Browse Source

Updated changelog, typo, and slight formatting error

master
bbruns 11 years ago
parent
commit
31685bd454
  1. 1
      ChangeLog
  2. 2
      bin/firewall-sosdg
  3. 2
      conf/ipv4-intercept.default

1
ChangeLog

@ -2,6 +2,7 @@
- Change IPV6_ROUTEDCLIENTBLOCK so you can specify ranges to
block incoming to.
- Add support for allowing IPV6 critical ICMP messages, on by default
- Add support for interception of IPv4 packets, aka transparent proxy
0.9.11 - Brielle Bruns <bruns@2mbit.com>
- Move some of the config clutter to conf/ - you can

2
bin/firewall-sosdg

@ -449,7 +449,7 @@ if [ "$ALLOWEDPROTO" ]; then
fi
if [ "$IPV4_INTERCEPT" ]; then
display_c YELLOW "Adding packet interception rules: " N
display_c YELLOW "Adding packet interception rules: "
for i in `grep -v "\#" $IPV4_INTERCEPT`; do
IFS_OLD=${IFS};IFS=\|
INTERCEPTADD=($i)

2
conf/ipv4-intercept.default

@ -3,5 +3,5 @@
# incoming-interface|src-range|dst-range|proto|port|proxy
# Use ! before IP/range to negate, and put BYPASS in as proxy
# want to put in a bypass rule
# eth1|192.168.0.0/24|192.168.1.0/24|tcp|80|192.16.1.1:3128
# eth1|192.168.0.0/24|192.168.1.0/24|tcp|80|192.168.1.1:3128
# ORDER MATTERS!

Loading…
Cancel
Save