[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#495284: marked as done (ITP: apf-firewall -- easy iptables based firewall system)



Your message dated Wed, 25 Feb 2009 01:21:39 +0000
with message-id <E1Lc8Sx-0006Bi-72@ries.debian.org>
and subject line Bug#495284: fixed in apf-firewall 9.6+rev5-1
has caused the Debian Bug report #495284,
regarding ITP: apf-firewall -- easy iptables based firewall system
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
495284: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495284
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: Giuseppe Iuculano <giuseppe@iuculano.it>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

* Package name    : apf
  Version         : 9.6-4
  Upstream Author : R-fx Networks <support@r-fx.org>
* URL             : http://www.r-fx.org/apf.php
* License         : GPL
  Programming Lang: bash
  Description     : easy iptables based firewall system

Advanced Policy Firewall (APF) is an iptables(netfilter) based firewall
system designed around the essential needs of today's Internet deployed
servers and the unique needs of custom deployed Linux installations. The
configuration of APF is designed to be very informative and present the
user with an easy to follow process, from top to bottom of the
configuration file. The management of APF on a day-to-day basis is
conducted from the command line with the 'apf' command, which includes
detailed usage information and all the features one would expect from a
current and forward thinking firewall solution.

Summary of features: 
- - detailed and well commented configuration file
- - granular inbound and outbound network filtering
- - user id based outbound network filtering
- - application based network filtering
- - trust based rule files with an optional advanced syntax
- - global trust system where rules can be downloaded from a central management server
- - reactive address blocking (RAB), next generation in-line intrusion prevention
- - debug mode provided for testing new features and configuration setups
- - fast load feature that allows for 1000+ rules to load in under 1 second

- - inbound and outbound network interfaces can be independently configured
- - global tcp/udp port & icmp type filtering with multiple methods of executing filters (drop, reject, prohibit)
- - configurable policies for each ip on the system with convenience variables to import settings
- - packet flow rate limiting that prevents abuse on the most widely abused protocol, icmp
- - prerouting and postrouting rules for optimal network performance
- - dshield.org block list support to ban networks exhibiting suspicious activity
- - spamhaus Don't Route Or Peer List support to ban known "hijacked zombie" IP blocks
- - any number of additional interfaces may be configured as firewalled (untrusted) or trusted (not firewalled)

- - additional firewalled interfaces can have there own unique firewall policies applied
- - intelligent route verification to prevent embarrassing configuration errors
- - advanced packet sanity checks to make sure traffic coming and going meets the strictest of standards
- - filter attacks such as fragmented UDP, port zero floods, stuffed routing, arp poisoning and more
- - configurable type of service options to dictate the priority of different types of network traffic
- - intelligent default settings to meet every day server setups
- - dynamic configuration of your servers local DNS revolvers into the firewall
- - optional filtering of common p2p applications
- - optional filtering of private & reserved IP address space

- - optional implicit blocks of the ident service 
- - configurable connection tracking settings to scale the firewall to the size of your network
- - configurable kernel hooks (ties) to harden the system further to syn-flood attacks & routing abuses
- - advanced network control such as explicit congestion notification and overflow control
- - special chains that are aware of the state of FTP DATA and SSH connections to prevent client side issues
- - control over the rate of logged events, want only 30 filter events a minute? 300 a minute? - you are the boss
- - logging subsystem that allows for logging data to user space programs or standard syslog files
- - logging that details every rule added and a comprehensive set of error checks to prevent config errors

- - if you are familiar with netfilter you can create your own rules in any of the policy files
- - pluggable and ready advanced use of QoS algorithms provided by the Linux
- - 3rd party add-on projects that compliment APF features


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkil9/IACgkQNxpp46476aq+UACeMLOoO5PeUxXm/Uzmp39pVXmf
emoAoJwcX9p/CpCqgHWlibGIbGCbxX6I
=90zt
-----END PGP SIGNATURE-----



--- End Message ---
--- Begin Message ---
Source: apf-firewall
Source-Version: 9.6+rev5-1

We believe that the bug you reported is fixed in the latest version of
apf-firewall, which is due to be installed in the Debian FTP archive:

apf-firewall_9.6+rev5-1.diff.gz
  to pool/main/a/apf-firewall/apf-firewall_9.6+rev5-1.diff.gz
apf-firewall_9.6+rev5-1.dsc
  to pool/main/a/apf-firewall/apf-firewall_9.6+rev5-1.dsc
apf-firewall_9.6+rev5-1_all.deb
  to pool/main/a/apf-firewall/apf-firewall_9.6+rev5-1_all.deb
apf-firewall_9.6+rev5.orig.tar.gz
  to pool/main/a/apf-firewall/apf-firewall_9.6+rev5.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 495284@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Giuseppe Iuculano <giuseppe@iuculano.it> (supplier of updated apf-firewall package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Fri, 29 Aug 2008 10:43:29 +0200
Source: apf-firewall
Binary: apf-firewall
Architecture: source all
Version: 9.6+rev5-1
Distribution: unstable
Urgency: low
Maintainer: Giuseppe Iuculano <giuseppe@iuculano.it>
Changed-By: Giuseppe Iuculano <giuseppe@iuculano.it>
Description: 
 apf-firewall - easy iptables based firewall system
Closes: 495284
Changes: 
 apf-firewall (9.6+rev5-1) unstable; urgency=low
 .
   * Initial release (Closes: #495284)
Checksums-Sha1: 
 af97c88b50248741afe03c8581951228242b307b 1854 apf-firewall_9.6+rev5-1.dsc
 a9d815d3a44b1f8eb9409c2748e7ed095b826574 105061 apf-firewall_9.6+rev5.orig.tar.gz
 b5f37a11976a8be1615bb88083b861b0882ed370 8483 apf-firewall_9.6+rev5-1.diff.gz
 8cbec289cd96261955ea0d0a80dcddd7fc85cc67 106816 apf-firewall_9.6+rev5-1_all.deb
Checksums-Sha256: 
 f4995e9d667a027afaee0340f47b5db763d4b79950172dfd624585b2ca34ca7d 1854 apf-firewall_9.6+rev5-1.dsc
 d71f409c68dba9ad6a91b326b4994188c8a8be5f7781465dd827a6f1b8a6c617 105061 apf-firewall_9.6+rev5.orig.tar.gz
 cc942c6e147b4fe50411294f02bd2e3f58aaca01f714087d2dfbbf90a300ca1e 8483 apf-firewall_9.6+rev5-1.diff.gz
 aefbea8e3ff6c1f45798868b781094b3dde1c52499d65abe2dab2be3bd25d874 106816 apf-firewall_9.6+rev5-1_all.deb
Files: 
 43f44bebf7e7cee55a159c57fde4b0a2 1854 net optional apf-firewall_9.6+rev5-1.dsc
 f16b6764a57c8333e73a5ac935139241 105061 net optional apf-firewall_9.6+rev5.orig.tar.gz
 05668843d6210851dfd6f261ba4a4930 8483 net optional apf-firewall_9.6+rev5-1.diff.gz
 b4cd5ab0e71c98dfb049e58a99118bdb 106816 net optional apf-firewall_9.6+rev5-1_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
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=zOMI
-----END PGP SIGNATURE-----



--- End Message ---

Reply to: