Project

General

Profile

Download (79.6 KB) Statistics
| Branch: | Tag: | Revision:

# Date Author Comment
2f7f1190 04/29/2014 05:56 PM Renato Botelho

Unbreak 'add rule on top of the list' allowing after param to be -1

6316efd3 04/29/2014 03:52 PM Jim Pingle

Expose all p0f OS types that it supports so that subtypes of various Operating Systems can be detected

7f7626ba 03/17/2014 02:17 PM Renato Botelho

Merge branch 'master-br' of https://github.com/ayvis/pfsense into ayvis-master-br

c7281770 03/15/2014 12:04 AM Chris Buechler

standardize on www.pfsense.org and HTTPS, point package URLs to
packages.pfsense.org

8cd558b6 03/14/2014 08:24 PM ayvis

xhtml Compliance
replaced <br>, <br/> and </br> with <br />

e41ec584 03/12/2014 02:42 PM Renato Botelho

Improve checks for params 'id', 'dup' and other similar ones to make sure they are numeric integer, also, pass them through htmlspecialchars() before print

29d2b4e2 03/11/2014 05:32 PM Phil Davis

Validate rule Advanced Options numeric entries

This makes sure the user puts in ordinary positive integers like "1" and "42" in these advanced options fields. It prevents everything else, including dodgy-looking possibilities like "007" which might actually work OK, but it is safer to allow just plain "7"....

3f9586b6 03/07/2014 10:20 AM Renato Botelho

Merge pull request #997 from phil-davis/master

Make Firewall Rules Advanced Options open if used

fd839842 03/07/2014 04:28 AM Phil Davis

Refine check for existence of rule advanced options

bd9d6e0e 03/05/2014 05:29 AM Phil Davis

Make Firewall Rules Advanced Options open if used

Currently, if there are some settings defined in Firewall Rules Edit, Advanced Features, Advanced Options, the Advanced Options section is left minimized when the Firewall Edit screen is displayed. This makes it easy for a user to not notice that there are some Advanced Options settings....

ebe2b407 03/04/2014 01:03 PM Renato Botelho

Merge pull request #984 from phil-davis/master

Return GWG IP protocol (version) when no gateway IP

de9ac478 03/03/2014 06:16 PM Renato Botelho

Validate if src OR dst have IP address set when protocol is IPv4+v6. Fixes #3499

088a4eed 02/28/2014 02:00 PM Phil Davis

Tidy up GWG dropdown selection tests

Tested this making a new rule, and editing existing IPv4, IPv6 and IPv4+Ipv6 rules, and switching the IP version on an existing rule. Seems to work!

fa94f1e1 02/28/2014 11:28 AM Phil Davis

Tidy "gateway name - IP" in dropdown list

While I notice this also, for a plain gateway, the current IP address is also listed in the dropdown list text, like "WAN_DHCP - 10.42.11.1". If there is no IP address currently, it might say "WAN_DHCP - dynamic". But for some DHCP gateways that have not had any non-default manual settings done, it can say "OPT1_DHCP ". This gets rid of the silly-looking ""

d47e25c7 02/28/2014 07:48 AM Phil Davis

Use return_gateway_groups_array() to build correct GWG list

Now return_gateway_groups_array() always returns at least the IP version 'ipprotocol' of each GWG, even if all its members are down at present. It is better to use this to check what IP version the GWG is. The previous check was using the IP address of the first member of the GWG to deduce 'ipprotocol'. That would fail if the WAN was DHCP and was down.

f7e481dd 02/25/2014 07:48 PM Stilez y

Port dropdowns: Put port no. after descrip

At the moment, even if a port number is entered, it's re-displayed only as a port name when editing. Users who don't have port names -> numbers lookup memorised can't easily confirm when editing a rule, that the port is as intended. Then, when they return to firewall_rules.php the same rules have ports displayed as numbers not names (inconsistent)....

c95b52d5 02/21/2014 11:55 PM Andrea Tuccia

Update firewall_rules_edit.php

PIM protocol for firewall rules.

d5bdbe0c 02/12/2014 11:10 PM Daniel Aleksandersen

Change string to "Maximum new connections per host / per second(s)"

Clarifying the setting's meaning.

As suggested by forum member "Senser" on
https://forum.pfsense.org/index.php/topic,65472.msg356024.html#msg356024

04d270fe 02/07/2014 09:54 AM Phil Davis

Standardise LAN net display

On the main firewall rules multi-rule display it shows "LAN net" "WAN net" etc. But on the edit screen it shows "LAN subnet" "WAN subnet" etc. Make the edit screen have the same text as the main screen - this has ben a source of enough little questions/queries on the forum.

72b774aa 01/16/2014 12:31 PM Bruno Ferri

added input hidden with tracker value

2006d7a4 12/31/2013 12:23 PM Ermal LUÇI

Generate a tracker id for the filter rules for now. Maybe for nat rules as well?

c4421dfa 11/12/2013 12:45 PM Renato Botelho

Add an option to set no-sync on rules to keep states from being synced via pfsync. Fix #2501

1e9b4611 09/12/2013 02:28 PM Renato Botelho

Remove call-time pass by reference for do_input_validation, helps ticket #2565

f6339216 08/28/2013 05:54 PM Jim Pingle

s/require/require_once/g for filter.inc to avoid redeclaration errors in some rare cases.

e2ad288e 08/14/2013 05:15 PM Phil Davis

Relax advanced options firewall rules tests

Various advanced options are now possible for any protocol since https://github.com/pfsense/pfsense/commit/653bde345e8f960de5bc745fe74e64d8ef3fd2d3
So allow these through the front-end GUI validation also.

08597fcc 07/24/2013 08:38 AM Phil Davis

Allow advanced options state-related parameters to be used for TCP, UDP and ICMP

Allows the state-related parameters to be specified for UDP and ICMP as well as TCP. Discussed in forum http://forum.pfsense.org/index.php/topic,64653.0.html

1101a891 07/22/2013 10:49 AM Phil Davis

Validate firewall rule advanced options requirements

Checks that the user has selected a TCP Pass rule etc when using the state-related advanced options. Validates as per the checks that are applied in filter.inc when generating the actual pf rules.
Forum discussion: http://forum.pfsense.org/index.php/topic,64653.15.html...

dd042c51 07/08/2013 03:38 PM Renato Botelho

Implement URL Table aliases for ports instead of IP addresses

25ce5136 07/07/2013 10:36 PM Daniel Becker

Add support for protocol 41 in rules. Fixes #3007.

079d1952 07/04/2013 01:42 PM Renato Botelho

Add a new alias type, URLs containing Ports

f8fee2ce 04/23/2013 11:33 PM Renato Botelho

Fix whitespace and indent

9411d6ab 04/11/2013 06:32 PM timdufrane

Fixed 802.1p duplicating values for vlanprio and vlanprioset

For real this time. Friggin' github.

7e2237f6 04/11/2013 05:54 PM timdufrane

Clean inconsistent "none" and empty conventions for advanced fields - removes residual "none" entries on save

f4567834 04/10/2013 05:56 PM timdufrane

Fix none where should be empty string for 802.1p

4143e7fb 04/09/2013 01:45 PM Colin Fleming

Tidy up "firewall_rules_edit.php" XHTML

Close INPUT, BR and IMG tags and add ALT to IMG tags
Update HTML boolean operators
Add missing closing P tags
Remove NAME paramenter from TR and DIV tags, invalid HTML

ba1d9714 03/20/2013 05:26 PM Jim Pingle

Track user/time a firewall rule was created and last updated, and show this information at the bottom of the page when viewing the firewall rule. Have various places in the system that create rules add a proper entry to indicate their origin.

507aa90a 02/16/2013 08:01 PM Renato Botelho

Set (src|dst)mask to 128 for single IPv6 addresses. Fixes #2451

965c3e23 02/13/2013 11:50 PM Renato Botelho

Deal correct with bitmask for ipv6 on destination, same we did for src. If fixes #2451

72f25519 02/13/2013 10:08 PM Ermal LUÇI

Refine the test for Ticket #2451 to check for aliases as well

72711980 02/13/2013 07:19 PM Renato Botelho

Warn users that nosync option won't prevent it to be overwritten on carp slave members

cb2b59b8 02/13/2013 01:06 PM Renato Botelho

Deal correct with /32 subnet mask for ipv6 addresses. If fixes #2451

889cbaef 01/08/2013 09:47 AM Phil Davis

Display gateways with matching IP protocol in Gateways list

Some gateways do not have traditional addresses hard-coded into them - e.g. for OpenVPN dynamic gateways are created in software on-the-fly (they are not actually entries in the config). So traditional tests like is_ipaddrv4 are not useful to determine if the gateway is IPv4 or IPv6....

84464c9a 11/27/2012 07:50 AM Ermal LUÇI

Fixes #1575. Allow Match option to be used with limiters as well. The support is there in kernel so allow rules to be configured on this.

fbc75dd5 11/16/2012 09:28 PM Ermal LUÇI

To allow limiters to work correctly on mutliwan for now enforce selecting a gateway on outgoing

bb33a337 10/31/2012 06:23 PM Jim Pingle

Encode the interface parameter before using it in a redirect

a133c803 10/24/2012 09:04 AM Phil Davis

Fix warning when no gateway groups

If there are no gateway groups defined, and you save a rule that has an ordinary gateway selected in "Advanced Features - Gateway", then a warning is emitted when trying to traverse an empty gateway groups array at line 214.

3a343d73 10/09/2012 07:17 PM Jim Pingle

Refine saving/applying on more pages - don't show apply or take an action unless the user is allowed to do that.

bec92ab9 10/09/2012 02:44 PM Jim Pingle

Don't offer to apply changes if no changes actually happened.

18be4037 09/10/2012 01:55 AM Chris Buechler

remove bunk input validation

b32dd0a6 08/10/2012 05:32 PM Jim Pingle

Activate new shortcuts/status in the rest of the areas that are currently setup.

85a236e9 06/01/2012 07:51 PM Ermal LUÇI

Fixes #2428. Reference limiters in rules by name to avoid issues. Also put upgrade code for existing configs. The same fix is necessary for 2.0.x though not sure how this should be committed there.

05a4cebd 05/31/2012 06:08 PM Seth Mos

Add a inet46 filter type on the firewall rules page. I have locked down a few of the most common limitations.
Still arguing if we should lock this down even further to aliases only.
Redmine ticket #2466

ee8c34f4 05/21/2012 05:01 PM Seth Mos

Properly test for the address family now that the array says what it's supposed to be.

90f90934 05/19/2012 01:57 AM Cristian Feldman

Fix of bug #2374 "When entering values in firewall rules leading and
trailing spaces are not deleted"

1346306c 05/18/2012 07:49 PM Ermal LUÇI

Allow 802.1p tags to be controlled from firewall rules edit screen

4dfd930e 05/10/2012 07:17 PM Darren Embry

cleanup: code for building arrays for autocompleted fields

43fd29df 04/28/2012 03:59 AM Erik Fonnesbeck

Fix preservation of the selection of interfaces on input errors for floating rules.

f51d5d57 03/28/2012 10:50 PM Darren Embry

feature #2320: JS helper to toggle subnet mask for ipv4/v6 during input

http://redmine.pfsense.org/issues/2320

979b179d 03/28/2012 10:31 PM Darren Embry

prep work for feature #2320: tag for ipv4v6 fields

6134cc8f 11/15/2011 05:12 PM Vinícius Coque

now we use the Chosen javascript plugin for jQuery

9dfd60db 10/18/2011 07:33 AM Seth Mos

Add a check to prevent this gateway code from triggering the address family check. This might not be all that is needed for Ticket #1949

99bdb17e 08/24/2011 08:10 PM Seth Mos

Unbreak the firewall rule Edit page, input error array was unset halfway the validation. Set that back up ontop.
Add gateway validation

4108dee8 08/24/2011 07:21 PM Seth Mos

Catch another possiblity for invalid rule generation

a1c10b7f 08/24/2011 01:26 PM Seth Mos

Properly fix the address family check for gateway groups Ticket #1659

8c591d01 08/24/2011 01:12 PM Seth Mos

Unbreak firewall rules edit, missing a )

270a2576 08/24/2011 11:02 AM Seth Mos

Add address family validation, also hide gateways or gateway groups from the gateway list.
Fix Ticket #1659

4bb99603 07/23/2011 10:51 PM Scott Ullrich

Add chosen js library (mit lic). Modify interface multiple select box to use.

48fc39a3 07/18/2011 07:25 PM Scott Ullrich

Adding pre_input_errors hook

b4b7bda6 07/18/2011 07:23 PM Scott Ullrich

Revert "Move early call up a bit"

This reverts commit 35843e59c81366a7d30a44a94c8a135fc6834454.

35843e59 07/18/2011 07:12 PM Scott Ullrich

Move early call up a bit

0040bcfa 07/17/2011 12:55 AM Scott Ullrich

Adding hook for interfaces allowing pfCenter and friends to add interfaces to the dropdown

8b6313a4 07/12/2011 11:57 PM Jim Pingle

Merge remote-tracking branch 'upstream/master'

Conflicts:
etc/inc/easyrule.inc
etc/inc/filter.inc
etc/inc/interfaces.inc
etc/inc/services.inc
etc/inc/xmlrpc_client.inc
usr/local/www/fbegin.inc
usr/local/www/services_dhcp.php

5909b520 07/08/2011 12:46 AM Evgeny Yurchenko

Bug #1639. Port alias missing input validation in firewall_rules_edit.php.

8a385f42 06/27/2011 06:06 PM Jim Pingle

Merge remote branch 'upstream/master'

e4b9d53b 06/27/2011 02:57 PM Warren Baker

Be consistent with upper and lowercase.

ee0cf21f 06/01/2011 08:56 PM Jim Pingle

Merge remote branch 'upstream/master'

a01ce4c7 06/01/2011 08:54 PM Jim Pingle

Make the ICMP echo request type less ambiguous, and since it's likely the main one to get used, move it to the top.

58005e52 06/01/2011 01:00 PM Jim Pingle

Merge remote branch 'upstream/master'

Conflicts:
conf.default/config.xml
etc/inc/filter.inc
etc/inc/globals.inc
etc/inc/pfsense-utils.inc
etc/inc/upgrade_config.inc
usr/local/www/interfaces.php

10d74dff 05/31/2011 04:35 PM Scott Ullrich

Remove bogus protection. We have better handling of this now.

2ea00c3e 05/30/2011 04:28 PM Scott Ullrich

Add missing plugin code. Move the pre_write section up a bit.

d65962a7 05/25/2011 11:43 PM Scott Ullrich

Adding a new hook system for firewall nat edit and firewall rules edit page.
Basically if the directory exists it will suck in the files to extend these pags.

/usr/local/pkg/firewall_nat/input_validation
/usr/local/pkg/firewall_nat/pre_write_config
/usr/local/pkg/firewall_nat/htmlphpearly...

86966fba 04/12/2011 08:39 AM Seth Mos

Merge remote branch 'upstream/master'

Conflicts:
etc/inc/filter.inc
usr/local/www/themes/the_wall/rrdcolors.inc.php

c6dfd289 03/28/2011 04:17 PM Jim Pingle

In IPsec, s/mobileclients/client/, this was changed long ago in the config but not everywhere followed.

b4c826ad 03/06/2011 09:18 PM Scott Ullrich

Resolve merge conflict

199791f9 03/02/2011 02:09 PM Ermal LUÇI

Show friendly names of interface for root queues of ALTQ.

a299232e 02/23/2011 08:03 AM Seth Mos

Merge remote branch 'upstream/master'

Conflicts:
etc/inc/filter.inc
etc/inc/vpn.inc

95938fae 02/21/2011 09:45 PM Jim Pingle

Fix typo/spacing issue. Resolves #1300

f698b262 02/16/2011 08:11 AM Seth Mos

Merge remote branch 'upstream/master'

43f2eca7 02/13/2011 02:44 PM Erik Fonnesbeck

Use autocomplete='off' like all other fields that accept aliases, to prevent web browser auto-complete from covering up the alias list popup.

ac5eb23b 02/12/2011 06:31 AM Scott Ullrich

Catch up

a391d0ab 02/11/2011 05:26 PM Ermal LUÇI

Allow match action on Floating rules and exposed it with name Queue. More validation is needed.

1d564143 02/11/2011 08:13 AM Seth Mos

Merge remote branch 'upstream/master'

93c2c1e6 02/10/2011 03:58 PM Jim Pingle

Generalize pppoe server enabled check and use it elsewhere in the GUI that needed fixed. Still needs changes in filter.inc - Ticket #1243

9740fad8 01/26/2011 02:40 PM Seth Mos

Merge remote branch 'upstream/master'

Conflicts:
etc/inc/system.inc

bb8f186e 01/21/2011 07:50 AM Chris Buechler

fix text

15705bc0 01/20/2011 10:49 AM Seth Mos

Enlarge subnet bits to 128

1f74cd2d 01/18/2011 08:10 AM Seth Mos

Merge remote branch 'upstream/master'

Conflicts:
etc/inc/interfaces.inc
etc/inc/system.inc

e85604b8 12/31/2010 06:41 AM Chris Buechler

remove <strong> to make consistent with all other text

c6c26178 12/23/2010 07:19 PM Jim Pingle

Add OSPF to firewall rule protocol choices

81afb509 12/20/2010 08:06 PM Seth Mos

Merge remote branch 'upstream/master'

Conflicts:
etc/inc/interfaces.inc
etc/inc/vslb.inc
usr/local/www/interfaces.php