Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 26 Feb 2012 22:14:25 +0100
From:      Matthias Apitz <guru@unixarea.de>
To:        Julian Elischer <julian@freebsd.org>
Cc:        hackers@freebsd.org
Subject:   Re: o
Message-ID:  <20120226211424.GA1534@tiny>
In-Reply-To: <4F4A9E87.4080807@freebsd.org>
References:  <BC3D956B-FD78-4C1B-A4AA-8C33651237B2@gid.co.uk> <4F4A9E87.4080807@freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
El día Sunday, February 26, 2012 a las 01:05:11PM -0800, Julian Elischer escribió:

> On 2/26/12 5:34 AM, Bob Bishop wrote:
> > Hi,
> >
> > I'd like to hear from somebody who understands this stuff on the relative merits of blackhole routes vs firewall drop rules for dealing with packets from unwanted sources. I'm particularly interested in efficiency and scalability. Thanks
> 
> the key is the word "from".  routes can only be selected on 'TO' 
> (destination) where
> firewalls can select on any combination of header fields.

I understand the idea of the OP as, based on the source IP addr, he
wants to install routes that the resulting IP pkg to the source IP goes
to "nowhere", i.e. not back to the origin IP and the 1st SYN is not
answered back to the source IP;

	matthias
-- 
Matthias Apitz
e <guru@unixarea.de> - w http://www.unixarea.de/
UNIX since V7 on PDP-11, UNIX on mainframe since ESER 1055 (IBM /370)
UNIX on x86 since SVR4.2 UnixWare 2.1.2, FreeBSD since 2.2.5



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20120226211424.GA1534>