<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en" xmlns="http://www.w3.org/2005/Atom"><title>Recent changes to feature-requests</title><link href="https://sourceforge.net/p/firehol/feature-requests/" rel="alternate"/><link href="https://sourceforge.net/p/firehol/feature-requests/feed.atom" rel="self"/><id>https://sourceforge.net/p/firehol/feature-requests/</id><updated>2015-03-02T07:44:29.633000Z</updated><subtitle>Recent changes to feature-requests</subtitle><entry><title>Use https://github.com/ktsaou/firehol/issues</title><link href="https://sourceforge.net/p/firehol/feature-requests/45/" rel="alternate"/><published>2015-03-02T07:44:29.633000Z</published><updated>2015-03-02T07:44:29.633000Z</updated><author><name>Phil Whineray</name><uri>https://sourceforge.net/u/philwhineray/</uri></author><id>https://sourceforge.net07329ba4a0aaacc10ec04ad501d715043d450589</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;Use &lt;a href="https://github.com/ktsaou/firehol/issues" rel="nofollow"&gt;https://github.com/ktsaou/firehol/issues&lt;/a&gt; for feature requests&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>Snort integration</title><link href="https://sourceforge.net/p/firehol/feature-requests/44/" rel="alternate"/><published>2011-02-13T23:02:54Z</published><updated>2011-02-13T23:02:54Z</updated><author><name>Nutterpc</name><uri>https://sourceforge.net/u/nutterpc/</uri></author><id>https://sourceforge.nete2792f3041438c947bf3b90d6101941202aba009</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;Hey hey all,&lt;br /&gt;
Just first off, been trying multiple firewalls out there, not really seen anything as easy to get up and running as this&lt;/p&gt;
&lt;p&gt;AAAAAAAAnyways, onto the request&lt;/p&gt;
&lt;p&gt;Is it going to be at all possible, or it may even be alrdy in firehol, i dont know, to integrate Snort with firehol?&lt;/p&gt;
&lt;p&gt;Ive been wondering this for a while, as IMO, i think having snort integration with firehol would make it perfect&lt;/p&gt;
&lt;p&gt;Let me know what you think&lt;/p&gt;
&lt;p&gt;Nutterpc&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>Protection against multiple restarts</title><link href="https://sourceforge.net/p/firehol/feature-requests/43/" rel="alternate"/><published>2010-03-16T11:02:06Z</published><updated>2010-03-16T11:02:06Z</updated><author><name>Anonymous</name><uri>https://sourceforge.net/u/userid-None/</uri></author><id>https://sourceforge.net7405f2cc4b3d9830edce21d4143f16c5c2092633</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;When multiple admins are editing a firehol config and run '/etc/init.d/firehol restart', they both get a bunch of errors about existing chains etc.&lt;br /&gt;
It would be nice to have a simple protection against this.&lt;/p&gt;
&lt;p&gt;At the start, save the PID of the script and check if it already exists in the process table. If not, run a restart, else block the restart.&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title> [man] list entries in alphabetical order</title><link href="https://sourceforge.net/p/firehol/feature-requests/42/" rel="alternate"/><published>2009-11-17T08:15:57Z</published><updated>2009-11-17T08:15:57Z</updated><author><name>Jari Aalto</name><uri>https://sourceforge.net/u/jaalto/</uri></author><id>https://sourceforge.net411a8230a6c9d92d699d1c5cc2d84960d45d325d</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;Cf. &lt;a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=556575"&gt;http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=556575&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Please list entries in the major section of manual page in&lt;br /&gt;
alphabetical order for easier reading and searching:&lt;/p&gt;
&lt;p&gt;Subcommands&lt;br /&gt;
&amp;lt;alphabetical order&amp;gt;&lt;br /&gt;
Helper commands&lt;br /&gt;
&amp;lt;alphabetical order&amp;gt;&lt;br /&gt;
Optional Rule Parameters&lt;br /&gt;
&amp;lt;alphabetical order&amp;gt;&lt;br /&gt;
Actions&lt;br /&gt;
...etc&lt;br /&gt;
Optional Rule Parameters&lt;br /&gt;
...etc&lt;br /&gt;
Variables that control FireHOL&lt;br /&gt;
...etc&lt;br /&gt;
Variables that FireHOL offers&lt;br /&gt;
...etc&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>nmap -A -v: please list port in numeric order</title><link href="https://sourceforge.net/p/firehol/feature-requests/41/" rel="alternate"/><published>2009-11-06T18:56:52Z</published><updated>2009-11-06T18:56:52Z</updated><author><name>Jari Aalto</name><uri>https://sourceforge.net/u/jaalto/</uri></author><id>https://sourceforge.netd145657cf562fcc94956ac8db1938f517ef9478d</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;Please list found ports in numeric order. This would be easier to inspect.&lt;/p&gt;
&lt;p&gt;$ nmap -A -v&lt;/p&gt;
&lt;p&gt;Discovered open port 80/tcp on 192.168.1.2&lt;br /&gt;
Discovered open port 111/tcp on 192.168.1.2&lt;br /&gt;
Discovered open port 139/tcp on 192.168.1.2&lt;br /&gt;
Discovered open port 445/tcp on 192.168.1.2&lt;br /&gt;
Discovered open port 22/tcp on 192.168.1.2&lt;br /&gt;
Discovered open port 21/tcp on 192.168.1.2&lt;br /&gt;
Discovered open port 993/tcp on 192.168.1.2&lt;br /&gt;
Discovered open port 443/tcp on 192.168.1.2&lt;br /&gt;
Discovered open port 143/tcp on 192.168.1.2&lt;br /&gt;
Discovered open port 2401/tcp on 192.168.1.2&lt;br /&gt;
Discovered open port 2222/tcp on 192.168.1.2&lt;br /&gt;
Discovered open port 3690/tcp on 192.168.1.2&lt;br /&gt;
Discovered open port 8001/tcp on 192.168.1.2&lt;br /&gt;
Discovered open port 2049/tcp on 192.168.1.2&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>Starting firehol with unreachable host</title><link href="https://sourceforge.net/p/firehol/feature-requests/40/" rel="alternate"/><published>2008-06-29T21:48:57Z</published><updated>2008-06-29T21:48:57Z</updated><author><name>LeonB</name><uri>https://sourceforge.net/u/userid-1861448/</uri></author><id>https://sourceforge.netb51e82078504ace355eab196e34cb1f5f8ecc24f</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;I'm running firehol on a couple of servers and it's really nice! I have a fairly big onfig file with 30 or so hosts. But sometimes a host isn't reachable. Then when I restart firehol it fails with an error. For example:&lt;/p&gt;
&lt;p&gt;--------------------------------------------------------------------------------&lt;br /&gt;
ERROR   : # 12.&lt;br /&gt;
WHAT    : A runtime command failed to execute (returned error 2).&lt;br /&gt;
SOURCE  : line INIT of /etc/firehol/firehol.conf&lt;br /&gt;
COMMAND : /sbin/iptables -t filter -A in_world_ssh_c13 -p tcp -s www.crmexcellence.nl --sport 22 --dport 32768:61000 -m state --state ESTABLISHED -j ACCEPT &lt;br /&gt;
OUTPUT  : &lt;/p&gt;
&lt;p&gt;I thought about making a wrapper script that checks the hosts, but it would be nice if firehol did this.&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>Support for SANE scanner service</title><link href="https://sourceforge.net/p/firehol/feature-requests/39/" rel="alternate"/><published>2008-02-19T15:15:35Z</published><updated>2008-02-19T15:15:35Z</updated><author><name>JoJo</name><uri>https://sourceforge.net/u/stefanopriore/</uri></author><id>https://sourceforge.net51a477f59569739d6a5ceef7b15359f2ab5de90a</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;Hi Kostas,&lt;/p&gt;
&lt;p&gt;please could you add support for the SANE sevice used to connect to remote flatbed scanners via LAN?&lt;/p&gt;
&lt;p&gt;The protocol listens to tcp/6566 and a port above 1024, much like FTP. Latest releases of Linux include a connection tracking helper module named NF_CONNTRACK_SANE, thus support should be a breeze to add in the next release.&lt;/p&gt;
&lt;p&gt;Thanks,&lt;/p&gt;
&lt;p&gt;Stefano&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>IPSEC + L2TP</title><link href="https://sourceforge.net/p/firehol/feature-requests/38/" rel="alternate"/><published>2007-08-16T09:05:07Z</published><updated>2007-08-16T09:05:07Z</updated><author><name>Stefano</name><uri>https://sourceforge.net/u/pciccio/</uri></author><id>https://sourceforge.net825d0d9400f1e8c8a4a10bbc8d0482417ead6415</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;Hello!&lt;br /&gt;
Sorry for my bad english!&lt;br /&gt;
For IPSec VPN i need to add&lt;/p&gt;
&lt;p&gt;# for IPSec NAT-Traversal&lt;br /&gt;
server_natt_ports="udp/4500"&lt;br /&gt;
client_natt_ports="any"&lt;br /&gt;
(more routers they apply port address translation)&lt;br /&gt;
#L2TP&lt;br /&gt;
server_l2tp_ports="udp/1701"&lt;br /&gt;
client_l2tp_ports="any"&lt;br /&gt;
(Windows 98, Mac OSX use random client port :&lt;br /&gt;
XP use fixed client port 1701 )&lt;/p&gt;
&lt;p&gt;to firehol.conf&lt;br /&gt;
and change&lt;/p&gt;
&lt;p&gt;client_isakmp_ports="500"&lt;/p&gt;
&lt;p&gt;to&lt;/p&gt;
&lt;p&gt;client_isakmp_ports="any"&lt;br /&gt;
(more router they apply port address translation)&lt;/p&gt;
&lt;p&gt;in firehol.sh.&lt;/p&gt;
&lt;p&gt;Is it possible include these in firehol.sh ?&lt;/p&gt;
&lt;p&gt;Thanks!&lt;/p&gt;
&lt;p&gt;Stefano&lt;/p&gt;
&lt;p&gt;P.S.: sorry for repost. But "feature requests" is more adapted.&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>Protection Rule</title><link href="https://sourceforge.net/p/firehol/feature-requests/37/" rel="alternate"/><published>2007-08-12T20:37:28Z</published><updated>2007-08-12T20:37:28Z</updated><author><name>fireholuser</name><uri>https://sourceforge.net/u/fireholuser/</uri></author><id>https://sourceforge.net2606813406c6f6ffe8f36bdeae23829c96b4df22</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;Hi, &lt;/p&gt;
&lt;p&gt;I see that protection rules are applied in such a way that INVALID packets are dropped even before them being identified as bad-packets (xmas, NULL,etc). &lt;/p&gt;
&lt;p&gt;Shouldn't the bad-packets being tracked before? &lt;/p&gt;
&lt;p&gt;Therefore, INVALID chain should appear at the bottom. &lt;/p&gt;
&lt;p&gt;i.e. after "fragments new-tcp-w/o-syn icmp-floods syn-floods malformed-xmas malformed-null malformed-bad" &lt;/p&gt;
&lt;p&gt;Please correct me if I'm wrong? &lt;/p&gt;
&lt;p&gt;With the current default firehol settings, I see no hits on chains for malformed-* packets. &lt;/p&gt;
&lt;p&gt;Thanks in advance. &lt;/p&gt;
&lt;p&gt;fiu. &lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>IPtables -Bad packets</title><link href="https://sourceforge.net/p/firehol/feature-requests/36/" rel="alternate"/><published>2007-08-12T20:27:27Z</published><updated>2007-08-12T20:27:27Z</updated><author><name>fireholuser</name><uri>https://sourceforge.net/u/fireholuser/</uri></author><id>https://sourceforge.net9648ff29ccf06d5ea14798c0eed4c1561d411827</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;Hi, &lt;/p&gt;
&lt;p&gt;Shouldn't tcp flags be "FIN,PSH,URG FIN,PSH,URG" instead of "ALL ALL" ? &lt;/p&gt;
&lt;p&gt;####### &lt;/p&gt;
&lt;p&gt;malformed-xmas|MALFORMED-XMAS) &lt;br /&gt;
local mychain="${pre}_${work_name}_malxmas" &lt;br /&gt;
create_chain filter "${mychain}" "${in}_${work_name}" in proto tcp custom "--tcp-flags ALL ALL" || return 1 &lt;/p&gt;
&lt;p&gt;####### &lt;/p&gt;&lt;/div&gt;</summary></entry></feed>