]> git.ipfire.org Git - people/ms/ipfire-2.x.git/commit
optionsfw.cgi: Fix bug12981 - Add option to log or not log dropped hostile traffic
authorAdolf Belka <adolf.belka@ipfire.org>
Sun, 21 Jan 2024 11:45:47 +0000 (12:45 +0100)
committerMichael Tremer <michael.tremer@ipfire.org>
Tue, 6 Feb 2024 17:41:06 +0000 (17:41 +0000)
commit189a0405624018f730071973ea59d38f7e54c444
tree25c8af84638b658654767f0d003f1e716d935546
parent437bfd678013cf2b56b673b67a3eb6d68a0831cd
optionsfw.cgi: Fix bug12981 - Add option to log or not log dropped hostile traffic

- This v3 version has split the logging choice for drop hostile to separate the logging of
   incoming drop hostile and outgoing drop hostile.
- The bug originator had no port forwards so all hostile would be dropped normally anyway.
   However the logs were being swamped by the logging of drop hostile making analysis
   difficult. So incoming drop hostile was desired to not be logged. However logging of
   outgoing drop hostile was desired to identify if clients on the internal lan were
   infected with malware trying to reach home.
- Added option with drop hostile section to decide if the dropped traffic should be
   logged or not.

Fixes: bug12981
Tested-by: Adolf Belka <adolf.belka@ipfire.org
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Bernhard Bitsch <bbitsch@ipfire.org>
Tested-by: Bernhard Bitsch <bbitsch@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
html/cgi-bin/optionsfw.cgi