Software Release - fwknop-1.9.9
13 November, 2008
The 1.9.9 release of fwknop is ready for download. This is a fairly major update to allow integration with third party applications with the ability to execute external programs on SPA open and SPA close. There were also updates made to the fwknop signal handling code, the IPTables::ChainMgr and IPTables::Parse modules for Linux systems, and a few bug fixes as well.There will probably be a 1.9.10 release before the 2.0 release, and it will most likely include support for the PF firewall, and more advanced support for using SPA in the Amazon EC2 cloud computing service.
Here is the complete ChangeLog:
- Added support to fwknop for the Linux 'any' interface which allows SPA packets to be received on multiple interfaces on a Linux system. This is useful for running fwknop on a dual-homed Linux host, and then accepting SPA packets on either the internal or external interface so that SPA packets can influence the packet filter from either network.
- Added support for interfacing fwknop with third party software through
the addition of three new variables in the access.conf file (or set
globally in the fwknop.conf file): EXTERNAL_CMD_OPEN,
EXTERNAL_CMD_CLOSE, and EXTERNAL_CMD_ALARM.
The "open" and "close" commands might be manually supplied firewall
commands, and both support variable substitution of any of the variables
in the access.conf file with "$VAR". Also, three special variables are
supported: $SRC, $PORT, and $PROTO, which are derived from actual values
from within valid SPA packets (as opposed to $SOURCE from access.conf
which may contain a list of networks instead of a single IP address).
Here are some examples:
Execute a specific iptables command on behalf of the source IP in a valid SPA packet to add a new ACCEPT rule, and execute another command (to delete the same rule after a timeout):
EXTERNAL_CMD_OPEN iptables -A INPUT -s $SRC -j ACCEPT
EXTERNAL_CMD_CLOSE iptables -D INPUT -s $SRC -j ACCEPT - Execute a custom binary with the SOURCE and OPEN_PORTS variables from
the access.conf file as input on the command line, and after a
timeout execute a different program but use the real SPA source IP:
EXTERNAL_CMD_OPEN /path/someprog $SOURCE $OPEN_PORTS
EXTERNAL_CMD_OPEN /path/otherprog $SRC - Added IPT_CMD_ALARM to control the number of seconds that the IPTables::ChainMgr module uses to wrap alarm() calls around iptables commands (for IPTables::ChainMgr 0.8 and later, although this does not interfere with earlier versions of the module).
- Added IPT_EXEC_STYLE to control the execution method used for iptables commands in the IPTables::ChainMgr module. The default is "waitpid", but "system", and "popen" are also supported.
- Added IPT_EXEC_SLEEP to control the number of seconds that the IPTables::ChainMgr module uses to delay between each iptables command. The default is zero (no delay), but this can be increased to ensure that iptables commands are issued at a slower pace.
- Added IPT_EXEC_TRIES to allow critical iptables commands to be tried multiple times (with a default of 1) in case there are any errors from iptables execution.
- Added --Override-config to fwknopd (suggested by Franck Joncourt) to allow config variables in the normal /etc/fwknop/fwknop.conf file to be superseded by values from other specified files. The --Override-config command line argument accepts a comma-separated list of multiple files from which to import configuration variables from.
- Added code to prefer the usage of the /usr/sbin/sendmail binary to send email alerts before falling back to the mail binary (suggested by Alexander Perlis).
- Added --Dump-config to fwknopd (suggested by Franck Joncourt).
- Added execution of --Dump-config to the test suite to collect the installed version of the fwknop.conf and access.conf files (personal information is anonymized).
- Updated fwknopd to use the POSIX sys_wait_h API for SIGCHLD handling in order to be more consistent with an example from the perlipc man page.
- Updated fwknopd to pass in a reference to the SIGCHLD signal handler to the IPTables::ChainMgr module so that all command executions via fork() and exec() are associated with the same signal handler.
- Updated to IPTables::ChainMgr version 0.8.
- Updated to IPTables::Parse version 0.7.
- (Test suite): Added time stamps to MSG and TEST lines for each test (useful to see the relative time if an alarm expires).
- (Test suite): Added tests for fwknopd --Override-config, --Dump-config, and writing SPA packets to disk with the --Save-packet functionality (in the fwknop client).
- (Test suite): Added tests for IPT_EXEC_SLEEP delays for executing iptables commands.
- (Test suite): Added tests for Linux 'any' interface capture of SPA packets on all interfaces.
- (Test suite): Added the ability to collect output from knoptm to see when requests are received from fwknopd and when rules are added and removed.
- Added version information for fwknopd to syslog startup message.
- Bug fix for the fwknop client in symmetric key mode where the terminal would not be taken out of 'noecho' mode if a password less than 8 characters long is provided. Previous to this fix, it was necessary to blindly type 'reset'. (Reported by Alexander Perlis.)