diff --git a/bin/firewall-sosdg b/bin/firewall-sosdg index 5b7988d..2e4d215 100755 --- a/bin/firewall-sosdg +++ b/bin/firewall-sosdg @@ -241,22 +241,12 @@ if [ "$BLOCKTCPPORTS" ] || [ "$BLOCKUDPPORTS" ]; then for i in $BLOCKTCPPORTS; do echo -en "${PURPLE}TCP${DEFAULT_COLOR}/${GREEN}$i " $IPTABLES -A OUTPUT -p tcp --dport $i --syn -j DROP - #if [ "$NATRANGE" ]; then - # for src in $NATRANGE; do - # $IPTABLES -A FORWARD -p tcp -s $src --dport $i --syn -j DROP - # done - #fi done fi if [ "$BLOCKUDPPORTS" ]; then for i in $BLOCKUDPPORTS; do echo -en "${BLUE}UDP${DEFAULT_COLOR}/${GREEN}$i " $IPTABLES -A OUTPUT -p udp --dport $i -j DROP - #if [ "$NATRANGE" ]; then - # for src in $NATRANGE; do - # $IPTABLES -A FORWARD -p udp -s $src --dport $i -j DROP - # done - #fi done fi reset_color @@ -479,23 +469,6 @@ if [ $NAT ]; then done reset_color fi - #================= - # This section is going away in 1.0 - if [ "$NATRANGE" ]; then - echo -e "${RED} **** WARNING ****" - echo -e "${RED} NATRANGE option detected. Please switch to using" - echo -e "${RED} NAT_RANGE which uses the newer style NAT mappings." - echo -e "${RED} NATRANGE will be removed in v1.0" - for i in $NATRANGE; do - $IPTABLES -A POSTROUTING -t nat -s $i -o $NATEXTIF -j SNAT --to-source $NATEXTIP - done - #This is necessary to make sure that PMTU works - $IPTABLES -A OUTPUT -p icmp --icmp-type time-exceeded -o $NATEXTIF \ - -j ACCEPT - $IPTABLES -A OUTPUT -p icmp --icmp-type fragmentation-needed \ - -o $NATEXTIF -j ACCEPT - #================= - fi fi $IPTABLES --policy INPUT ACCEPT diff --git a/options.default b/options.default index 7a370c4..c5f2b47 100755 --- a/options.default +++ b/options.default @@ -82,15 +82,6 @@ IPv4_MARK=$BASEDIR/ipv4-marks # HACK_IPV4="NS-IN-DDOS" -#============== -# Obsolete - DO NOT USE ANYMORE. Will be removed in 1.0 -# IP ranges(s) to NAT using SNAT. -#NATRANGE="192.168.1.0/24" -# External IP and interface for SNAT -#NATEXTIP="172.16.1.1" -#NATEXTIF="eth0" -#============== - # IP NAT Rules # SNAT:::: # MASQ:::