On Wed, Dec 26, 2007 at 11:03:59PM -0500, Roberto C. Sánchez wrote:
> Sam,
> 
> I was looking into this and I cannot reproduce it.  Here is what I see
> on a freshly booted machine running Shorewall 4.0.6 with
> DISABLE_IPV6=yes:
> 
> ip6tables --list
> Chain INPUT (policy DROP)
> target     prot opt source               destination
> ACCEPT     0        anywhere             anywhere
> 
> Chain FORWARD (policy DROP)
> target     prot opt source               destination
> 
> Chain OUTPUT (policy DROP)
> target     prot opt source               destination
> ACCEPT     0        anywhere             anywhere
> 
> So, I am left scratching my head.  The policies are now DROP instead of
> accept.  However, the source/destination are anywhere.  Of course, a
> shorewall dump does not show anything called anywhere.  So, I am not
> sure if this some ip6tables shorthand or if it is bogus.  If the former,
> I am inclined to think that it is wide-open on IPv6.  If the latter, I
> am inclined to think that nothing is going to get through.
> 
> The kicker is that a 'shorewall restart' does not change anything.
> 
Sam,

I have a bit more information on this.  Basically, the problem is
related to a bug reported in redhat [0].  It turns out that shorewall
loads nf_nat_h323, which loads nf_conntrack_h323, which loads ipv6.
According to that last message posted in the redhat bugzilla, the
problem was fixed by the netfilter team upstream.  Based on that, I do
not think that this bug is really a bug in shorewall.  Thus, I am
inclined to close it.  If you have an objection, please let me know.  If
I do not receive an objection in the near future, I will go ahead and
close this bug.

Regards,

-Roberto

[0] https://bugzilla.redhat.com/show_bug.cgi?id=375581
[1] http://marc.info/?l=netfilter-devel&m=119676981314842&w=4

-- 
Roberto C. Sánchez
http://people.connexer.com/~roberto
http://www.connexer.com

Attachment: signature.asc
Description: Digital signature

Reply via email to