Commit Graph

27 Commits (41fe3124642be714017af98a21477738eff82d37)

Author SHA1 Message Date
Jo-Philipp Wich cacb52e19f firewall: process custom rules after forwardings and redirects, this actually allows blocking traffic to certain hosts and other rules
SVN-Revision: 15278
2009-04-19 20:39:02 +00:00
Felix Fietkau 4fc8f4c5c8 firewall: don't clear the mangle table at startup or stop - it doesn't use it and clearing it breaks qos
SVN-Revision: 14114
2009-01-20 13:07:30 +00:00
Jo-Philipp Wich 83c9ac173d firewall: introduce drop_invalid option to allow disabling the invalid state match
SVN-Revision: 14061
2009-01-16 18:09:19 +00:00
Felix Fietkau 5b58a8db1f firewall: allow multiple interfaces to be part of one zone, fix the sanity checks for that
SVN-Revision: 14058
2009-01-16 17:39:03 +00:00
Felix Fietkau c7ff578b9f firewall: clear the MSSFIX rules
SVN-Revision: 13826
2009-01-02 21:58:58 +00:00
Steven Barth d1049f535a Unify portrange-support in firewall rule generator fixes #4404
SVN-Revision: 13791
2009-01-01 13:05:16 +00:00
Felix Fietkau 359ce7f97e disable the MSS fixup hack by default (most ISPs don't require this as a workaround for MTU problems, only some do). this should give a nice speedup for routing on standard-compliant ISPs
SVN-Revision: 13788
2008-12-31 19:02:03 +00:00
John Crispin 3830b905e3 fixes firewall for trunk, custom chains were never reched, as policies apply beforehand
SVN-Revision: 12978
2008-10-14 10:53:55 +00:00
John Crispin 221f4ad32d fixes firewall rule generation. forwarding rules were inserted in input chains, fixes #4028
SVN-Revision: 12768
2008-09-28 17:40:09 +00:00
John Crispin b56d5cc36f custom chains were never reached on DROP/REJECT policy, fixes #4004 #4029
SVN-Revision: 12767
2008-09-28 17:06:39 +00:00
Felix Fietkau 13abdc0af1 firewall: fix default policies, add a check for duplicate defaults sections and make custom chains more generic
SVN-Revision: 12765
2008-09-28 16:17:37 +00:00
Nicolas Thill d7810ed63e firewall changes: - implement a REJECT policy and enable it by default, reject packets with approriate response (closes: #3970) - cleanup syn_flood and remove logging
SVN-Revision: 12688
2008-09-24 15:10:16 +00:00
Steven Barth 954c24c5ed Fixed a typo in the firewall scripts
SVN-Revision: 12616
2008-09-16 22:01:14 +00:00
Steven Barth efb4cebbc6 Fixed a typo in firewall scripts, closes #4000
SVN-Revision: 12613
2008-09-15 18:57:39 +00:00
John Crispin 7f6ee846b7 make uci firewall backwards compatible to the old firewall.user
SVN-Revision: 12408
2008-08-27 19:16:54 +00:00
John Crispin 20216aa44d add proto tcpudp to firewall
SVN-Revision: 12407
2008-08-27 18:54:52 +00:00
John Crispin 9eaae4c61d fix device duplication in firewall if the balancing of ifup and ifdown is broken
SVN-Revision: 12404
2008-08-27 18:31:34 +00:00
John Crispin 924d10d611 make sure uci firewall reverts its states when stopped
SVN-Revision: 12403
2008-08-27 16:48:54 +00:00
John Crispin 146b47b60a fixes uci firewall init order, Signed-off-by: Roberto Riggio
SVN-Revision: 12402
2008-08-27 15:55:21 +00:00
Steven Barth 24c318dfe7 firewall: Added support for port-ranges as firstPort-lastPort to redirect sections
SVN-Revision: 12396
2008-08-27 14:04:52 +00:00
John Crispin 517dfd27e5 adds 5 new chains to the uci firewall that can be used to hook custom rules
SVN-Revision: 12395
2008-08-27 12:03:48 +00:00
John Crispin 4d7f694c43 adds more sanity checks to uci firewall
SVN-Revision: 12392
2008-08-26 11:07:04 +00:00
John Crispin aa6c019c11 use proto instead of protocol in uci firewall
SVN-Revision: 12391
2008-08-26 07:23:29 +00:00
Felix Fietkau 8ab217accc fix some firewall script typos (patch from #3897)
SVN-Revision: 12332
2008-08-17 12:01:01 +00:00
Travis Kemen 64a8d6c405 fix typo, proto should be protocol
SVN-Revision: 12318
2008-08-16 06:33:22 +00:00
John Crispin 7681547293 trigger error if dport is used when no proto is defined
SVN-Revision: 12317
2008-08-15 20:18:13 +00:00
John Crispin 5627667654 uci firewall - make uci firewall default and remove old code - fix up dependencies
SVN-Revision: 12284
2008-08-11 22:27:36 +00:00