Bug#318946: User expectations and shorewall

2005-09-16 Thread Lorenzo Martignoni
* Martin Schulze <[EMAIL PROTECTED]>: > Florian Weimer wrote: > > >> (Note that I have yet to test Lorenzo's new package.) > > > > > > Are you in a position to do so? > > > > Sure, but the question is if you want to rely on the results. You > > don't seem to trust my judgement on this matter, fo

Bug#318946: User expectations and shorewall

2005-09-06 Thread Lorenzo Martignoni
* Florian Weimer <[EMAIL PROTECTED]>: > * Lorenzo Martignoni: > > > The patch has been tested by me and by Paul Gear but further tests will > > be better, so your feedback will be very precious. > > Apart from the lack of CVE entry in the changelog, the pac

Bug#318946: User expectations and shorewall

2005-09-02 Thread Lorenzo Martignoni
* Florian Weimer <[EMAIL PROTECTED]>: > * Martin Schulze: > > >> > What was the behaviour pre-sarge? > >> > What is the behaviour post-sarge (or rather in sarge)? > >> > >> Do you mean "before and after the upstream security update"? The > >> terms pre-sarge/post-sarge do not make much sense to

Bug#318946: User expectations and shorewall

2005-09-01 Thread Lorenzo Martignoni
* Florian Weimer <[EMAIL PROTECTED]>: > * Martin Schulze: > > > What was the behaviour pre-sarge? > > What is the behaviour post-sarge (or rather in sarge)? > > Do you mean "before and after the upstream security update"? The > terms pre-sarge/post-sarge do not make much sense to me in this > c

Bug#318946: more information on the bug

2005-09-01 Thread Lorenzo Martignoni
The bug affects Shorewall 2.2.x and 2.4.x but the only affected Debian package is shorewall_2.2.3-1 which is currently in Sarge. The problem with this bug is that clients which mac addresses are known can bypass the firewall rules and do whatever they want: if MACLIST_DISPOSITION is set to ACCEPT

Bug#318946: shorewall: A client accepted by MAC address filtering to bypass any other rule

2005-07-18 Thread Lorenzo Martignoni
Package: shorewall Version: 2.4.1-2 Severity: critical Tags: security A client accepted by MAC address filtering can bypass any other rule. If MACLIST_TTL is set to a value greater than 0 or MACLIST_DISPOSITION is set to "ACCEPT" in /etc/shorewall/shorewall.conf (default is MACLIST_TTL=0 and MACLI