This is an automated email from the git hooks/post-receive script. It was generated because a ref change was pushed to the repository containing the project "IPFire 2.x development tree".
The branch, next has been updated via 85cbc0a08f8f0125602244b91beb1b8e45a36e3f (commit) from 264c0195fbd8a897d37c81d5d74e6502ab7212a8 (commit)
Those revisions listed above that are new to this repository have not appeared on any other notification email; so we list those revisions in full, below.
- Log ----------------------------------------------------------------- commit 85cbc0a08f8f0125602244b91beb1b8e45a36e3f Author: Arne Fitzenreiter arne_f@ipfire.org Date: Mon Jul 4 23:09:05 2011 +0200
ipsec: fix ike firewall rule to support nat traversal.
-----------------------------------------------------------------------
Summary of changes: src/misc-progs/ipsecctrl.c | 4 ++-- 1 files changed, 2 insertions(+), 2 deletions(-)
Difference in files: diff --git a/src/misc-progs/ipsecctrl.c b/src/misc-progs/ipsecctrl.c index c500e58..a018289 100644 --- a/src/misc-progs/ipsecctrl.c +++ b/src/misc-progs/ipsecctrl.c @@ -59,9 +59,9 @@ void open_physical (char *interface, int nat_traversal_port) { // safe_system(str); // IKE
- sprintf(str, "/sbin/iptables -D IPSECINPUT -p udp -i %s --sport 500 --dport 500 -j ACCEPT >/dev/null 2>&1", interface); + sprintf(str, "/sbin/iptables -D IPSECINPUT -p udp -i %s --dport 500 -j ACCEPT >/dev/null 2>&1", interface); safe_system(str); - sprintf(str, "/sbin/iptables -A IPSECINPUT -p udp -i %s --sport 500 --dport 500 -j ACCEPT", interface); + sprintf(str, "/sbin/iptables -A IPSECINPUT -p udp -i %s --dport 500 -j ACCEPT", interface); safe_system(str);
if (! nat_traversal_port)
hooks/post-receive -- IPFire 2.x development tree