From owner-freebsd-hackers Fri May 9 10:39:40 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.5/8.8.5) id KAA18179 for hackers-outgoing; Fri, 9 May 1997 10:39:40 -0700 (PDT) Received: from whistle.com (s205m131.whistle.com [207.76.205.131]) by hub.freebsd.org (8.8.5/8.8.5) with ESMTP id KAA18157 for ; Fri, 9 May 1997 10:39:31 -0700 (PDT) Received: (from smap@localhost) by whistle.com (8.7.5/8.6.12) id KAA27544; Fri, 9 May 1997 10:38:59 -0700 (PDT) Received: from bubba.whistle.com(207.76.205.7) by whistle.com via smap (V1.3) id smai27502; Fri May 9 10:38:31 1997 Received: (from archie@localhost) by bubba.whistle.com (8.8.5/8.6.12) id WAA01936; Thu, 8 May 1997 22:11:07 -0700 (PDT) From: Archie Cobbs Message-Id: <199705090511.WAA01936@bubba.whistle.com> Subject: ipfw patches available To: freebsd-hackers@freebsd.org Date: Thu, 8 May 1997 22:11:07 -0700 (PDT) Cc: julian@whistle.com (Julian Elischer) X-Mailer: ELM [version 2.4ME+ PL25 (25)] MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: owner-hackers@freebsd.org X-Loop: FreeBSD.org Precedence: bulk If anyone is interested, I have patches available for these ipfw changes: - new "skipto X" command to jump forward to rule number X - new "tee X" command to copy packet to divert socket X (unfinished) - new "unreach X" command to reject with ICMP code X - new "reset" command to reject TCP packets with a RST - new "xmit iface" and "recv iface" for specifying the transmit and receive interface of a packet; can both be used together (packets must be outgoing) - minor enhancements & bug fixes They're at ftp://ftp.whistle.com/pub/archie/ipfw.patches.tgz These are against RELENG_2_2; haven't tried them against -current. Any comments appreciated. Thanks, -Archie ___________________________________________________________________________ Archie Cobbs * Whistle Communications, Inc. * http://www.whistle.com