From 31685bd4541dfc17ef908e53682e103c2717c474 Mon Sep 17 00:00:00 2001 From: bbruns Date: Fri, 18 Feb 2011 17:58:02 +0000 Subject: [PATCH] Updated changelog, typo, and slight formatting error --- ChangeLog | 1 + bin/firewall-sosdg | 2 +- conf/ipv4-intercept.default | 2 +- 3 files changed, 3 insertions(+), 2 deletions(-) diff --git a/ChangeLog b/ChangeLog index 72c7296..052a53e 100644 --- a/ChangeLog +++ b/ChangeLog @@ -2,6 +2,7 @@ - Change IPV6_ROUTEDCLIENTBLOCK so you can specify ranges to block incoming to. - Add support for allowing IPV6 critical ICMP messages, on by default + - Add support for interception of IPv4 packets, aka transparent proxy 0.9.11 - Brielle Bruns - Move some of the config clutter to conf/ - you can diff --git a/bin/firewall-sosdg b/bin/firewall-sosdg index 4534d1d..8d895ba 100755 --- a/bin/firewall-sosdg +++ b/bin/firewall-sosdg @@ -449,7 +449,7 @@ if [ "$ALLOWEDPROTO" ]; then fi if [ "$IPV4_INTERCEPT" ]; then - display_c YELLOW "Adding packet interception rules: " N + display_c YELLOW "Adding packet interception rules: " for i in `grep -v "\#" $IPV4_INTERCEPT`; do IFS_OLD=${IFS};IFS=\| INTERCEPTADD=($i) diff --git a/conf/ipv4-intercept.default b/conf/ipv4-intercept.default index 7f96d99..7a801e0 100644 --- a/conf/ipv4-intercept.default +++ b/conf/ipv4-intercept.default @@ -3,5 +3,5 @@ # incoming-interface|src-range|dst-range|proto|port|proxy # Use ! before IP/range to negate, and put BYPASS in as proxy # want to put in a bypass rule -# eth1|192.168.0.0/24|192.168.1.0/24|tcp|80|192.16.1.1:3128 +# eth1|192.168.0.0/24|192.168.1.0/24|tcp|80|192.168.1.1:3128 # ORDER MATTERS!