove various subshell invocations - speedup fw() by not relying on xargs and pipes - rework SNAT support - attach to dest zone, use src_dip/src_dport as snat source 14 years ago
Jo-Philipp Wich 5ab58aa39c firewall: - fix possible endless loop when the family option is used for forwardings - only generate forwarding rules in SNAT redirect sections if src_dip is specified 14 years ago
Jo-Philipp Wich eb79296cc1 firewall: introduce SNAT support for redirect sections 14 years ago
Jo-Philipp Wich ca5bf9e291 firewall: - handle NAT reflection in firewall hotplug, solves synchronizing issues on boot - introduce masq_src and masq_dest options to limit zone masq to specific ip ranges, supports multiple subnets and negation 14 years ago
Jo-Philipp Wich ee4dd61b10 firewall: - fix processing of rules with an ip family option - append interface rules at the end of internal zone chains, simplifies injecting user or addon rules - support simple file logging (option log + option log_limit per zone) 14 years ago
Jo-Philipp Wich e62a9791ee firewall: allow redirecting only destination port (#7197) 15 years ago
Jo-Philipp Wich d6d1dd47d3 firewall: fix another notrack related bug 15 years ago
Jo-Philipp Wich f8fa598bf4 firewall: - notrack support was broken in multiple ways, fix it - also consider a zone conntracked if any redirect references it (#7196) 15 years ago
Jo-Philipp Wich 48c357ec01 firewall: - support alias ifnames different from parent ifname - properly handle multiple subnets per alias (v4+v6) 15 years ago
Jo-Philipp Wich 07b571a239 firewall: Initial alias interface support. This allows to define zones covering alias interfaces and associated entries like rules and forwardings. 15 years ago
Jo-Philipp Wich a756114e59 firewall: change the order of IPv4/IPv6 address detection, fixes mixed notation v6 improperly detected as v4 address 15 years ago
Jo-Philipp Wich e25fbfccdf firewall: fix support for netranges in redirect and rule sections 15 years ago
Jo-Philipp Wich 409edb1b8e firewall: count rules per chain and family, fix wrong order of ip6tables rules when ipv4 only or dual family rules are defined 15 years ago
Jo-Philipp Wich 40ad9defcc firewall: - fix ip6tables rules when icmp_type option is set - add "family" option to zones, forwardings, redirects and rules to selectively apply rules to iptables and/or ip6tables 15 years ago
Jo-Philipp Wich 3ffd27f905 firewall: implement disable_ipv6 uci option 15 years ago
Jo-Philipp Wich c6fdffd932 firewall (#7355) - partially revert r21486, start firewall on init again - skip iface hotplug events if base fw is not up yet - get ifname and up state with uci_get_state() in iface setup since the values gathered by scan_interfaces() may be outdated when iface coldplugging happens (observed with pptp) - ignore up state when bringing down interfaces because ifdown reverts state vars before dispatching the iface event - bump package revision 15 years ago
Jo-Philipp Wich 91519d51e9 firewall: fix a possible deadlock when the firewall config has syntax errors during restart 15 years ago
Jo-Philipp Wich 28e92939d1 firewall: use uci_get_state() wrapper 15 years ago