<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent changes to feature-requests</title><link>https://sourceforge.net/p/firehol/feature-requests/</link><description>Recent changes to feature-requests</description><atom:link href="https://sourceforge.net/p/firehol/feature-requests/feed.rss" rel="self"/><language>en</language><lastBuildDate>Mon, 02 Mar 2015 07:44:29 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/firehol/feature-requests/feed.rss" rel="self" type="application/rss+xml"/><item><title>Use https://github.com/ktsaou/firehol/issues</title><link>https://sourceforge.net/p/firehol/feature-requests/45/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Use &lt;a href="https://github.com/ktsaou/firehol/issues" rel="nofollow"&gt;https://github.com/ktsaou/firehol/issues&lt;/a&gt; for feature requests&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Phil Whineray</dc:creator><pubDate>Mon, 02 Mar 2015 07:44:29 -0000</pubDate><guid>https://sourceforge.net07329ba4a0aaacc10ec04ad501d715043d450589</guid></item><item><title>Snort integration</title><link>https://sourceforge.net/p/firehol/feature-requests/44/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Hey hey all,&lt;br /&gt;
Just first off, been trying multiple firewalls out there, not really seen anything as easy to get up and running as this&lt;/p&gt;
&lt;p&gt;AAAAAAAAnyways, onto the request&lt;/p&gt;
&lt;p&gt;Is it going to be at all possible, or it may even be alrdy in firehol, i dont know, to integrate Snort with firehol?&lt;/p&gt;
&lt;p&gt;Ive been wondering this for a while, as IMO, i think having snort integration with firehol would make it perfect&lt;/p&gt;
&lt;p&gt;Let me know what you think&lt;/p&gt;
&lt;p&gt;Nutterpc&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nutterpc</dc:creator><pubDate>Sun, 13 Feb 2011 23:02:54 -0000</pubDate><guid>https://sourceforge.nete2792f3041438c947bf3b90d6101941202aba009</guid></item><item><title>Protection against multiple restarts</title><link>https://sourceforge.net/p/firehol/feature-requests/43/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;When multiple admins are editing a firehol config and run '/etc/init.d/firehol restart', they both get a bunch of errors about existing chains etc.&lt;br /&gt;
It would be nice to have a simple protection against this.&lt;/p&gt;
&lt;p&gt;At the start, save the PID of the script and check if it already exists in the process table. If not, run a restart, else block the restart.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Anonymous</dc:creator><pubDate>Tue, 16 Mar 2010 11:02:06 -0000</pubDate><guid>https://sourceforge.net7405f2cc4b3d9830edce21d4143f16c5c2092633</guid></item><item><title> [man] list entries in alphabetical order</title><link>https://sourceforge.net/p/firehol/feature-requests/42/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Cf. &lt;a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=556575"&gt;http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=556575&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Please list entries in the major section of manual page in&lt;br /&gt;
alphabetical order for easier reading and searching:&lt;/p&gt;
&lt;p&gt;Subcommands&lt;br /&gt;
&amp;lt;alphabetical order&amp;gt;&lt;br /&gt;
Helper commands&lt;br /&gt;
&amp;lt;alphabetical order&amp;gt;&lt;br /&gt;
Optional Rule Parameters&lt;br /&gt;
&amp;lt;alphabetical order&amp;gt;&lt;br /&gt;
Actions&lt;br /&gt;
...etc&lt;br /&gt;
Optional Rule Parameters&lt;br /&gt;
...etc&lt;br /&gt;
Variables that control FireHOL&lt;br /&gt;
...etc&lt;br /&gt;
Variables that FireHOL offers&lt;br /&gt;
...etc&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jari Aalto</dc:creator><pubDate>Tue, 17 Nov 2009 08:15:57 -0000</pubDate><guid>https://sourceforge.net411a8230a6c9d92d699d1c5cc2d84960d45d325d</guid></item><item><title>nmap -A -v: please list port in numeric order</title><link>https://sourceforge.net/p/firehol/feature-requests/41/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Please list found ports in numeric order. This would be easier to inspect.&lt;/p&gt;
&lt;p&gt;$ nmap -A -v&lt;/p&gt;
&lt;p&gt;Discovered open port 80/tcp on 192.168.1.2&lt;br /&gt;
Discovered open port 111/tcp on 192.168.1.2&lt;br /&gt;
Discovered open port 139/tcp on 192.168.1.2&lt;br /&gt;
Discovered open port 445/tcp on 192.168.1.2&lt;br /&gt;
Discovered open port 22/tcp on 192.168.1.2&lt;br /&gt;
Discovered open port 21/tcp on 192.168.1.2&lt;br /&gt;
Discovered open port 993/tcp on 192.168.1.2&lt;br /&gt;
Discovered open port 443/tcp on 192.168.1.2&lt;br /&gt;
Discovered open port 143/tcp on 192.168.1.2&lt;br /&gt;
Discovered open port 2401/tcp on 192.168.1.2&lt;br /&gt;
Discovered open port 2222/tcp on 192.168.1.2&lt;br /&gt;
Discovered open port 3690/tcp on 192.168.1.2&lt;br /&gt;
Discovered open port 8001/tcp on 192.168.1.2&lt;br /&gt;
Discovered open port 2049/tcp on 192.168.1.2&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jari Aalto</dc:creator><pubDate>Fri, 06 Nov 2009 18:56:52 -0000</pubDate><guid>https://sourceforge.netd145657cf562fcc94956ac8db1938f517ef9478d</guid></item><item><title>Starting firehol with unreachable host</title><link>https://sourceforge.net/p/firehol/feature-requests/40/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;I'm running firehol on a couple of servers and it's really nice! I have a fairly big onfig file with 30 or so hosts. But sometimes a host isn't reachable. Then when I restart firehol it fails with an error. For example:&lt;/p&gt;
&lt;p&gt;--------------------------------------------------------------------------------&lt;br /&gt;
ERROR   : # 12.&lt;br /&gt;
WHAT    : A runtime command failed to execute (returned error 2).&lt;br /&gt;
SOURCE  : line INIT of /etc/firehol/firehol.conf&lt;br /&gt;
COMMAND : /sbin/iptables -t filter -A in_world_ssh_c13 -p tcp -s www.crmexcellence.nl --sport 22 --dport 32768:61000 -m state --state ESTABLISHED -j ACCEPT &lt;br /&gt;
OUTPUT  : &lt;/p&gt;
&lt;p&gt;I thought about making a wrapper script that checks the hosts, but it would be nice if firehol did this.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">LeonB</dc:creator><pubDate>Sun, 29 Jun 2008 21:48:57 -0000</pubDate><guid>https://sourceforge.netb51e82078504ace355eab196e34cb1f5f8ecc24f</guid></item><item><title>Support for SANE scanner service</title><link>https://sourceforge.net/p/firehol/feature-requests/39/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Hi Kostas,&lt;/p&gt;
&lt;p&gt;please could you add support for the SANE sevice used to connect to remote flatbed scanners via LAN?&lt;/p&gt;
&lt;p&gt;The protocol listens to tcp/6566 and a port above 1024, much like FTP. Latest releases of Linux include a connection tracking helper module named NF_CONNTRACK_SANE, thus support should be a breeze to add in the next release.&lt;/p&gt;
&lt;p&gt;Thanks,&lt;/p&gt;
&lt;p&gt;Stefano&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">JoJo</dc:creator><pubDate>Tue, 19 Feb 2008 15:15:35 -0000</pubDate><guid>https://sourceforge.net51a477f59569739d6a5ceef7b15359f2ab5de90a</guid></item><item><title>IPSEC + L2TP</title><link>https://sourceforge.net/p/firehol/feature-requests/38/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Hello!&lt;br /&gt;
Sorry for my bad english!&lt;br /&gt;
For IPSec VPN i need to add&lt;/p&gt;
&lt;p&gt;# for IPSec NAT-Traversal&lt;br /&gt;
server_natt_ports="udp/4500"&lt;br /&gt;
client_natt_ports="any"&lt;br /&gt;
(more routers they apply port address translation)&lt;br /&gt;
#L2TP&lt;br /&gt;
server_l2tp_ports="udp/1701"&lt;br /&gt;
client_l2tp_ports="any"&lt;br /&gt;
(Windows 98, Mac OSX use random client port :&lt;br /&gt;
XP use fixed client port 1701 )&lt;/p&gt;
&lt;p&gt;to firehol.conf&lt;br /&gt;
and change&lt;/p&gt;
&lt;p&gt;client_isakmp_ports="500"&lt;/p&gt;
&lt;p&gt;to&lt;/p&gt;
&lt;p&gt;client_isakmp_ports="any"&lt;br /&gt;
(more router they apply port address translation)&lt;/p&gt;
&lt;p&gt;in firehol.sh.&lt;/p&gt;
&lt;p&gt;Is it possible include these in firehol.sh ?&lt;/p&gt;
&lt;p&gt;Thanks!&lt;/p&gt;
&lt;p&gt;Stefano&lt;/p&gt;
&lt;p&gt;P.S.: sorry for repost. But "feature requests" is more adapted.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Stefano</dc:creator><pubDate>Thu, 16 Aug 2007 09:05:07 -0000</pubDate><guid>https://sourceforge.net825d0d9400f1e8c8a4a10bbc8d0482417ead6415</guid></item><item><title>Protection Rule</title><link>https://sourceforge.net/p/firehol/feature-requests/37/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Hi, &lt;/p&gt;
&lt;p&gt;I see that protection rules are applied in such a way that INVALID packets are dropped even before them being identified as bad-packets (xmas, NULL,etc). &lt;/p&gt;
&lt;p&gt;Shouldn't the bad-packets being tracked before? &lt;/p&gt;
&lt;p&gt;Therefore, INVALID chain should appear at the bottom. &lt;/p&gt;
&lt;p&gt;i.e. after "fragments new-tcp-w/o-syn icmp-floods syn-floods malformed-xmas malformed-null malformed-bad" &lt;/p&gt;
&lt;p&gt;Please correct me if I'm wrong? &lt;/p&gt;
&lt;p&gt;With the current default firehol settings, I see no hits on chains for malformed-* packets. &lt;/p&gt;
&lt;p&gt;Thanks in advance. &lt;/p&gt;
&lt;p&gt;fiu. &lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">fireholuser</dc:creator><pubDate>Sun, 12 Aug 2007 20:37:28 -0000</pubDate><guid>https://sourceforge.net2606813406c6f6ffe8f36bdeae23829c96b4df22</guid></item><item><title>IPtables -Bad packets</title><link>https://sourceforge.net/p/firehol/feature-requests/36/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Hi, &lt;/p&gt;
&lt;p&gt;Shouldn't tcp flags be "FIN,PSH,URG FIN,PSH,URG" instead of "ALL ALL" ? &lt;/p&gt;
&lt;p&gt;####### &lt;/p&gt;
&lt;p&gt;malformed-xmas|MALFORMED-XMAS) &lt;br /&gt;
local mychain="${pre}_${work_name}_malxmas" &lt;br /&gt;
create_chain filter "${mychain}" "${in}_${work_name}" in proto tcp custom "--tcp-flags ALL ALL" || return 1 &lt;/p&gt;
&lt;p&gt;####### &lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">fireholuser</dc:creator><pubDate>Sun, 12 Aug 2007 20:27:27 -0000</pubDate><guid>https://sourceforge.net9648ff29ccf06d5ea14798c0eed4c1561d411827</guid></item></channel></rss>