From mboxrd@z Thu Jan 1 00:00:00 1970 From: Adolf Belka To: development@lists.ipfire.org Subject: [PATCH 2/3] firewall: Fixes bug12981 - add if loop to log or not log dropped hostile traffic Date: Tue, 26 Dec 2023 20:46:23 +0100 Message-ID: <20231226194624.3273192-2-adolf.belka@ipfire.org> In-Reply-To: <20231226194624.3273192-1-adolf.belka@ipfire.org> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============5639427671989464123==" List-Id: --===============5639427671989464123== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable - Dependent on the choice in optionsfw.cgi this loop will either log or not l= og the dropped hostile traffic. Fixes: bug12981 Tested-by: Adolf Belka Signed-off-by: Adolf Belka --- src/initscripts/system/firewall | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/src/initscripts/system/firewall b/src/initscripts/system/firewall index 50f2b3e02..352ae2496 100644 --- a/src/initscripts/system/firewall +++ b/src/initscripts/system/firewall @@ -177,7 +177,9 @@ iptables_init() { iptables -A OUTPUT -j HOSTILE =20 iptables -N HOSTILE_DROP - iptables -A HOSTILE_DROP -m limit --limit 10/second -j LOG --log-prefix "DR= OP_HOSTILE " + if [ "$LOGDROPHOSTILE" =3D=3D "on" ]; then + iptables -A HOSTILE_DROP -m limit --limit 10/second -j LOG --log-prefix "D= ROP_HOSTILE " + fi iptables -A HOSTILE_DROP -j DROP -m comment --comment "DROP_HOSTILE" =20 # IP Address Blocklist chains --=20 2.43.0 --===============5639427671989464123==--