<feed xmlns='http://www.w3.org/2005/Atom'>
<title>firewall4/root/etc, branch master</title>
<subtitle>OpenWrt nftables firewall</subtitle>
<id>https://git.openwrt.org/project/firewall4/atom?h=master</id>
<link rel='self' href='https://git.openwrt.org/project/firewall4/atom?h=master'/>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/'/>
<updated>2025-03-17T15:46:41Z</updated>
<entry>
<title>config: drop to-be-forwarded-nowhere packets on wans</title>
<updated>2025-03-17T15:46:41Z</updated>
<author>
<name>Andris PE</name>
</author>
<published>2024-02-29T14:17:03Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/commit/?id=97962771aa3c490d6186e64015f85dd66254fdf0'/>
<id>urn:sha1:97962771aa3c490d6186e64015f85dd66254fdf0</id>
<content type='text'>
Dropping packets with no clear forward destination is nicer than rejecting
them. Especially when some providers punish users for spoofing caused by
their noisy infra.

Fixes: https://github.com/openwrt/openwrt/issues/13340
Signed-Off-By: Andris PE &lt;neandris@gmail.com&gt;
</content>
</entry>
<entry>
<title>init: use the reload data trigger to reload firewall on procd data changes</title>
<updated>2024-12-18T09:34:15Z</updated>
<author>
<name>Felix Fietkau</name>
</author>
<published>2024-12-17T19:05:44Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/commit/?id=18fc0ead19faf06b8ce7ec5be84957278e942dfa'/>
<id>urn:sha1:18fc0ead19faf06b8ce7ec5be84957278e942dfa</id>
<content type='text'>
This allows properly handling dynamic changes to firewall rules added via
procd data.

Signed-off-by: Felix Fietkau &lt;nbd@nbd.name&gt;
</content>
</entry>
<entry>
<title>config: drop input traffic by default</title>
<updated>2022-11-02T15:24:20Z</updated>
<author>
<name>Baptiste Jonglez</name>
</author>
<published>2022-11-02T15:06:47Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/commit/?id=6443ec7805295de07f6051662065a16b4a194f19'/>
<id>urn:sha1:6443ec7805295de07f6051662065a16b4a194f19</id>
<content type='text'>
This is necessary with firewall4 to avoid a hard-to-diagnose race
condition during boot, causing DNAT rules not to be taken into account
correctly.

The root cause is that, during boot, the ruleset is mostly empty, and
interface-related rules (including DNAT rules) are added incrementally.
If a packet hits the input chain before the DNAT rules are setup, it can
create buggy conntrack entries that will persist indefinitely.

This new default should be safe because firewall4 explicitly accepts
authorized traffic and rejects the rest.  Thus, in normal operations, the
default policy is not used.

Fixes: #10749
Ref: https://github.com/openwrt/openwrt/issues/10749
Signed-off-by: Baptiste Jonglez &lt;git@bitsofnetworks.org&gt;
</content>
</entry>
<entry>
<title>hotplug: reliably handle interfaces with ubus zone hints</title>
<updated>2022-05-20T10:12:38Z</updated>
<author>
<name>Jo-Philipp Wich</name>
</author>
<published>2022-05-20T10:12:38Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/commit/?id=628d7917ea03a24de43a35fd90894cf8d5d62dc0'/>
<id>urn:sha1:628d7917ea03a24de43a35fd90894cf8d5d62dc0</id>
<content type='text'>
So far, the firewall hotplug did not initiate a reload for interfaces which
are not covered in the firewall configuration but provide a zone hint in
their ubus data section.

Extend the hotplug script to handle this case by checking whether a zone
hint is present and if the requested zone exists in the configuration if
a direct zone lookup fails.

Fixes: #9611
Signed-off-by: Jo-Philipp Wich &lt;jo@mein.io&gt;
</content>
</entry>
<entry>
<title>config: remove restictions on DHCPv6 allow rule</title>
<updated>2022-05-04T13:22:53Z</updated>
<author>
<name>Tiago Gaspar</name>
</author>
<published>2022-05-04T09:36:07Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/commit/?id=72b196da6852673a12aa7fb5e251d90bc9a191d4'/>
<id>urn:sha1:72b196da6852673a12aa7fb5e251d90bc9a191d4</id>
<content type='text'>
Remove restrictions on source and destination addresses, which aren't
specified on RFC8415, and for some reason in openwrt are configured
to allow both link-local and ULA addresses.
As cleared out in issue #5066 there are some ISPs that use Gloabal
Unicast addresses, so fix this rule to allow them.

Fixes: #5066

Signed-off-by: Tiago Gaspar &lt;tiagogaspar8@gmail.com&gt;
</content>
</entry>
<entry>
<title>init: fix boot action in init script</title>
<updated>2022-02-07T18:01:30Z</updated>
<author>
<name>Jo-Philipp Wich</name>
</author>
<published>2022-02-07T18:01:04Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/commit/?id=ac99eba7d39c2ba8fa0c5335ea1e8943d8885c24'/>
<id>urn:sha1:ac99eba7d39c2ba8fa0c5335ea1e8943d8885c24</id>
<content type='text'>
We need to call `start()` instead of `start_service()` from `boot()` in
order to properly register the firewall service.

Signed-off-by: Jo-Philipp Wich &lt;jo@mein.io&gt;
</content>
</entry>
<entry>
<title>Initial commit</title>
<updated>2021-03-19T18:26:04Z</updated>
<author>
<name>Jo-Philipp Wich</name>
</author>
<published>2021-03-19T18:26:04Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/commit/?id=59dbb982b7fefa480196dec03ba51c4f8c4dd7ae'/>
<id>urn:sha1:59dbb982b7fefa480196dec03ba51c4f8c4dd7ae</id>
<content type='text'>
Signed-off-by: Jo-Philipp Wich &lt;jo@mein.io&gt;
</content>
</entry>
</feed>
