Adolf Belka b685b5e7e9 conntrack-tools: Update to version 1.4.7
- Update from 1.4.6 to 1.4.7
- Update of rootfile not required
- Requires update fo libnetfilter_conntrack from 1.0.8 to 1.0.9
- Changelog
    conntrack-tools 1.4.7
     This release contains new features:
	* IPS_HW_OFFLOAD flag specifies that a conntrack entry has been
	  offloaded into the hardware
	* 'clash_resolve' and 'chaintoolong' stats counters
	* Default to unspec family if '-f' flag is absent to improve support for
	  dual-stack setups
	* Support filtering events by IP address family
	* Support flushing per IP address family
	* Add "save" output format representing data in conntrack parameters
	* Support loading conntrack commands from a batch file, e.g. generated
	  by "save" output format
	* Annotate portid in events by the program name (if found)
	* Accept yes/no as synonyms to on/off in conntrackd.conf
	* Support user space helper auto-loading upon daemon startup, relieving
	  users from manual 'nfct add helper' calls
	* Filter dumps by status on kernel side if possible
	* Accept to filter for any status other than SEEN_REPLY using
	  'UNREPLIED'
	* Use libmnl internally
	* Reuse netlink socket for improved performance with bulk CT entry loads
	* Remove '-o userspace' flag and always tag user space triggered events
	* Introduce '-A' command, a variant of '-I' which does not fail if the
	  entry exists already
     ... and fixes:
	* ICMP entry creation would fail when reply data was specified
	* Sync zone value also
	* Log external inject problems as warning only
	* Endianness bug parsing IP addresses
	* Ignore conntrack ID when looking up cache entries to allow for stuck
	  old ones to be replaced eventually
	* Broken parsing of IPv6 M-SEARCH requests in ssdp cthelper
	* Eliminate the need for lazy binding in nfct
	* Fix for use of unknown protocol values
	* Sanitize protocol value parsing, catch illegal values
	* Ensure unknown protocol values are included in '-o save' dumps
     ... and documentation updates:
	* Fixed examples in manual
	* Refer to nf_conntrack sysctl instead of the deprecated ip_conntrack
	  one
	* Misc updates to the manual
	* Add an older example script creating an active-active setup using the
	  cluster match

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-11-19 19:24:14 +00:00
2022-09-13 10:20:43 +00:00
2022-04-08 00:32:40 +02:00
2021-03-10 14:42:37 +00:00
2022-03-21 13:47:58 +00:00

IPFire 2.x - The Open Source Firewall

What is IPFire?

IPFire is a hardened, versatile, state-of-the-art Open Source firewall based on Linux. Its ease of use, high performance in any scenario and extensibility make it usable for everyone. For a full list of features have a look here.

This repository contains the source code of IPFire 2.x which is used to build the whole distribution from scratch, since IPFire is not based on any other distribution.

Where can I get IPFire?

Just head over to https://www.ipfire.org/download

How do I use this software?

We have a long and detailed wiki located here which should answers most of your questions.

But I have some questions left. Where can I get support?

You can ask your question at our community located here. A complete list of our support channels can be found here.

How can I contribute?

We have another document for this. Please look here.

Description
No description provided
Readme 101 MiB
Languages
Perl 70.4%
Shell 23%
C 4%
Python 0.6%
Makefile 0.5%
Other 1.4%