This file is indexed.

/etc/prelude-lml/ruleset/unsupported/zywall.rules is in prelude-lml-rules 4.1.0-1.

This file is owned by root:root, with mode 0o644.

The actual contents of the file can be viewed below.

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
#####
#
# Copyright (C) 2002 Laurent Oudot <oudot.laurent@wanadoo.fr>
# This ruleset is currently unmaintained.  Contact the Prelude
# development team if you would like to maintain it.
# All Rights Reserved
#
# This file is part of the Prelude-LML program.
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2, or (at your option)
# any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License along
# with this program; if not, write to the Free Software Foundation, Inc.,
# 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
#
#####

# ZyWall Firewall Support

# Thanks to Ernst Lopes Cardozo <e.lopes.cardozo@aranea.nl>
# for providing me an access to many lines of syslog from a ZyWall

# Enable logging to the syslog server with the menu 24.3.2.
# Specify a syslog server IP and log facility level
# Put "Set firewall log" field to "YES"

# No log sample; please submit
regex=FW (\d+\.\d+\.\d+\.\d+)\s*[:]?(\d+)?\s*\-\>(\d+\.\d+\.\d+\.\d+)\s*[:]?(\d+)?\s*\|(UDP|TCP|ICMP|IGMP|GRE|ESP)(.*)\|(.*)\|B; \
 classification.text=$5 packet blocked; \
 id=2400; \
 revision=1; \
 assessment.impact.completion=failed; \
 assessment.impact.type=other; \
 assessment.impact.severity=medium; \
 source(0).node.address(0).category=ipv4-addr; \
 source(0).node.address(0).address = $1; \
 source(0).service.port = $2; \
 source(0).service.protocol = $5; \
 target(0).node.address(0).category=ipv4-addr; \
 target(0).node.address(0).address = $3; \
 target(0).service.port = $4; \
 target(0).service.protocol = $5; \
 assessment.impact.description=$5$6 packet blocked from $1 port $2 to $3 port $4 [$7]; \
 last

# No log sample; please submit
regex=FW (\d+\.\d+\.\d+\.\d+)\s*[:]?(\d+)?\s*\-\>(\d+\.\d+\.\d+\.\d+)\s*[:]?(\d+)?\s*\|(UDP|TCP|ICMP|IGMP|GRE|ESP)(.*)\|(.*)\|F; \
 classification.text=$5 packet forwarded; \
 id=2401; \
 revision=1; \
 assessment.impact.completion=failed; \
 assessment.impact.type=other; \
 assessment.impact.severity=medium; \
 source(0).node.address(0).category=ipv4-addr; \
 source(0).node.address(0).address = $1; \
 source(0).service.port = $2; \
 source(0).service.protocol = $5; \
 target(0).node.address(0).category=ipv4-addr; \
 target(0).node.address(0).address = $3; \
 target(0).service.port = $4; \
 target(0).service.protocol = $5; \
 assessment.impact.description=$5$6 packet forwarded from $1 port $2 to $3 port $4 [$7]; \
 last

# No log sample; please submit
regex=FW (\d+\.\d+\.\d+\.\d+)\s*[:]?(\d+)?\s*\-\>(\d+\.\d+\.\d+\.\d+)\s*[:]?(\d+)?\s*\|(UDP|TCP|ICMP|IGMP|GRE|ESP)(.*)\|(.*)\|N; \
 classification.text=$5 packet matched; \
 id=2402; \
 revision=1; \
 assessment.impact.completion=failed; \
 assessment.impact.type=other; \
 assessment.impact.severity=medium; \
 source(0).node.address(0).category=ipv4-addr; \
 source(0).node.address(0).address = $1; \
 source(0).service.port = $2; \
 source(0).service.protocol = $5; \
 target(0).node.address(0).category=ipv4-addr; \
 target(0).node.address(0).address = $3; \
 target(0).service.port = $4; \
 target(0).service.protocol = $5; \
 assessment.impact.description=$5$6 packet matched from $1 port $2 to $3 port $4 [$7]; \
 last