par jdh » 27 Oct 2007 13:07
Shorewall generate netfilter instructions from its configuration files. The result is like ANY script directly written with iptables instructions.
I imagine (and I can see) software like tcpdump, nmap, ethereal acting at an upper level are running in the context set by Shorewall. And if a rule is designed for dropping/rejecting network flows in Shorewall, it's NOT possible to listen these flows with these tools.
Netfilter is deeply inside the kernel and its ip-stack. So, tools using ressources of the stack, even in promiscious mode, must follow the rules designed by settings of netfilter. (Better "receives the network packets allowed by netfilter rules").
IMHO.