+-----BEGIN PGP SIGNED MESSAGE-----
+Hash: SHA1
+
AUX 1.3.1-files/grsecurity-1.2.8-iptables.patch-1.3.1 1315 RMD160 3665aaa6788261f16372c1e34810fe99fd60453c SHA1 b3c88dc5ceebc15aca73fcc02afdf8d0fa6a389f SHA256 f86e32f84af0e68b927b712a60e5d02d1bc27972537f476c71a311711fdcfc12
MD5 319d0b089a495ce1ab8ca02b3820dfe3 files/1.3.1-files/grsecurity-1.2.8-iptables.patch-1.3.1 1315
RMD160 3665aaa6788261f16372c1e34810fe99fd60453c files/1.3.1-files/grsecurity-1.2.8-iptables.patch-1.3.1 1315
MD5 956ebf5ab69e5a1e1d3983541eab643b files/iptables-1.3.2.confd 290
RMD160 cb180068f86a608b16d850635ae909ea7b9cc059 files/iptables-1.3.2.confd 290
SHA256 351e123ba9e0ec7db2bcff42849aa627d29a3b2e77a47b82386f5e3a7e21bd30 files/iptables-1.3.2.confd 290
-AUX iptables-1.3.2.init 2629 RMD160 9db2d7c479684cbc332ca3703c760810dc330326 SHA1 4c1e4aac41ce85d926dccd8f4c379b4d6ae58f02 SHA256 c9f41457b3331a99cd8e92139713207aff263602eaf8c0ada5474b7dd9ed4c55
-MD5 711e98fe93ceea9013d6efbaeb168859 files/iptables-1.3.2.init 2629
-RMD160 9db2d7c479684cbc332ca3703c760810dc330326 files/iptables-1.3.2.init 2629
-SHA256 c9f41457b3331a99cd8e92139713207aff263602eaf8c0ada5474b7dd9ed4c55 files/iptables-1.3.2.init 2629
+AUX iptables-1.3.2.init 2570 RMD160 84d06807fae0455009476cfa63dfcda9fe016dc3 SHA1 da7c4fca4049c4d3f45e32d29403c8bb05047f15 SHA256 1137517483c0d312e3d396d953e9ee197b84f64ed17adfd48f25dbb60e114697
+MD5 2202ac150a5dfe32a8363b0ad565ee1d files/iptables-1.3.2.init 2570
+RMD160 84d06807fae0455009476cfa63dfcda9fe016dc3 files/iptables-1.3.2.init 2570
+SHA256 1137517483c0d312e3d396d953e9ee197b84f64ed17adfd48f25dbb60e114697 files/iptables-1.3.2.init 2570
AUX iptables-1.3.7-more-exact-check-grep.patch 602 RMD160 80c80f9d2a2567b164932adc1e9ddb1392b34791 SHA1 5bb693f7ddc641b793334d072b106ab998f4202e SHA256 aa26f352dc2b870363b7de1586105a4bf19eb9a6c6703a23f64ef9656017021d
MD5 0b0e12c269db9fd7c8e9835f0a9fd3fa files/iptables-1.3.7-more-exact-check-grep.patch 602
RMD160 80c80f9d2a2567b164932adc1e9ddb1392b34791 files/iptables-1.3.7-more-exact-check-grep.patch 602
MD5 1f40726055a119edf736bd7c7b5620e7 files/digest-iptables-1.3.7 759
RMD160 ee6a5537941ce5689ee0ef7e302b990a0222142c files/digest-iptables-1.3.7 759
SHA256 7d47914b31c063817423c4f38b8f047f2f9094f749991b37e12b3987f644d990 files/digest-iptables-1.3.7 759
+-----BEGIN PGP SIGNATURE-----
+Version: GnuPG v2.0.3 (GNU/Linux)
+
+iD8DBQFF9crY8bi6rjpTunYRAjI+AJwLSxiy4ic5s3X7z+cqAS+LFnwrQgCgjnHP
+Xf95b72aoCUWfZTRkacI3b4=
+=etVK
+-----END PGP SIGNATURE-----
#!/sbin/runscript
-# Copyright 1999-2005 Gentoo Foundation
+# Copyright 1999-2007 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/net-firewall/iptables/files/iptables-1.3.2.init,v 1.5 2007/03/10 23:04:51 uberlord Exp $
+# $Header: /var/cvsroot/gentoo-x86/net-firewall/iptables/files/iptables-1.3.2.init,v 1.6 2007/03/12 21:49:04 vapier Exp $
opts="save reload panic"
fi
iptables_bin="/sbin/${iptables_name}"
-case "${iptables_name}" in
+case ${iptables_name} in
iptables) iptables_proc="/proc/net/ip_tables_names"
iptables_save=${IPTABLES_SAVE};;
ip6tables) iptables_proc="/proc/net/ip6_tables_names"
set_table_policy() {
local chains table=$1 policy=$2
- case "${table}" in
+ case ${table} in
nat) chains="PREROUTING POSTROUTING OUTPUT";;
mangle) chains="PREROUTING INPUT FORWARD OUTPUT POSTROUTING";;
filter) chains="INPUT FORWARD OUTPUT";;
esac
local chain
for chain in ${chains} ; do
- "${iptables_bin}" -t "${table}" -P "${chain}" "${policy}"
+ ${iptables_bin} -t ${table} -P ${chain} ${policy}
done
}
checkkernel() {
- if [ ! -e "${iptables_proc}" ] ; then
+ if [ ! -e ${iptables_proc} ] ; then
eerror "Your kernel lacks ${iptables_name} support, please load"
eerror "appropriate modules and try again."
return 1
return 0
}
checkconfig() {
- if [ ! -f "${iptables_save}" ] ; then
+ if [ ! -f ${iptables_save} ] ; then
eerror "Not starting ${iptables_name}. First create some rules then run:"
eerror "/etc/init.d/${iptables_name} save"
return 1
start() {
checkconfig || return 1
ebegin "Loading ${iptables_name} state and starting firewall"
- "${iptables_bin}"-restore ${SAVE_RESTORE_OPTIONS} < "${iptables_save}"
+ ${iptables_bin}-restore ${SAVE_RESTORE_OPTIONS} < "${iptables_save}"
eend $?
}
fi
checkkernel || return 1
ebegin "Stopping firewall"
- local a=
- for a in $(cat "${iptables_proc}") ; do
+ local a
+ for a in $(cat ${iptables_proc}) ; do
set_table_policy $a ACCEPT
- "${iptables_bin}" -F -t "$a"
- "${iptables_bin}" -X -t "$a"
+ ${iptables_bin} -F -t $a
+ ${iptables_bin} -X -t $a
done
eend $?
}
reload() {
checkkernel || return 1
ebegin "Flushing firewall"
- local a=
- for a in $(cat "${iptables_proc}") ; do
- "${iptables_bin}" -F -t "$a"
- "${iptables_bin}" -X -t "$a"
+ local a
+ for a in $(cat ${iptables_proc}) ; do
+ ${iptables_bin} -F -t $a
+ ${iptables_bin} -X -t $a
done
eend $?
ebegin "Saving ${iptables_name} state"
touch "${iptables_save}"
chmod 0600 "${iptables_save}"
- "${iptables_bin}"-save ${SAVE_RESTORE_OPTIONS} > "${iptables_save}"
+ ${iptables_bin}-save ${SAVE_RESTORE_OPTIONS} > "${iptables_save}"
eend $?
}
panic() {
checkkernel || return 1
- service_started "${iptables_name}" && svc_stop
+ service_started ${iptables_name} && svc_stop
- local a=
+ local a
ebegin "Dropping all packets"
- for a in $(cat "${iptables_proc}") ; do
- "${iptables_bin}" -F -t "$a"
- "${iptables_bin}" -X -t "$a"
+ for a in $(cat ${iptables_proc}) ; do
+ ${iptables_bin} -F -t $a
+ ${iptables_bin} -X -t $a
- set_table_policy "$a" DROP
+ set_table_policy $a DROP
done
eend $?
}