diff --git a/TODO b/TODO index 61cf38e974f..ba6b9c034e5 100644 --- a/TODO +++ b/TODO @@ -4,8 +4,6 @@ Bugfixes: manager or system manager can be always set. It would be better to reject them when parsing config. -* Clarify what IPAddress* matches (source, destination, both?) - External: * Fedora: add an rpmlint check that verifies that all unit files in the RPM are listed in %systemd_post macros. diff --git a/man/systemd.resource-control.xml b/man/systemd.resource-control.xml index 5df345583e8..4a8c57f45ac 100644 --- a/man/systemd.resource-control.xml +++ b/man/systemd.resource-control.xml @@ -513,23 +513,27 @@ IPAddressDeny=ADDRESS[/PREFIXLENGTH]… - Turn on address range network traffic filtering for packets sent and received over AF_INET and AF_INET6 - sockets. Both directives take a space separated list of IPv4 or IPv6 addresses, each optionally suffixed - with an address prefix length (separated by a / character). If the latter is omitted, the - address is considered a host address, i.e. the prefix covers the whole address (32 for IPv4, 128 for IPv6). - + Turn on address range network traffic filtering for IP packets sent and received over + AF_INET and AF_INET6 sockets. Both directives take a + space separated list of IPv4 or IPv6 addresses, each optionally suffixed with an address prefix + length in bits (separated by a / character). If the latter is omitted, the + address is considered a host address, i.e. the prefix covers the whole address (32 for IPv4, 128 + for IPv6). - The access lists configured with this option are applied to all sockets created by processes of this - unit (or in the case of socket units, associated with it). The lists are implicitly combined with any lists - configured for any of the parent slice units this unit might be a member of. By default all access lists are - empty. When configured the lists are enforced as follows: + The access lists configured with this option are applied to all sockets created by processes + of this unit (or in the case of socket units, associated with it). The lists are implicitly + combined with any lists configured for any of the parent slice units this unit might be a member + of. By default all access lists are empty. Both ingress and egress traffic is filtered by these + settings. In case of ingress traffic the source IP address is checked against these access lists, + in case of egress traffic the destination IP address is checked. When configured the lists are + enforced as follows: - Access will be granted in case its destination/source address matches any entry in the - IPAddressAllow= setting. + Access will be granted in case an IP packet's destination/source address matches + any entry in the IPAddressAllow= setting. - Otherwise, access will be denied in case its destination/source address matches any entry - in the IPAddressDeny= setting. + Otherwise, access will be denied in case its destination/source address matches + any entry in the IPAddressDeny= setting. Otherwise, access will be granted.