We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Hi. The Linux compiler has to be changed in order to be compatible with the sintax restriction arised with the new iptables. Rules like this
Are going to be compiled this way: ` $IPTABLES -A OUTPUT -p tcp -m tcp -s ! 192.0.2.2 --dport 22 -j RULE_1 $IPTABLES -A INPUT -p tcp -m tcp -s ! 192.0.2.2 --dport 22 -j RULE_1 $IPTABLES -A FORWARD -p tcp -m tcp -s ! 192.0.2.2 --dport 22 -j RULE_1
$IPTABLES -A INPUT -p tcp -m tcp -s 192.0.2.2 -d ! 10.10.0.10 --dport 23 -j RULE_2 $IPTABLES -A FORWARD -p tcp -m tcp -s 192.0.2.2 -d ! 10.10.0.10 --dport 23 -j RULE_2 `
This sintax isn't accepted by the new iptables anymore, it now needs do be stated like: ` $IPTABLES -A OUTPUT -p tcp -m tcp ! -s 192.0.2.2 --dport 22 -j RULE_1 $IPTABLES -A INPUT -p tcp -m tcp ! -s 192.0.2.2 --dport 22 -j RULE_1 $IPTABLES -A FORWARD -p tcp -m tcp ! -s 192.0.2.2 --dport 22 -j RULE_1
$IPTABLES -A INPUT -p tcp -m tcp -s 192.0.2.2 ! -d 10.10.0.10 --dport 23 -j RULE_2 $IPTABLES -A FORWARD -p tcp -m tcp -s 192.0.2.2 ! -d 10.10.0.10 --dport 23 -j RULE_2 `
I managed to fix the generated script by parsing it through this sed command: sed '{s/\-s \!/\! \-s/g;s/\-d \!/\! \-d/g;}' firewal.script
sed '{s/\-s \!/\! \-s/g;s/\-d \!/\! \-d/g;}' firewal.script
This is back compatible with old iptables version (tested with version 1.3.5)
The text was updated successfully, but these errors were encountered:
No branches or pull requests
Hi.
The Linux compiler has to be changed in order to be compatible with the sintax restriction arised with the new iptables.
Rules like this
Are going to be compiled this way:
`
$IPTABLES -A OUTPUT -p tcp -m tcp -s ! 192.0.2.2 --dport 22 -j RULE_1
$IPTABLES -A INPUT -p tcp -m tcp -s ! 192.0.2.2 --dport 22 -j RULE_1
$IPTABLES -A FORWARD -p tcp -m tcp -s ! 192.0.2.2 --dport 22 -j RULE_1
$IPTABLES -A INPUT -p tcp -m tcp -s 192.0.2.2 -d ! 10.10.0.10 --dport 23 -j RULE_2
$IPTABLES -A FORWARD -p tcp -m tcp -s 192.0.2.2 -d ! 10.10.0.10 --dport 23 -j RULE_2
`
This sintax isn't accepted by the new iptables anymore, it now needs do be stated like:
`
$IPTABLES -A OUTPUT -p tcp -m tcp ! -s 192.0.2.2 --dport 22 -j RULE_1
$IPTABLES -A INPUT -p tcp -m tcp ! -s 192.0.2.2 --dport 22 -j RULE_1
$IPTABLES -A FORWARD -p tcp -m tcp ! -s 192.0.2.2 --dport 22 -j RULE_1
$IPTABLES -A INPUT -p tcp -m tcp -s 192.0.2.2 ! -d 10.10.0.10 --dport 23 -j RULE_2
$IPTABLES -A FORWARD -p tcp -m tcp -s 192.0.2.2 ! -d 10.10.0.10 --dport 23 -j RULE_2
`
I managed to fix the generated script by parsing it through this sed command:
sed '{s/\-s \!/\! \-s/g;s/\-d \!/\! \-d/g;}' firewal.script
This is back compatible with old iptables version (tested with version 1.3.5)
The text was updated successfully, but these errors were encountered: