Date: Thu, 30 Jun 2016 07:18:00 +0000 From: =?utf-8?Q?Abby=20|=20Kingfast=20SSD?= <abbywen1@126.com> To: <freebsd-users-jp@FreeBSD.org> Subject: [FreeBSD-users-jp 95829] =?utf-8?q?Save_your_cost_with_Kingfast_SSD?= Message-ID: <ff6f7e858a570f49a56fed27090bd6cf38c.20160630071752@mail67.atl11.rsgsv.net>
next in thread | raw e-mail | index | archive | help
View this email in your browser (http://us13.campaign-archive1.com/?u=3Dff= 6f7e858a570f49a56fed270&id=3D5b0bf11266&e=3D90bd6cf38c) ** A Letter From The Sales Manager ------------------------------------------------------------ Dear Friend=2C Good Day. This is Abby from Kingfast SSD=2C we are one of the leading and profession= al manufacturer of High-Tech SSD(Solid State Drive) products in China. We= provide a wide range of SSD products with different interfaces/capacities= to Consumer=2C enterprise and industrial customers. Our Advantage: KingFast provide 3 year warranty for ALL SSDs. KingFast built a longterm business with customers around the world. KingFast would like to join you to get win win. Please contact us if any interest for more information about product=2C da= ta sheet and prices. Thank and Regards=2C Sincerely=2C Abby Wen Sales Manager=2C Kingfast SSD Manufacturer =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D Copyright =C2=A9 2016=2C Kingfast SSD Manufacturer=2C All rights reserved. Our mailing address is: abby@kfast.com.cn | abbyw@kfast.com.cn This email was sent to freebsd-users-jp@FreeBSD.org (mailto:freebsd-users-jp@FreeBSD.org) why did I get this? (http://kfast.us13.list-manage.com/about?u=3Dff6f7e858= a570f49a56fed270&id=3Ddbd878d97a&e=3D90bd6cf38c&c=3D5b0bf11266) unsubscr= ibe from this list (http://kfast.us13.list-manage.com/unsubscribe?u=3Dff6f= 7e858a570f49a56fed270&id=3Ddbd878d97a&e=3D90bd6cf38c&c=3D5b0bf11266) upd= ate subscription preferences (http://kfast.us13.list-manage.com/profile?u= =3Dff6f7e858a570f49a56fed270&id=3Ddbd878d97a&e=3D90bd6cf38c) Shenzhen New KingFast Storage Technology CO.=2CLtd . #601=2C2rd building= =2CBlock A=2C Bao'an Internet industry park=2CBao'An District . Shenzhen= =2C 44 518000 . China Email Marketing Powered by MailChimp http://www.mailchimp.com/monkey-rewards/?utm_source=3Dfreemium_newsletter&= utm_medium=3Demail&utm_campaign=3Dmonkey_rewards&aid=3Dff6f7e858a570f49a56= fed270&afl=3D1 From owner-freebsd-users-jp@freebsd.org Thu Jun 30 08:39:55 2016 Return-Path: <owner-freebsd-users-jp@freebsd.org> Delivered-To: freebsd-users-jp@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id F3AECB87851 for <freebsd-users-jp@mailman.ysv.freebsd.org>; Thu, 30 Jun 2016 08:39:55 +0000 (UTC) (envelope-from maruyama@ism.ac.jp) Received: from garbha.ism.ac.jp (garbha.ism.ac.jp [133.58.120.13]) by mx1.freebsd.org (Postfix) with ESMTP id 964022FE7 for <freebsd-users-jp@freebsd.org>; Thu, 30 Jun 2016 08:39:55 +0000 (UTC) (envelope-from maruyama@ism.ac.jp) Received: from indra.ism.ac.jp (garbha.ism.ac.jp [133.58.120.13]) by garbha.ism.ac.jp (8.15.2/8.15.2) with ESMTPS id u5U8dqdO054223 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Thu, 30 Jun 2016 17:39:52 +0900 (JST) (envelope-from maruyama@ism.ac.jp) Received: (from maruyama@localhost) by indra.ism.ac.jp (8.15.2/8.15.2/Submit) id u5U8dpjF016375; Thu, 30 Jun 2016 17:39:51 +0900 (JST) (envelope-from maruyama@ism.ac.jp) X-Authentication-Warning: indra.ism.ac.jp: maruyama set sender to maruyama@ism.ac.jp using -f From: maruyama@ism.ac.jp (=?iso-2022-jp?B?GyRCNF07M0Q+PjsbKEI=?=) To: Akihiro HIRANO <hirano@t.kanazawa-u.ac.jp> Cc: freebsd-users-jp@freebsd.org In-Reply-To: <54a8b85f-54a4-0761-3acb-5acbcaccc534@t.kanazawa-u.ac.jp> (message from Akihiro HIRANO on Thu, 30 Jun 2016 16:12:43 +0900) Organization: =?iso-2022-jp?B?GyRCRX03Vz90TX04JjVmPWobKEI=?= Reply-To: maruyama@ism.ac.jp Date: Thu, 30 Jun 2016 17:39:51 +0900 Message-ID: <ydlk2h783zc.fsf@indra.ism.ac.jp> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-2022-jp Subject: [FreeBSD-users-jp 95830] Re: =?iso-2022-jp?b?aXBmdxskQiRIGyhCRE5T?= X-BeenThere: freebsd-users-jp@freebsd.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: Discussion relevant to FreeBSD communities in Japan <freebsd-users-jp.freebsd.org> List-Unsubscribe: <https://lists.freebsd.org/mailman/options/freebsd-users-jp>, <mailto:freebsd-users-jp-request@freebsd.org?subject=unsubscribe> List-Archive: <http://lists.freebsd.org/pipermail/freebsd-users-jp/> List-Post: <mailto:freebsd-users-jp@freebsd.org> List-Help: <mailto:freebsd-users-jp-request@freebsd.org?subject=help> List-Subscribe: <https://lists.freebsd.org/mailman/listinfo/freebsd-users-jp>, <mailto:freebsd-users-jp-request@freebsd.org?subject=subscribe> X-List-Received-Date: Thu, 30 Jun 2016 08:39:56 -0000 $BJ?Ln(B $BMM(B $B4];3$G$9!#(B Thu, 30 Jun 2016 16:12:43 +0900 Akihiro HIRANO <hirano@t.kanazawa-u.ac.jp> writes: >$B!!;Y>c$,$J$1$l$P!"!V(Bipfw list$B!W$N7k2L$r<($7$FD:$/$N$,AaF;$@$H;W$$$^$9!#(B $B$O$$!#(B $B<B83(B1(PC-BSD10.3) /etc/ipfw.custom (PC-BSD$B$N=P2YCM!"Cf$O%3%a%s%H$@$1(B) /etc/ipfw.openports (PC-BSD$B$N=P2YCM!"(Budp 5353, tcp 22$B$@$1(B) /etc/ipfw.rules (PC-BSD$B$N=P2YCM!"$3$N%a!<%k$NKvHx$KF1Iu(B) # ipfw list 00020 allow ip from any to any via lo0 01000 check-state 01050 allow tcp from any to any established 01100 allow udp from any to any established 02000 allow ip from any to any out keep-state 02050 allow ip6 from any to any out keep-state 02100 allow ipv6-icmp from any to any keep-state 02150 allow icmp from any to any keep-state 10000 allow udp from any to any dst-port 5353 in keep-state 10001 allow tcp from any to any dst-port 22 in keep-state 64000 deny log ip from any to any 65535 allow ip from any to any $B$3$N>uBV$G$O(B dig @133.58.32.12 ism.ac.jp ns $B$O@5>o$K7k2L$rI=<(!#(B $B<B83(B2(PC-BSD10.3) /etc/ipfw.custom ipfw -q add 110 allow ip from 133.58.124.49 to any $B$@$1!#$3$3$K!!(B133.58.124.49 $B$O(B DNS$B%5!<%P!<(B 133.58.32.12 $B$K7R$,$k%$%s%?!<(B $B%U%'!<%9!#(B /etc/ipfw.openports (PC-BSD$B$N=P2YCM!"(Budp 5353, tcp 22$B$@$1(B) /etc/ipfw.rules (PC-BSD$B$N=P2YCM!"$3$N%a!<%k$NKvHx$KF1Iu(B) # ipfw list 00020 allow ip from any to any via lo0 00110 allow ip from 133.58.124.49 to any 01000 check-state 01050 allow tcp from any to any established 01100 allow udp from any to any established 02000 allow ip from any to any out keep-state 02050 allow ip6 from any to any out keep-state 02100 allow ipv6-icmp from any to any keep-state 02150 allow icmp from any to any keep-state 10000 allow udp from any to any dst-port 5353 in keep-state 10001 allow tcp from any to any dst-port 22 in keep-state 64000 deny log ip from any to any 65535 allow ip from any to any $B$3$N$H$-!"(B % dig @133.58.32.12 ism.ac.jp ns ; <<>> DiG 9.10.3-P4 <<>> @133.58.32.12 ism.ac.jp ns ; (1 server found) ;; global options: +cmd ;; connection timed out; no servers could be reached ---------------------------------------------------------------- /etc/ipfw.rules $B$N(BPC-BSD$B$N=P2YCM(B ---------------------------------------------------------------- #!/bin/sh # To re-apply rules, you can run "sh /etc/ipfw.rules" # Flush out the list before we begin. ipfw -q -f flush # Set rules command prefix cmd="ipfw -q add" # No restrictions on loopback #################################################################### $cmd 00020 allow all from any to any via lo0 #################################################################### # Check the state of packets #################################################################### $cmd 01000 check-state $cmd 01050 allow tcp from any to any established $cmd 01100 allow udp from any to any established #################################################################### # Allow all outgoing packets #################################################################### $cmd 02000 allow ip from any to any out keep-state $cmd 02050 allow ip6 from any to any out keep-state $cmd 02100 allow ipv6-icmp from any to any keep-state $cmd 02150 allow icmp from any to any keep-state #################################################################### # Allow specific ports IN now # Add items to /etc/ipfw.openports in the format # {tcp|udp} <portnum> #################################################################### nextnum=10000 if [ -e "/etc/ipfw.openports" ] ; then while read line do echo $line | grep -q "^#" if [ $? -eq 0 ] ; then continue ; fi proto="`echo $line | awk '{print $1}'`" port="`echo $line | awk '{print $2}'`" if [ -z "$proto" -o -z "$port" ] ; then continue ; fi $cmd $nextnum allow $proto from any to any $port in keep-state nextnum=`expr $nextnum + 1` done < /etc/ipfw.openports fi #################################################################### # Allow specific IPs incoming traffic now (Used for jails mainly) # Add items to /etc/ipfw.openip in the format # {ip4|ip6} <ip> #################################################################### nextnum=20000 if [ -e "/etc/ipfw.openip" ] ; then while read line do echo $line | grep -q "^#" if [ $? -eq 0 ] ; then continue ; fi proto="`echo $line | awk '{print $1}'`" ip="`echo $line | awk '{print $2}'`" if [ -z "$proto" -o -z "$ip" ] ; then continue ; fi $cmd $nextnum allow $proto from any to $ip in keep-state nextnum=`expr $nextnum + 1` done < /etc/ipfw.openip fi #################################################################### # Deny all other incoming troublemakers #################################################################### $cmd 64000 deny log all from any to any #################################################################### # Check for user custom rules if [ -e "/etc/ipfw.custom" ] ; then sh /etc/ipfw.custom fi -------- $B4];3D>>;!wE}7W?tM}8&5f=j(B
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?ff6f7e858a570f49a56fed27090bd6cf38c.20160630071752>