]> git.ipfire.org Git - thirdparty/iptables.git/log
thirdparty/iptables.git
11 years agoxtables-restore: add -4 and -6 support
Pablo Neira Ayuso [Sat, 23 Feb 2013 17:27:08 +0000 (18:27 +0100)] 
xtables-restore: add -4 and -6 support

Now you can specify:

 xtables-restore -6 < my-ip6tables-ruleset

to restore the IPv6 rule-set.

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agonft: Split nft core to become family independant
Tomasz Bursztyka [Sat, 23 Feb 2013 16:50:31 +0000 (17:50 +0100)] 
nft: Split nft core to become family independant

This makes nft core code independant from the family. Each family needs
to implement and provide a struct nft_family_ops {}.

This split will ease the future support of bridge and arp rules manipulations.

[ updated header files and rebased upon the current tree --pablo ]

Signed-off-by: Tomasz Bursztyka <tomasz.bursztyka@linux.intel.com>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoadd xtables-events
Pablo Neira Ayuso [Sat, 9 Feb 2013 17:22:13 +0000 (18:22 +0100)] 
add xtables-events

Add new program to listen to rule updates:

shell$ xtables-events
-A INPUT -m state --state ESTABLISHED -j ACCEPT
-A INPUT -p tcp -m tcp --dport 22 -j ACCEPT
-D INPUT -p tcp -m tcp --dport 22 -j ACCEPT
-D INPUT -m state --state ESTABLISHED -j ACCEPT

You can use `-c' option to display counters.

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoxtables: ipv6: fix -D with -p
Pablo Neira Ayuso [Sat, 9 Feb 2013 17:44:34 +0000 (18:44 +0100)] 
xtables: ipv6: fix -D with -p

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoxtables: ipv6: add missing break in nft_parse_payload_ipv6
Pablo Neira Ayuso [Sat, 9 Feb 2013 17:35:48 +0000 (18:35 +0100)] 
xtables: ipv6: add missing break in nft_parse_payload_ipv6

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoxtables: ipv6: fix wrong error if -p is used
Pablo Neira Ayuso [Sat, 9 Feb 2013 17:27:04 +0000 (18:27 +0100)] 
xtables: ipv6: fix wrong error if -p is used

shell$ xtables -6 -I INPUT -p tcp --dport 22 -j ACCEPT
xtables v1.4.15: -f is not valid on IPv6
Try `xtables -h' or 'xtables --help' for more information.

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agonft: fix crash if TRACE is used
Pablo Neira Ayuso [Sun, 27 Jan 2013 22:19:49 +0000 (23:19 +0100)] 
nft: fix crash if TRACE is used

And any other match and target with no save function defined.

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoxtables-restore: support test option `-t'
Pablo Neira Ayuso [Sun, 20 Jan 2013 22:23:29 +0000 (23:23 +0100)] 
xtables-restore: support test option `-t'

You can now test if a rule-set is correct.

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoxtables: nft: add protocol and flags for xtables over nf_tables
Pablo Neira Ayuso [Fri, 25 Jan 2013 15:04:36 +0000 (16:04 +0100)] 
xtables: nft: add protocol and flags for xtables over nf_tables

Add protocol and flags for the compatibility layer.

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoxtables-restore: support atomic commit
Pablo Neira Ayuso [Sun, 20 Jan 2013 19:19:20 +0000 (20:19 +0100)] 
xtables-restore: support atomic commit

Use new services in nf_tables to support atomic commit.

Commit per table, although we support global commit at once,
call commit for each table to emulate iptables-restore
behaviour by now.

Keep table dormant/wake up code in iptables/nft.c as it can
be used in the future.

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoxtables: purge out user-define chains from the kernel
Pablo Neira Ayuso [Sun, 20 Jan 2013 21:32:43 +0000 (22:32 +0100)] 
xtables: purge out user-define chains from the kernel

xtables-restore has to purge out user-defined chains that are
not defined in the configuration file.

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoxtables: fix compilation warning
Pablo Neira Ayuso [Sun, 20 Jan 2013 19:24:36 +0000 (20:24 +0100)] 
xtables: fix compilation warning

xtables-standalone.c: In function ‘xtables_main’:
xtables-standalone.c:64:2: warning: implicit declaration of function ‘do_commandx’ [-Wimplicit-function-declaration]

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoxtables-restore: fix custom user chain restoration
Pablo Neira Ayuso [Sun, 20 Jan 2013 19:18:02 +0000 (20:18 +0100)] 
xtables-restore: fix custom user chain restoration

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoxtables: add IPv6 support
Tomasz Bursztyka [Sun, 13 Jan 2013 15:42:11 +0000 (16:42 +0100)] 
xtables: add IPv6 support

Summary of changes to add IPv6 support to the xtables utility:

* modify all commands (add, delete, replace, check and listing) to
  support IPv6 addresses.

And for the internal nft library:

* add family to struct nft_handle and modify all caller to use this
  family instead of the hardcoded AF_INET.
* move code that we can re-use for IPv4 and IPv6 into helper functions.
* add IPv6 rule printing support.
* add support to parse IPv6 address.

Pablo added several improvements to this patch:

* added basic xtables-save and xtables-restore support (so it defaults
  to IPv4)
* fixed a couple of bugs found while testing
* added reference when -f is used to point to -m frag (until we can make
  this consistent with IPv4).

Note that we use one single xtables binary utility for IPv4 and IPv6.

Signed-off-by: Tomasz Bursztyka <tomasz.bursztyka@linux.intel.com>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoxtables: fix crash due to using wrong globals
Pablo Neira Ayuso [Sun, 30 Dec 2012 00:45:44 +0000 (01:45 +0100)] 
xtables: fix crash due to using wrong globals

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agonft: adapt chain rename to recent Patrick's updates
Pablo Neira Ayuso [Sat, 29 Dec 2012 19:05:55 +0000 (20:05 +0100)] 
nft: adapt chain rename to recent Patrick's updates

This patch gets existing code in sync with Patrick's chain
renaming new approach.

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoxtables-restore: add support for dormant tables
Pablo Neira Ayuso [Mon, 19 Nov 2012 14:32:18 +0000 (15:32 +0100)] 
xtables-restore: add support for dormant tables

This patch adds support for dormant tables for xtables-restore.

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoiptables: nft: use chain types
Pablo Neira Ayuso [Sat, 3 Nov 2012 12:43:22 +0000 (13:43 +0100)] 
iptables: nft: use chain types

We use the new special chain types defined in the kernel.

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoiptables: nft: use 64-bits handle
Pablo Neira Ayuso [Sat, 3 Nov 2012 11:20:07 +0000 (12:20 +0100)] 
iptables: nft: use 64-bits handle

Now that we use that in kernel space and in libnftables.

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoiptables: nft: remove __nft_check_rule
Pablo Neira Ayuso [Sat, 3 Nov 2012 11:16:54 +0000 (12:16 +0100)] 
iptables: nft: remove __nft_check_rule

Rework code to remove __nft_check_rule and split it into
logical fragments.

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoiptables: nft: move priority to chain instead of table
Pablo Neira Ayuso [Sat, 3 Nov 2012 10:12:45 +0000 (11:12 +0100)] 
iptables: nft: move priority to chain instead of table

NAT table uses different chain priorities, adapt the existing
code to allow this.

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoheaders: remove unused compatibility definitions
Pablo Neira Ayuso [Sat, 3 Nov 2012 10:09:30 +0000 (11:09 +0100)] 
headers: remove unused compatibility definitions

They belong to nf_tables_compat.h

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agonft: fix missing rule listing in custom chains with -L
Pablo Neira Ayuso [Thu, 1 Nov 2012 15:26:46 +0000 (16:26 +0100)] 
nft: fix missing rule listing in custom chains with -L

Reported-by: Tomasz Bursztyka <tomasz.bursztyka@linux.intel.com>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoiptables: nft: Add support for -R option
Tomasz Bursztyka [Tue, 30 Oct 2012 23:31:08 +0000 (23:31 +0000)] 
iptables: nft: Add support for -R option

Signed-off-by: Tomasz Bursztyka <tomasz.bursztyka@linux.intel.com>
11 years agoiptables: nft: Refactor __nft_rule_check to return rule handle when relevant
Tomasz Bursztyka [Tue, 30 Oct 2012 23:31:07 +0000 (23:31 +0000)] 
iptables: nft: Refactor __nft_rule_check to return rule handle when relevant

Signed-off-by: Tomasz Bursztyka <tomasz.bursztyka@linux.intel.com>
11 years agoiptables: nft: Fix -D chain rulenum option
Tomasz Bursztyka [Tue, 30 Oct 2012 23:31:06 +0000 (23:31 +0000)] 
iptables: nft: Fix -D chain rulenum option

Signed-off-by: Tomasz Bursztyka <tomasz.bursztyka@linux.intel.com>
11 years agonft: Add support for chain rename options (-E)
Tomasz Bursztyka [Tue, 30 Oct 2012 23:31:05 +0000 (23:31 +0000)] 
nft: Add support for chain rename options (-E)

Signed-off-by: Tomasz Bursztyka <tomasz.bursztyka@linux.intel.com>
11 years agoheaders: Make nf_tables.h up to date
Tomasz Bursztyka [Tue, 30 Oct 2012 23:31:04 +0000 (23:31 +0000)] 
headers: Make nf_tables.h up to date

Signed-off-by: Tomasz Bursztyka <tomasz.bursztyka@linux.intel.com>
11 years agoiptables: nft: add -f support
Pablo Neira Ayuso [Mon, 29 Oct 2012 21:52:50 +0000 (22:52 +0100)] 
iptables: nft: add -f support

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agorework automatic creation of built-in table and chains
Pablo Neira Ayuso [Mon, 29 Oct 2012 10:39:46 +0000 (11:39 +0100)] 
rework automatic creation of built-in table and chains

This patch reworks the automatic creation of built-in table and
chains. Now it initializes all built-in chains belonging a table
at once.

This happens with commands: -P, -A, -I, -N

Note that xtables skips chain initialization if it notices that
the table already exists in the kernel.

Thanks to Tomasz Bursztyka for spotting problems with -N.

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoautomatic creation of built-in table and chains
Pablo Neira Ayuso [Wed, 24 Oct 2012 11:40:12 +0000 (13:40 +0200)] 
automatic creation of built-in table and chains

In order to emulate the iptables behaviour, this patch changes
the current behaviour to:

1st) check if the table and chains are built-in.
2nd) If they don't exists, create them. If they exists, don't touch
     them.

The automatic creation happens in the -I and -P paths.

We should provide a new command to allow to delete (unregister)
built-in tables and chains. It would be similar to unloading
the iptable_X module that registers the custom table.

This is not done for other commands like -C or -D since they
will fail while trying to find the rule in the kernel if such
combination of chain and table does not exists.

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agouse nf_tables and nf_tables compatibility interface
Pablo Neira Ayuso [Thu, 27 Sep 2012 17:12:53 +0000 (19:12 +0200)] 
use nf_tables and nf_tables compatibility interface

This patch adds the following utilities:

* xtables
* xtables-restore
* xtables-save
* xtables-config

They all use Patrick's nf_tables infrastructure plus my compatibility
layer.

xtables, xtables-restore and xtables-save are syntax compatible with
ip[6]tables, ip[6]tables-restore and ip[6]tables-save.

Semantics aims to be similar, still the main exception is that there
is no commit operation. Thus, we incrementally add/delete rules without
entire table locking.

The following options are also not yet implemented:

-Z (this requires adding expr->ops->reset(...) so nft_counters can reset
    internal state of expressions while dumping it)

-R and -E (this requires adding this feature to nf_tables)

-f (can be implemented with expressions: payload 6 (2-bytes) + bitwise a&b^!b + cmp neq 0)

-IPv6 support.

But those are a matter of time to get them done.

A new utility, xtables-config, is available to register tables and
chains. By default there is a configuration file that adds backward
compatible tables and chains under iptables/etc/xtables.conf. You have
to call this utility first to register tables and chains.

However, it would be possible to automagically register tables and
chains while using xtables and xtables-restore to get similar operation
than with iptables.

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoiptables-save: remove dlfcn.h include
Gustavo Zacarias [Wed, 27 Nov 2013 13:21:12 +0000 (10:21 -0300)] 
iptables-save: remove dlfcn.h include

It's not required and breaks on static-only uClibc builds which don't
have the header file.

Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar>
Signed-off-by: Florian Westphal <fw@strlen.de>
11 years agoMerge branch 'stable-1.4.20'
Florian Westphal [Sat, 23 Nov 2013 22:50:17 +0000 (23:50 +0100)] 
Merge branch 'stable-1.4.20'

... to get 76e230e ('iptables: link against libnetfilter_conntrack'),
else static build doesn't work.

Conflicts:
extensions/GNUmakefile.in

[ CPPFLAGS was added in master, so keep it ]

Reported-By: Gustavo Zacarias <gustavo@zacarias.com.ar>
11 years agoiptables 1.4.21 release v1.4.21
Pablo Neira Ayuso [Fri, 22 Nov 2013 11:17:58 +0000 (12:17 +0100)] 
iptables 1.4.21 release

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoutils: nfsynproxy: fix error while compiling the BPF filter
Pablo Neira Ayuso [Mon, 18 Nov 2013 18:06:06 +0000 (19:06 +0100)] 
utils: nfsynproxy: fix error while compiling the BPF filter

Fix the following error while running nfsynproxy here:

 pcap_compile: not-yet-activated pcap_t passed to pcap_compile

According to what I have read, we have to compile the filter
once the pcap_t handle has been activated.

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoextensions: libxt_set, libxt_SET: check the set family too
Jozsef Kadlecsik [Wed, 4 Sep 2013 15:43:49 +0000 (17:43 +0200)] 
extensions: libxt_set, libxt_SET: check the set family too

Do not accept silently sets with wrong protocol family but reject
them with an error message. It makes straightforward to catch user
errors.

[ Use afinfo instead to avoid a binary interface update --pablo ]

Signed-off-by: Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoutils: add nfsynproxy tool
Patrick McHardy [Wed, 28 Aug 2013 07:32:44 +0000 (09:32 +0200)] 
utils: add nfsynproxy tool

[ Originally synconf, but Jesper D. Brouer suggested to change
  the name to avoid a possible filename clash. I also include
  nfsynproxy in the final configure report --pablo ]

Signed-off-by: Patrick McHardy <kaber@trash.net>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoextensions: add SYNPROXY extension
Patrick McHardy [Wed, 28 Aug 2013 06:44:42 +0000 (08:44 +0200)] 
extensions: add SYNPROXY extension

Signed-off-by: Patrick McHardy <kaber@trash.net>
11 years agoextensions: libxt_cluster: add note on arptables-jf
Pablo Neira Ayuso [Mon, 4 Nov 2013 10:35:01 +0000 (11:35 +0100)] 
extensions: libxt_cluster: add note on arptables-jf

Gao feng reported problems while getting the cluster match working with
arptables. This patch adds a note in the manpage to warn about the arptables-jf
syntax, which is different from mainstream arptables.

Reported-by: Gao feng <gaofeng@cn.fujitsu.com>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoip6tables: Use consistent exit code for EAGAIN
Kevin Cernekee [Sat, 2 Nov 2013 04:08:34 +0000 (21:08 -0700)] 
ip6tables: Use consistent exit code for EAGAIN

As of commit 056564f6a (Add new exit value to indicate concurrency
issues), the IPv4 iptables binary returns exit status 4 to indicate that
the kernel returned EAGAIN when trying to update a table.  But ip6tables
still returns exit status 1 under the same circumstances.  Update
ip6tables to bring it in line with iptables behavior.

Signed-off-by: Kevin Cernekee <cernekee@gmail.com>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoiptables: spurious error in load_extension
Phil Oester [Tue, 8 Oct 2013 16:20:15 +0000 (09:20 -0700)] 
iptables: spurious error in load_extension

In commit 927385017047d (iptables: improve error reporting with extension
loading troubles), a new error message was added in an attempt to handle
the case where a match does not support a particular protocol family.
For instance, attempting to use the osf match on IPv6.

Unfortunately, this error message now triggers when creating a new chain
which has the same name as a match extension, because iptables calls
xtables_find_target with the name of the new chain to verify it does not
clash with an existing target.  For example:

    # iptables -N tcp
    /usr/lib/xtables/libxt_tcp.so: no "tcp" extension found for this protocol

I attempted to resolve this by adding a new XTF flag, but that required changes
in many different places (including -j handling).  It seems easiest just to
remove this warning and stick with the original error message of ENOENT, even
if less than precise.

Signed-off-by: Phil Oester <kernel@linuxace.com>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoiptables: improve chain name validation
Phil Oester [Sat, 5 Oct 2013 16:33:15 +0000 (09:33 -0700)] 
iptables: improve chain name validation

As pointed out by Andrew Domaszek, iptables allows whitespace to be included in
chain names.  This causes issues with iptables-restore, and later iptables
actions on the chain.  Attached patch disallows whitespace, and also consolidates
all chain name checking into a new function.

This closes netfilter bugzilla #855.

[ Included ip6tables changed as well --pablo ]

Signed-off-by: Phil Oester <kernel@linuxace.com>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoiptables: extensions/GNUMakefile.in use CPPFLAGS
Laurence J. Lane [Thu, 22 Aug 2013 16:44:47 +0000 (12:44 -0400)] 
iptables: extensions/GNUMakefile.in use CPPFLAGS

"All other Makefiles add CPPFLAGS to ${COMPILE} (automake), but GNUmakefile.in
 doesn't set it."

http://bugs.debian.org/665286

Signed-off-by: Laurence J. Lane <ljlane@debian.org>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoextensions: libxt_LOG: use generic syslog reference in manpage
Laurence J. Lane [Fri, 6 Sep 2013 21:46:00 +0000 (17:46 -0400)] 
extensions: libxt_LOG: use generic syslog reference in manpage

Fedora, ArchLinux, Ubuntu, and Debian, at the least, use
alternative syslog daemons by default these days. Let's make
the syslog reference generic.

Reference: http://bugs.debian.org/567564

Signed-off-by: Laurence J. Lane <ljlane@debian.org>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agolibxtables: xtables_ipmask_to_numeric incorrect with non-CIDR masks
Phil Oester [Thu, 26 Sep 2013 16:06:58 +0000 (09:06 -0700)] 
libxtables: xtables_ipmask_to_numeric incorrect with non-CIDR masks

As pointed out by Peter Hoelsken, rules created with non-standard
masks such as 0.255.0.0, 0.0.255.0, etc. are displayed when output
with iptables -L in CIDR notation as -1.  This is because the cidr
variable in xtables_ipmask_to_numeric is unsigned, and the return
value of -1 from xtables_ipmask_to_cidr is therefore converted to
UINT_MAX. Add a cast to workaround the issue.

This closes netfilter bugzilla #854.

Signed-off-by: Phil Oester <kernel@linuxace.com>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoiptables: libxt_string.man add examples
Laurence J. Lane [Sat, 24 Aug 2013 21:37:55 +0000 (17:37 -0400)] 
iptables: libxt_string.man add examples

Add usage examples for string and hex string patterns.

References: http://bugs.debian.org/699904
Signed-off-by: Laurence J. Lane <ljlane@debian.org>
Signed-off-by: Florian Westphal <fw@strlen.de>
11 years agoiptables: libxt_recent.{c,man} dead URL
Laurence J. Lane [Fri, 23 Aug 2013 20:55:55 +0000 (16:55 -0400)] 
iptables: libxt_recent.{c,man} dead URL

Remove it.

Signed-off-by: Laurence J. Lane <ljlane@debian.org>
Signed-off-by: Florian Westphal <fw@strlen.de>
11 years agoiptables: link against libnetfilter_conntrack
Jan Engelhardt [Tue, 13 Aug 2013 19:02:06 +0000 (21:02 +0200)] 
iptables: link against libnetfilter_conntrack

Linking currently fails in --enable-static case:

../extensions/libext.a(libxt_connlabel.o): In function `connlabel_get_name':
iptables/extensions/libxt_connlabel.c:57: undefined reference to `nfct_labelmap_get_name'
[..]
It's libxtables.la(libxt_connlabel.o) using libnetfilter_conntrack.

If libnetfilter_conntrack is not found, @libnetfilter_conntrack_CFLAGS@
and @libnetfilter_conntrack_LIBS@ (and their ${} ones) should be empty,
therefore producing no harm to include unconditionally.

Reported-and-tested-by: Gustavo Zacarias <gustavo@zacarias.com.ar>
Signed-off-by: Florian Westphal <fw@strlen.de>
11 years agobuild: add software version to manpage first line at configure stage
Pablo Neira Ayuso [Thu, 22 Aug 2013 11:11:45 +0000 (13:11 +0200)] 
build: add software version to manpage first line at configure stage

This patch adds the software version to the first line of the
following manpages:

iptables-save.8
iptables-restore.8
iptables-apply.8
iptables-xml.1

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoiptables: iptables-xm1.1 correct man section
Laurence J. Lane [Mon, 19 Aug 2013 16:54:35 +0000 (12:54 -0400)] 
iptables: iptables-xm1.1 correct man section

iptables-xml.8 was moved to iptables-xm1.1.

Signed-off-by: Laurence J. Lane <ljlane@debian.org>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoiptables: libip(6)t_REJECT.man default icmp types
Laurence J. Lane [Sun, 18 Aug 2013 23:41:40 +0000 (19:41 -0400)] 
iptables: libip(6)t_REJECT.man default icmp types

The extension man page shows "port-unreach" and "port-unreachable" as
default icmpv6 and icomp reject-with types. Either and variations work
fine for writing rules, but they are displayed as "icmp6-port-unreachable"
and "icmp-port-unreachable". Let's make that consistent.

http://bugs.debian.org/644819

Signed-off-by: Laurence J. Lane <ljlane@debian.org>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoiptables: libxt_conntrack.man extraneous commas
Laurence J. Lane [Sun, 18 Aug 2013 19:44:13 +0000 (15:44 -0400)] 
iptables: libxt_conntrack.man extraneous commas

The first might work. The second doesn't.

(The other corrections in the bug report are already implemented.)

http://bugs.debian.org/654983

Signed-off-by: Laurence J. Lane <ljlane@debian.org>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoiptables: libxt_hashlimit.man: correct address
Laurence J. Lane [Sat, 17 Aug 2013 23:08:59 +0000 (19:08 -0400)] 
iptables: libxt_hashlimit.man: correct address

Corrects an example address with subnet mask.

http://bugs.debian.org/698393

Signed-off-by: Laurence J. Lane <ljlane@debian.org>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoip[6]tables: fix incorrect alignment in commands_v_options
Pablo Neira Ayuso [Fri, 9 Aug 2013 16:00:22 +0000 (18:00 +0200)] 
ip[6]tables: fix incorrect alignment in commands_v_options

CMD_ZERO_NUM is 14, so it has to be defined in position 15 in the
commands_v_options array. This does not manifests easily since
commands from 9 to 14 have a very similar pattern in such array.

Based on this patch: http://patchwork.ozlabs.org/patch/188153/

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoMerge branch 'stable-1.4.20'
Pablo Neira Ayuso [Thu, 8 Aug 2013 16:16:36 +0000 (18:16 +0200)] 
Merge branch 'stable-1.4.20'

To retrieve:

iptables: state match incompatibilty across versions

11 years agoiptables: state match incompatibilty across versions
Phil Oester [Wed, 7 Aug 2013 23:44:49 +0000 (16:44 -0700)] 
iptables: state match incompatibilty across versions

As reported in Debian bug #718810 [1], state match rules added in < 1.4.16
iptables versions are incorrectly displayed by >= 1.4.16 iptables versions.
Issue bisected to commit 0d701631 (libxt_state: replace as an alias to
xt_conntrack).

Fix this by adding the missing .print and .save functions for state match
aliases in the conntrack match.

[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=718810

Signed-off-by: Phil Oester <kernel@linuxace.com>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoMerge branch 'stable-1.4.20'
Pablo Neira Ayuso [Thu, 8 Aug 2013 10:37:31 +0000 (12:37 +0200)] 
Merge branch 'stable-1.4.20'

To retrieve:

iptables: correctly reference generated file

11 years agoiptables: correctly reference generated file
Lutz Jaenicke [Wed, 7 Aug 2013 08:09:16 +0000 (10:09 +0200)] 
iptables: correctly reference generated file

Since (14bca55 iptables: use autoconf to process .in man pages),
the file "iptables-extensions.8.tmpl" is generated from
"iptables-extensions.8.tmpl.in" and is consequently no
longer found in ${srcdir} but in the build directory.
(Becomes visible with builddir != srcdir)

Signed-off-by: Lutz Jaenicke <ljaenicke@innominate.com>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoxtables: trivial spelling fix
stephen hemminger [Sun, 4 Aug 2013 22:08:26 +0000 (15:08 -0700)] 
xtables: trivial spelling fix

Signed-off-by: Stephen Hemminger <stephen@networkplumber.org>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agodoc: merge ip6table man pages into ipv4 ones
Florian Westphal [Sun, 14 Jul 2013 17:32:12 +0000 (19:32 +0200)] 
doc: merge ip6table man pages into ipv4 ones

a couple of improvements to the iptables man page never made it into
ip6tables version.

The number of differences between these two files is so small that
it seems preferable to alias the ipv6 man pages to their ipv4 counterpart
and change iptables man page to specifically document differences
(e.g. lack of ip6tables -f, etc).

Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agodoc: add libnetfilter_queue pointer to libxt_NFQUEUE.man
Florian Westphal [Fri, 12 Jul 2013 21:14:27 +0000 (23:14 +0200)] 
doc: add libnetfilter_queue pointer to libxt_NFQUEUE.man

... and remove the QUEUE snippets from ip(6)tables man page,
the queue target was replaced by nfqueue years ago.
Fix up a couple of needless differences in ip(6)tables.8, too.

Signed-off-by: Florian Westphal <fw@strlen.de>
11 years agoextensions: libxt_socket: update man page
Florian Westphal [Fri, 12 Jul 2013 21:29:28 +0000 (23:29 +0200)] 
extensions: libxt_socket: update man page

Document --nowildcard option and its implications when using -m socket
to intercept packets.

While at it, update man page with Balazs Scheidlers comments from
nf_tproxy_core.h in kernel tree to better explain how lookup is performed.

Cc: Eric Dumazet <eric.dumazet@gmail.com>
Signed-off-by: Florian Westphal <fw@strlen.de>
11 years agoxt_socket: add --nowildcard flag
Eric Dumazet [Thu, 20 Jun 2013 12:52:35 +0000 (05:52 -0700)] 
xt_socket: add --nowildcard flag

xt_socket module can be a nice replacement to conntrack module
in some cases (SYN filtering for example)

But it lacks the ability to match the 3rd packet of TCP
handshake (ACK coming from the client).

Add a XT_SOCKET_NOWILDCARD flag to disable the wildcard mechanism

The wildcard is the legacy socket match behavior, that ignores
LISTEN sockets bound to INADDR_ANY (or ipv6 equivalent)

iptables -I INPUT -p tcp --syn -j SYN_CHAIN
iptables -I INPUT -m socket -j ACCEPT

Signed-off-by: Eric Dumazet <edumazet@google.com>
Cc: Patrick McHardy <kaber@trash.net>
Cc: Jesper Dangaard Brouer <brouer@redhat.com>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoiptables 1.4.20 release v1.4.20
Pablo Neira Ayuso [Tue, 6 Aug 2013 15:48:43 +0000 (17:48 +0200)] 
iptables 1.4.20 release

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoiptables-xml: fix parameter parsing (similar to 2165f38)
Pablo Neira Ayuso [Fri, 26 Jul 2013 14:38:55 +0000 (16:38 +0200)] 
iptables-xml: fix parameter parsing (similar to 2165f38)

Similar to (2165f38 iptables-restore: fix parameter parsing
(shows up with gcc-4.7)), make sure iptables-xml doesn't hit
the same problem.

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agoiptables: iptables-xml: Fix various parsing bugs
Phil Oester [Thu, 20 Jun 2013 12:53:36 +0000 (08:53 -0400)] 
iptables: iptables-xml: Fix various parsing bugs

There are two bugs in iptables-xml do_rule_part parsing corrected by this patch:

1) Ignore "-A <chain>" instead of just "-A"
2) When checking to see if we need a <match> tag, inversion needs to be taken
   into account

This closes netfilter bugzilla #679.

Signed-off-by: Phil Oester <kernel@linuxace.com>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agobuild: fail in configure on missing dependency with --enable-bpf-compiler
Willem de Bruijn [Mon, 22 Jul 2013 00:02:38 +0000 (20:02 -0400)] 
build: fail in configure on missing dependency with --enable-bpf-compiler

The build of utils/nfbpf_compile depends on libpcap. If configure is
run with --enable-bpf-compiler, the script succeeds, but make fails.

This small patch adds a test for the dependency (libpcap) in configure
and fails hard if not found.

Signed-off-by: Willem de Bruijn <willemb@google.com>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agobuild: additional include path required after UAPI changes
Phil Oester [Sun, 21 Jul 2013 15:30:49 +0000 (08:30 -0700)] 
build: additional include path required after UAPI changes

After kernel commit 607ca46e (UAPI: (Scripted) Disintegrate
include/linux), using the "--with-kernel" argument to build iptables
stopped working due to the missing #ifdefs in the original files.
We need to make sure the UAPI include dir is listed before the
original location. Leaving both allows support for old and new
kernels.

This fixes bug #833.

Signed-off-by: Phil Oester <kernel@linuxace.com>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agolibxt_CT: Add the "NOTRACK" alias
Jozsef Kadlecsik [Mon, 28 Jan 2013 20:32:55 +0000 (21:32 +0100)] 
libxt_CT: Add the "NOTRACK" alias

Available since Linux kernel 3.8.

Signed-off-by: Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agolibip6t_LOG: target output is different to libipt_LOG
Phil Oester [Sat, 6 Jul 2013 15:56:01 +0000 (08:56 -0700)] 
libip6t_LOG: target output is different to libipt_LOG

libipt_LOG is using the xtables_save_string func, which
escapes unsafe characters as needed. libip6t_LOG should
do the same.

Signed-off-by: Phil Oester <kernel@linuxace.com>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
11 years agolibxt_recent: restore minimum value for --seconds
Pablo Neira Ayuso [Mon, 15 Jul 2013 10:14:55 +0000 (12:14 +0200)] 
libxt_recent: restore minimum value for --seconds

This checking was accidentally removed in (74ded72 libxt_recent:
add --mask netmask).

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
12 years agoextensions: libxt_connlabel: use libnetfilter_conntrack
Florian Westphal [Mon, 15 Jul 2013 14:35:08 +0000 (16:35 +0200)] 
extensions: libxt_connlabel: use libnetfilter_conntrack

Pablo suggested to make it depend on lnf-conntrack, and get rid of
the example config file as well.

The problem is that the file must be in a fixed path,
/etc/xtables/connlabel.conf, else userspace needs to "guess-the-right-file"
when translating names to their bit values (and vice versa).

Originally "make install" did put an example file into /etc/xtables/,
but distributors complained about iptables ignoring the sysconfdir.

So rather remove the example file, the man-page explains the format,
and connlabels are inherently system-specific anyway.

Signed-off-by: Florian Westphal <fw@strlen.de>
12 years agoextensions: libipt_ULOG: man page should mention NFLOG as replacement
Florian Westphal [Fri, 12 Jul 2013 21:20:50 +0000 (23:20 +0200)] 
extensions: libipt_ULOG: man page should mention NFLOG as replacement

Signed-off-by: Florian Westphal <fw@strlen.de>
12 years agolibxt_recent: restore reap functionality to recent module
Russell Senior [Sat, 13 Jul 2013 10:08:07 +0000 (10:08 +0000)] 
libxt_recent: restore reap functionality to recent module

The reap functionality appears to have been accidentally disabled
by (74ded72 libxt_recent: add --mask netmask) since iptables 1.4.15
and later.  This adds a patch to restore reap functionality for
recent_opts_v1.

Patch obtained via: http://patchwork.openwrt.org/patch/3812/

Signed-off-by: Russell Senior <russell@personaltelco.net>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
12 years agoip{6}tables-restore: fix breakage due to new locking approach
Pablo Neira Ayuso [Mon, 8 Jul 2013 17:34:12 +0000 (19:34 +0200)] 
ip{6}tables-restore: fix breakage due to new locking approach

Since (93587a0 ip[6]tables: Add locking to prevent concurrent instances),
ip{6}tables-restore does not work anymore:

iptables-restore < x
Another app is currently holding the xtables lock. Perhaps you want to use the -w option?

do_command{6}(...) is called from ip{6}tables-restore for every iptables
command contained in the rule-set file. Thus, hitting the lock error
after the second command.

Fix it by bypassing the locking in the ip{6}tables-restore path.

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
12 years agoip6tables: don't print out /128
Phil Oester [Thu, 20 Jun 2013 20:11:38 +0000 (16:11 -0400)] 
ip6tables: don't print out /128

Similar to how iptables does not print /32 on IPv4 addresses, ip6tables
should not print out /128 on IPv6 addresses.

Signed-off-by: Phil Oester <kernel@linuxace.com>
Signed-off-by: Pablo Neira Ayuso <pablo@soleta.eu>
12 years agodoc: clarify DEBUG usage macro
Alexey Perevalov [Thu, 4 Jul 2013 07:26:17 +0000 (11:26 +0400)] 
doc: clarify DEBUG usage macro

Signed-off-by: Alexey Perevalov <a.perevalov@samsung.com>
Signed-off-by: Pablo Neira Ayuso <pablo@gnumonks.org>
12 years agoMerge branch 'stable'
Pablo Neira Ayuso [Wed, 12 Jun 2013 08:01:23 +0000 (10:01 +0200)] 
Merge branch 'stable'

Get c545933 iptables: Fix connlabel.conf install location

12 years agoiptables: Fix connlabel.conf install location
Phil Oester [Mon, 10 Jun 2013 09:35:44 +0000 (05:35 -0400)] 
iptables: Fix connlabel.conf install location

As reported by Danny Rawlins in bug #828, connlabel.conf is
unconditionally installed in /etc/xtables instead of using
prefix set at configure time. Fix to use sysconfdir variable.

This closes bugzilla #828.

Signed-off-by: Phil Oester <kernel@linuxace.com>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
12 years agoip[6]tables: Add locking to prevent concurrent instances
Phil Oester [Fri, 31 May 2013 13:07:04 +0000 (09:07 -0400)] 
ip[6]tables: Add locking to prevent concurrent instances

There have been numerous complaints and bug reports over the years when admins
attempt to run more than one instance of iptables simultaneously.  Currently
open bug reports which are related:

325: Parallel execution of the iptables is impossible
758: Retry iptables command on transient failure
764: Doing -Z twice in parallel breaks counters
822: iptables shows negative or other bad packet/byte counts

As Patrick notes in 325:  "Since this has been a problem people keep running
into, I'd suggest to simply add some locking to iptables to catch the most
common case."

I started looking into alternatives to add locking, and of course the most
common/obvious solution is to use a pidfile.  But this has various downsides,
such as if the application is terminated abnormally and the pidfile isn't
cleaned up.  And this also requires a writable filesystem.  Using a UNIX domain
socket file (e.g. in /var/run) has similar issues.

Starting in 2.2, Linux added support for abstract sockets.  These sockets
require no filesystem, and automatically disappear once the application
terminates.  This is the locking solution I chose to implement in ip[6]tables.
As an added bonus, since each network namespace has its own socket pool, an
ip[6]tables instance running in one namespace will not lock out an ip[6]tables
instance running in another namespace.  A filesystem approach would have
to recognize and handle multiple network namespaces.

Signed-off-by: Phil Oester <kernel@linuxace.com>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
12 years agoIntroduce a new revision for the set match with the counters support
Jozsef Kadlecsik [Tue, 30 Apr 2013 22:56:35 +0000 (00:56 +0200)] 
Introduce a new revision for the set match with the counters support

The revision add the support of matching the packet/byte counters
if the set was defined with the extension. Also, a new flag is
introduced to suppress updating the packet/byte counters if required.

Signed-off-by: Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>
12 years agoextensions: libxt_LOG: rename IPv4 manpage and tell about IPv6 support
Mart Frauenlob [Wed, 10 Apr 2013 06:47:32 +0000 (06:47 +0000)] 
extensions: libxt_LOG: rename IPv4 manpage and tell about IPv6 support

Signed-off-by: Mart Frauenlob <mart.frauenlob@chello.at>
Signed-off-by: Florian Westphal <fw@strlen.de>
12 years agoextensions: libxt_MASQUERADE: rename IPv4 manpage and tell about IPv6 support
Mart Frauenlob [Wed, 10 Apr 2013 06:45:08 +0000 (06:45 +0000)] 
extensions: libxt_MASQUERADE: rename IPv4 manpage and tell about IPv6 support

also update list of protocols valid for port mapping.

Signed-off-by: Mart Frauenlob <mart.frauenlob@chello.at>
Signed-off-by: Florian Westphal <fw@strlen.de>
12 years agoconfigure: display summary
Eric Leblond [Wed, 5 Jun 2013 02:16:25 +0000 (04:16 +0200)] 
configure: display summary

This patch adds a message at the end of configure which displays
the different compilation options and system settings.

An example output is the following:

Iptables Configuration:
  IPv4 support: yes
  IPv6 support: yes
  Devel support: yes
  IPQ support: no
  Large file support: yes
  BPF utils support: no

Build parameters:
  Put plugins into executable (static): no
  Support plugins via dlopen (shared): yes
  Installation prefix (--prefix): /usr/local
  Xtables extension directory: /usr/local/lib/xtables
  Pkg-config directory: /usr/local/lib/pkgconfig
  Kernel build directory: /lib/modules/custom
  Host: x86_64-unknown-linux-gnu
  GCC binary: gcc

Signed-off-by: Eric Leblond <eric@regit.org>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
12 years agoMerge branch 'stable'
Pablo Neira Ayuso [Thu, 30 May 2013 10:48:39 +0000 (12:48 +0200)] 
Merge branch 'stable'

Get fix for LED extension.

12 years agoextensions: libxt_LED: fix parsing of delay
Pablo Neira Ayuso [Thu, 30 May 2013 10:44:43 +0000 (12:44 +0200)] 
extensions: libxt_LED: fix parsing of delay

Closes bugzilla:
https://bugzilla.netfilter.org/show_bug.cgi?id=825

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
12 years agoxtables: improve get_modprobe handling
Phil Oester [Mon, 27 May 2013 06:55:11 +0000 (06:55 +0000)] 
xtables: improve get_modprobe handling

In bug #455, Dmitry V. Levin proposed a more robust get_modprobe
implementation.  The patch below is a version of his patch,
updated to apply to current git.

This closes bug #455.

Signed-off-by: Phil Oester <kernel@linuxace.com>
Signed-off-by: Pablo Neira Ayuso <pablo@soleta.eu>
12 years agoiptables: use autoconf to process .in man pages
Andy Spencer [Sun, 19 May 2013 17:01:06 +0000 (17:01 +0000)] 
iptables: use autoconf to process .in man pages

This fixes a bug in iptables.8 and ip6tables.8 where @PACKAGE_VERSION@
was not processed in the VERSION section. It also simplifies the
Makefile by avoiding some sed commands.

[ Mangled this patch to rename iptables-extensions.8.in to
  iptables-extensions.8.tmpl.in to avoid having a file whose name
  is terminated by .in.in --pablo ]

Signed-off-by: Andy Spencer <andy753421@gmail.com>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
12 years agoextensions: libxt_SNAT: rename IPv4 manpage and tell about IPv6 support
Mart Frauenlob [Wed, 10 Apr 2013 06:49:57 +0000 (06:49 +0000)] 
extensions: libxt_SNAT: rename IPv4 manpage and tell about IPv6 support

This patch renames libipt_SNAT.man to libxt_SNAT.man thus informing
about the IPv6 version.

Also the list of valid protocols for port mapping is updated to:
tcp, udp, dccp and sctp.

Signed-off-by: Mart Frauenlob <mart.frauenlob@chello.at>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
12 years agoextensions: libxt_NETMAP: rename IPv4 manpage and tell about IPv6 support
Mart Frauenlob [Wed, 10 Apr 2013 06:49:25 +0000 (06:49 +0000)] 
extensions: libxt_NETMAP: rename IPv4 manpage and tell about IPv6 support

This patch renames libipt_NETMAP.man to libxt_NETMAP.man thus informing
about the IPv6 version.

Signed-off-by: Mart Frauenlob <mart.frauenlob@chello.at>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
12 years agoextensions: libxt_REDIRECT: rename IPv4 manpage and tell about IPv6 support
Mart Frauenlob [Wed, 10 Apr 2013 06:48:49 +0000 (06:48 +0000)] 
extensions: libxt_REDIRECT: rename IPv4 manpage and tell about IPv6 support

This patch renames libipt_REDIRECT.man to libxt_REDIRECT.man thus
informing about the IPv6 version.

Also the list of valid protocols for port mapping is updated to:
tcp, udp, dccp and sctp.

Signed-off-by: Mart Frauenlob <mart.frauenlob@chello.at>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
12 years agoextensions: libxt_DNAT: rename IPv4 manpage and tell about IPv6 support
Mart Frauenlob [Wed, 10 Apr 2013 06:47:07 +0000 (06:47 +0000)] 
extensions: libxt_DNAT: rename IPv4 manpage and tell about IPv6 support

This patch renames libipt_DNAT.man to libxt_DNAT.man thus informing
about the IPv6 version, as suggested by Patrick McHardy.

Also, it updates the list of valid protocols for port mapping is
updated to: tcp, udp, dccp and sctp.

Signed-off-by: Mart Frauenlob <mart.frauenlob@chello.at>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
12 years agolibip6t_mh: Correct command to list named mh types in manpage
Mart Frauenlob [Wed, 10 Apr 2013 11:23:45 +0000 (13:23 +0200)] 
libip6t_mh: Correct command to list named mh types in manpage

Signed-off-by: Patrick McHardy <kaber@trash.net>
12 years agoextensions: add copyright statements
Patrick McHardy [Sat, 6 Apr 2013 11:41:25 +0000 (13:41 +0200)] 
extensions: add copyright statements

Add copyright statements to all extensions authored by myself.

Signed-off-by: Patrick McHardy <kaber@trash.net>
12 years agoextensions: libxt_NFQUEUE: add --queue-cpu-fanout parameter
holger@eitzenberger.org [Tue, 2 Apr 2013 00:35:39 +0000 (00:35 +0000)] 
extensions: libxt_NFQUEUE: add --queue-cpu-fanout parameter

Signed-off-by: Holger Eitzenberger <holger@eitzenberger.org>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
12 years agoiptables 1.4.19.1 release v1.4.19.1
Pablo Neira Ayuso [Wed, 29 May 2013 13:48:30 +0000 (15:48 +0200)] 
iptables 1.4.19.1 release

Unfortunately, previous release was not included two patches
that were applied by Florian recently. This release fixes it.

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
12 years agobuild: bump version to 1.4.19
Pablo Neira Ayuso [Wed, 29 May 2013 13:14:38 +0000 (15:14 +0200)] 
build: bump version to 1.4.19

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
12 years agodoc: mention SNAT in INPUT chain since kernel 2.6.36
Michael Roth [Sun, 19 May 2013 11:22:16 +0000 (13:22 +0200)] 
doc: mention SNAT in INPUT chain since kernel 2.6.36

SNAT in the INPUT chain was added Jun 2010 to the kernel
(commit c68cd6cc21eb329c47ff020ff7412bf58176984e).

Signed-off-by: Michael Roth <mail@mroth.net>
Signed-off-by: Florian Westphal <fw@strlen.de>
12 years agoRevert "extensions: add connlabel match" duplicate
Florian Westphal [Wed, 15 May 2013 21:18:02 +0000 (23:18 +0200)] 
Revert "extensions: add connlabel match" duplicate

This reverts commit ca376fcbe51b9a102a490545957d5fee69e253e1
to get rid of the duplicated install-data-hook.

This should get the tree back into the right state.

Conflicts:
Makefile.am