summaryrefslogtreecommitdiffstats
path: root/package/network/config/firewall/Makefile
Commit message (Collapse)AuthorAgeFilesLines
* firewall: fix potential NULL pointer accessJo-Philipp Wich2014-08-111-2/+2
| | | | | | | | Properly skip struct ifaddr entries with NULL ifa_addr, thanks Kostas Papadopoulos for reporting. Signed-off-by: Jo-Philipp Wich <jow@openwrt.org> SVN-Revision: 42138
* firewall: implement selective conntrack flushing (#10225)Jo-Philipp Wich2014-08-111-2/+2
| | | | | | | | | | Utilize the new selective conntrack flushing facility to clear out active conntrack entries referring to old IP addresses after a firewall reload. Signed-off-by: Jo-Philipp Wich <jow@openwrt.org> SVN-Revision: 42114
* firewall: implement support for abritary netmasksJo-Philipp Wich2014-07-191-2/+2
| | | | | | | | | | | Properly parse and pass arbritary netmasks to iptables, this allows specifying ranges like '::c23f:eff:fe7a:a094/::ffff:ffff:ffff:ffff' to match the host part of an IPv6 address regardless of the currently active IPv6 prefix. Signed-off-by: Jo-Philipp Wich <jow@openwrt.org> SVN-Revision: 41760
* firewall: fix segfault introduced by latest updateJo-Philipp Wich2014-07-101-2/+2
| | | | | | Signed-off-by: Jo-Philipp Wich <jow@openwrt.org> SVN-Revision: 41558
* firewall: fix regressions introduced after latest ubus reworkJo-Philipp Wich2014-07-101-2/+2
| | | | | | | | | | The commit 92281eb747b56e748b7c3d754055919c23befdd4 broke fw3_ubus_addresses() so that no addresses where returned at all, this caused fw3 to not emit NAT reflection rules anymore. Signed-off-by: Jo-Philipp Wich <jow@openwrt.org> SVN-Revision: 41556
* firewall: fix issue with parsing network optionsJo-Philipp Wich2014-07-031-2/+2
| | | | | | Signed-off-by: Jo-Philipp Wich <jow@openwrt.org> SVN-Revision: 41491
* firewall: update to the latest version, adds support for fetching firewall ↵Felix Fietkau2014-07-021-2/+2
| | | | | | | | rules from procd Signed-off-by: Felix Fietkau <nbd@openwrt.org> SVN-Revision: 41480
* firewall3: add fw3 zone function to enumerate devicesSteven Barth2014-06-261-2/+2
| | | | SVN-Revision: 41349
* firewall: add support for nat-rules and netifd-proto-originating rulesSteven Barth2014-04-141-2/+2
| | | | | | Signed-off-by: Steven Barth <steven@midlink.org> SVN-Revision: 40510
* firewall: update to latest version, fixes a musl build errorFelix Fietkau2014-03-201-2/+2
| | | | | | Signed-off-by: Felix Fietkau <nbd@openwrt.org> SVN-Revision: 39965
* firewall: fix several ipset integration issues (#15016)Jo-Philipp Wich2014-02-201-3/+3
| | | | | | | | | | | - Do not consider bitmap storage for IPv6 family sets - Move ipset family parameter before any additional option - Only emit family parameter for hash sets - Do not allow IPv6 iprange for IPv4 sets and vice versa Signed-off-by: Jo-Philipp Wich <jow@openwrt.org> SVN-Revision: 39647
* firewall: fix handling of tcp_ecn parameterJo-Philipp Wich2013-12-171-2/+2
| | | | | | | | | | | The firewall3 implementation as well as the shell implementation predating it used to process the tcp_ecnoption as boolean while it actually is an integer. Change the code to parse tcp_ecn as integer. Signed-off-by: Jo-Philipp Wich <jow@openwrt.org> SVN-Revision: 39122
* firewall: optimize DNAT rules and skip invalid rules and redirects (#14485)Jo-Philipp Wich2013-11-181-2/+2
| | | | | | | | | | - instead of writing one (or more) ACCEPT rules in the filter table for each redirect install a global ctstate DNAT accept rule per zone - discard rules and redirects which have invalid options set instead of silently skipping the invalid values SVN-Revision: 38849
* firewall: Improve ubus supportSteven Barth2013-10-231-2/+2
| | | | | | | | | | * Use network.interface dump call instead of individual status calls to reduce overall netifd lookups and invokes to 1 per fw3 process. * Allow protocol handlers to assign a firewall zone for an interface in the data section to allow for dynamic firewall zone assignment. SVN-Revision: 38504
* firewall: small improvements in nat reflectionJo-Philipp Wich2013-10-101-2/+2
| | | | | | | - do not insert duplicate rules when setting up reflection to a zone containing multiple interfaces - set up reflection for any protocol, not just TCP and UDP SVN-Revision: 38361
* firewall: update to git headJo-Philipp Wich2013-08-141-2/+2
| | | | | | | - uses "-j CT --notrack" instead of deprecated "-j NOTRACK" - fixes support for rule sections with target "NOTRACK" SVN-Revision: 37777
* firewall: update to git headJo-Philipp Wich2013-07-161-2/+2
| | | | | | - handles redirects as port relocations if the dest_ip points to the router itself SVN-Revision: 37374
* firewall: add missing dependenciesFelix Fietkau2013-07-101-1/+1
| | | | | | Signed-off-by: Felix Fietkau <nbd@openwrt.org> SVN-Revision: 37224
* firewall: allow routed lan<->lan traffic by defaultJo-Philipp Wich2013-07-041-1/+1
| | | | SVN-Revision: 37171
* firewall: update to git headJo-Philipp Wich2013-06-291-2/+2
| | | | | | - uses custom formatting for mac addresses to ensure leading zeroes, required for older iptables mac match parser SVN-Revision: 37082
* firewall: update to git headJo-Philipp Wich2013-06-181-2/+2
| | | | | | - fixes misprocessing of unknown symbolic protocol names SVN-Revision: 36963
* firewall: update to git headJo-Philipp Wich2013-06-181-2/+2
| | | | | | - fixes calculation of IPv4 netmasks derived from 0.0.0.0/0 CIDRs SVN-Revision: 36960
* firewall: update to git headJo-Philipp Wich2013-06-131-2/+2
| | | | | | - properly process intermediate "!" options in argument list (fixes negated ipsets) SVN-Revision: 36935
* firewall: update to git headJo-Philipp Wich2013-06-131-2/+2
| | | | | | - fixes handling of reject target for rule sections with specific destination zone SVN-Revision: 36933
* firewall: udpate to git head (#13652, #13654, #13658)Jo-Philipp Wich2013-06-061-2/+2
| | | | | | | | | - optimizes chain usage for ingress rules - adds limit match support for redirect rules - fixes automatic redirect dest detection on little endian systems - leaves base chains in place on reload to allow user rules to target e.g. "reject" SVN-Revision: 36871
* firewall: copy libext*.a from staging dir and drop kernel.mk includes, ↵Jo-Philipp Wich2013-06-061-4/+1
| | | | | | solves problem with colliding CONFIG_IPV6 symbols SVN-Revision: 36868
* firewall: update to git head (#13652)Jo-Philipp Wich2013-06-051-2/+2
| | | | | | | - simplifies using ipsets for rules and redirects, match direction can be specified in-place like option ipset 'setname src dst dst' - uses zone_name_src_ACTION chains for input rules, this fixes logging with log enabled src zones SVN-Revision: 36854
* firewall3: fix accidentally changed install directiveJo-Philipp Wich2013-06-041-1/+1
| | | | SVN-Revision: 36840
* firewall: fix git source urlJo-Philipp Wich2013-06-041-1/+1
| | | | SVN-Revision: 36839
* firewall3: rename to firewall, move into base system menu, update to git ↵Jo-Philipp Wich2013-06-041-0/+66
| | | | | | head with compatibility fixes for AA SVN-Revision: 36838
* Drop legacy firewall packageJo-Philipp Wich2013-06-041-58/+0
| | | | SVN-Revision: 36837
* firewall: Remove obsoleted ULA-border ruleSteven Barth2013-05-131-1/+1
| | | | SVN-Revision: 36622
* firewall: fix logging rule regression (#12999)Jo-Philipp Wich2013-02-221-1/+1
| | | | SVN-Revision: 35745
* firewall: various enhancementsJo-Philipp Wich2013-02-041-1/+1
| | | | | | | | | | | | - reduce mssfix related log spam (#10681) - separate src and dest terminal chains (#11453, #12945) - disable per-zone custom chains by default, they're rarely used Additionally introduce options "device", "subnet", "extra", "extra_src" and "extra_dest" to allow defining zones not related to uci interfaces, e.g. to match "ppp+" or any tcp traffic to and from a specific port. SVN-Revision: 35484
* firewall: flush conntrack table after changing interface rulesJo-Philipp Wich2013-01-281-2/+2
| | | | SVN-Revision: 35348
* firewall: Add ULA site border for IPv6 traffic This prevents private traffic ↵Steven Barth2013-01-041-1/+1
| | | | | | from leaking out to the internet SVN-Revision: 35012
* firewall: fix typo in reflection hotplug scriptJo-Philipp Wich2012-12-071-1/+1
| | | | SVN-Revision: 34569
* firewall: extend nat reflection supportJo-Philipp Wich2012-12-041-1/+1
| | | | | | | | - use comment match to keep track of per-network rules - setup reflection for any interface which is part of a masqueraded zone, not just "wan" - delete per-network reflection rules if network is brought down SVN-Revision: 34472
* packages: sort network related packages into package/network/Felix Fietkau2012-10-101-0/+58
SVN-Revision: 33688