Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 30 Jun 2016 07:18:00 +0000
From:      =?utf-8?Q?Abby=20|=20Kingfast=20SSD?= <abbywen1@126.com>
To:        <freebsd-users-jp@FreeBSD.org>
Subject:   [FreeBSD-users-jp 95829] =?utf-8?q?Save_your_cost_with_Kingfast_SSD?=
Message-ID:  <ff6f7e858a570f49a56fed27090bd6cf38c.20160630071752@mail67.atl11.rsgsv.net>

next in thread | raw e-mail | index | archive | help

View this email in your browser (http://us13.campaign-archive1.com/?u=ff6f7e858a570f49a56fed270&id=5b0bf11266&e=90bd6cf38c)


** A Letter From The Sales Manager
------------------------------------------------------------
Dear Friend,

Good Day.

This is Abby from Kingfast SSD, we are one of the leading and professional manufacturer of High-Tech SSD(Solid State Drive) products in China. We provide a wide range of SSD products with different interfaces/capacities to Consumer, enterprise and industrial customers.

Our Advantage:
KingFast provide 3 year warranty for ALL SSDs.
KingFast built a longterm business with customers around the world.
KingFast would like to join you to get win win.

Please contact us if any interest for more information about product, data sheet and prices.

Thank and Regards,

Sincerely,

Abby Wen
Sales Manager, Kingfast SSD Manufacturer

============================================================
Copyright © 2016, Kingfast SSD Manufacturer, All rights reserved.

Our mailing address is:
abby@kfast.com.cn | abbyw@kfast.com.cn

This email was sent to freebsd-users-jp@FreeBSD.org (mailto:freebsd-users-jp@FreeBSD.org)
why did I get this? (http://kfast.us13.list-manage.com/about?u=ff6f7e858a570f49a56fed270&id=dbd878d97a&e=90bd6cf38c&c=5b0bf11266)     unsubscribe from this list (http://kfast.us13.list-manage.com/unsubscribe?u=ff6f7e858a570f49a56fed270&id=dbd878d97a&e=90bd6cf38c&c=5b0bf11266)     update subscription preferences (http://kfast.us13.list-manage.com/profile?u=ff6f7e858a570f49a56fed270&id=dbd878d97a&e=90bd6cf38c)
Shenzhen New KingFast Storage Technology CO.,Ltd . #601,2rd building,Block A, Bao'an Internet industry park,Bao'An District . Shenzhen, 44 518000 . China

Email Marketing Powered by MailChimp
http://www.mailchimp.com/monkey-rewards/?utm_source=freemium_newsletter&utm_medium=email&utm_campaign=monkey_rewards&aid=ff6f7e858a570f49a56fed270&afl=1
From owner-freebsd-users-jp@freebsd.org  Thu Jun 30 08:39:55 2016
Return-Path: <owner-freebsd-users-jp@freebsd.org>
Delivered-To: freebsd-users-jp@mailman.ysv.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
 [IPv6:2001:1900:2254:206a::19:1])
 by mailman.ysv.freebsd.org (Postfix) with ESMTP id F3AECB87851
 for <freebsd-users-jp@mailman.ysv.freebsd.org>;
 Thu, 30 Jun 2016 08:39:55 +0000 (UTC)
 (envelope-from maruyama@ism.ac.jp)
Received: from garbha.ism.ac.jp (garbha.ism.ac.jp [133.58.120.13])
 by mx1.freebsd.org (Postfix) with ESMTP id 964022FE7
 for <freebsd-users-jp@freebsd.org>; Thu, 30 Jun 2016 08:39:55 +0000 (UTC)
 (envelope-from maruyama@ism.ac.jp)
Received: from indra.ism.ac.jp (garbha.ism.ac.jp [133.58.120.13])
 by garbha.ism.ac.jp (8.15.2/8.15.2) with ESMTPS id u5U8dqdO054223
 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits%6 verify=NO);
 Thu, 30 Jun 2016 17:39:52 +0900 (JST)
 (envelope-from maruyama@ism.ac.jp)
Received: (from maruyama@localhost)
 by indra.ism.ac.jp (8.15.2/8.15.2/Submit) id u5U8dpjF016375;
 Thu, 30 Jun 2016 17:39:51 +0900 (JST)
 (envelope-from maruyama@ism.ac.jp)
X-Authentication-Warning: indra.ism.ac.jp: maruyama set sender to
 maruyama@ism.ac.jp using -f
From: maruyama@ism.ac.jp (=?iso-2022-jp?B?GyRCNF07M0Q+PjsbKEI=?=)
To: Akihiro HIRANO <hirano@t.kanazawa-u.ac.jp>
Cc: freebsd-users-jp@freebsd.org
In-Reply-To: <54a8b85f-54a4-0761-3acb-5acbcaccc534@t.kanazawa-u.ac.jp>
 (message from Akihiro HIRANO on Thu, 30 Jun 2016 16:12:43 +0900)
Organization: =?iso-2022-jp?B?GyRCRX03Vz90TX04JjVmPWobKEI=?Reply-To: maruyama@ism.ac.jp
Date: Thu, 30 Jun 2016 17:39:51 +0900
Message-ID: <ydlk2h783zc.fsf@indra.ism.ac.jp>
MIME-Version: 1.0
Content-Type: text/plain; charset=iso-2022-jp
Subject: [FreeBSD-users-jp 95830] Re: =?iso-2022-jp?b?aXBmdxskQiRIGyhCRE5T?X-BeenThere: freebsd-users-jp@freebsd.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Discussion relevant to FreeBSD communities in Japan
 <freebsd-users-jp.freebsd.org>
List-Unsubscribe: <https://lists.freebsd.org/mailman/options/freebsd-users-jp>,
 <mailto:freebsd-users-jp-request@freebsd.org?subject=unsubscribe>
List-Archive: <http://lists.freebsd.org/pipermail/freebsd-users-jp/>;
List-Post: <mailto:freebsd-users-jp@freebsd.org>
List-Help: <mailto:freebsd-users-jp-request@freebsd.org?subject=help>
List-Subscribe: <https://lists.freebsd.org/mailman/listinfo/freebsd-users-jp>,
 <mailto:freebsd-users-jp-request@freebsd.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Jun 2016 08:39:56 -0000

$BJ?Ln(B $BMM(B

$B4];3$G$9!#(B

Thu, 30 Jun 2016 16:12:43 +0900
Akihiro HIRANO <hirano@t.kanazawa-u.ac.jp> writes:

>$B!!;Y>c$,$J$1$l$P!"!V(Bipfw list$B!W$N7k2L$r<($7$FD:$/$N$,AaF;$@$H;W$$$^$9!#(B

$B$O$$!#(B

$B<B83(B1(PC-BSD10.3)
/etc/ipfw.custom        (PC-BSD$B$N=P2YCM!"Cf$O%3%a%s%H$@$1(B)
/etc/ipfw.openports     (PC-BSD$B$N=P2YCM!"(Budp 5353, tcp 22$B$@$1(B)
/etc/ipfw.rules         (PC-BSD$B$N=P2YCM!"$3$N%a!<%k$NKvHx$KF1Iu(B)

# ipfw list
00020 allow ip from any to any via lo0
01000 check-state
01050 allow tcp from any to any established
01100 allow udp from any to any established
02000 allow ip from any to any out keep-state
02050 allow ip6 from any to any out keep-state
02100 allow ipv6-icmp from any to any keep-state
02150 allow icmp from any to any keep-state
10000 allow udp from any to any dst-port 5353 in keep-state
10001 allow tcp from any to any dst-port 22 in keep-state
64000 deny log ip from any to any
65535 allow ip from any to any

$B$3$N>uBV$G$O(B dig @133.58.32.12 ism.ac.jp ns $B$O@5>o$K7k2L$rI=<(!#(B

$B<B83(B2(PC-BSD10.3)
/etc/ipfw.custom
        ipfw -q add 110 allow ip from 133.58.124.49 to any
$B$@$1!#$3$3$K!!(B133.58.124.49 $B$O(B DNS$B%5!<%P!<(B 133.58.32.12 $B$K7R$,$k%$%s%?!<(B
$B%U%'!<%9!#(B
/etc/ipfw.openports     (PC-BSD$B$N=P2YCM!"(Budp 5353, tcp 22$B$@$1(B)
/etc/ipfw.rules         (PC-BSD$B$N=P2YCM!"$3$N%a!<%k$NKvHx$KF1Iu(B)

# ipfw list
00020 allow ip from any to any via lo0
00110 allow ip from 133.58.124.49 to any
01000 check-state
01050 allow tcp from any to any established
01100 allow udp from any to any established
02000 allow ip from any to any out keep-state
02050 allow ip6 from any to any out keep-state
02100 allow ipv6-icmp from any to any keep-state
02150 allow icmp from any to any keep-state
10000 allow udp from any to any dst-port 5353 in keep-state
10001 allow tcp from any to any dst-port 22 in keep-state
64000 deny log ip from any to any
65535 allow ip from any to any

$B$3$N$H$-!"(B

% dig @133.58.32.12 ism.ac.jp ns

; <<>> DiG 9.10.3-P4 <<>> @133.58.32.12 ism.ac.jp ns
; (1 server found)
;; global options: +cmd
;; connection timed out; no servers could be reached

----------------------------------------------------------------
/etc/ipfw.rules $B$N(BPC-BSD$B$N=P2YCM(B
----------------------------------------------------------------
#!/bin/sh
# To re-apply rules, you can run "sh /etc/ipfw.rules"

# Flush out the list before we begin.
ipfw -q -f flush

# Set rules command prefix
cmd="ipfw -q add"

# No restrictions on loopback
####################################################################
$cmd 00020 allow all from any to any via lo0
####################################################################

# Check the state of packets
####################################################################
$cmd 01000 check-state
$cmd 01050 allow tcp from any to any established
$cmd 01100 allow udp from any to any established
####################################################################

# Allow all outgoing packets
####################################################################
$cmd 02000 allow ip from any to any out keep-state
$cmd 02050 allow ip6 from any to any out keep-state
$cmd 02100 allow ipv6-icmp from any to any keep-state
$cmd 02150 allow icmp from any to any keep-state
####################################################################

# Allow specific ports IN now
# Add items to /etc/ipfw.openports in the format
# {tcp|udp} <portnum>
####################################################################
nextnum000
if [ -e "/etc/ipfw.openports" ] ; then
  while read line
  do
    echo $line | grep -q "^#"
    if [ $? -eq 0 ] ; then continue ; fi
    proto="`echo $line | awk '{print $1}'`"
    port="`echo $line | awk '{print $2}'`"
    if [ -z "$proto" -o -z "$port" ] ; then continue ; fi
    $cmd $nextnum allow $proto from any to any $port in keep-state
    nextnum=`expr $nextnum + 1`
  done < /etc/ipfw.openports
fi
####################################################################

# Allow specific IPs incoming traffic now (Used for jails mainly)
# Add items to /etc/ipfw.openip in the format
# {ip4|ip6} <ip>
####################################################################
nextnum 000
if [ -e "/etc/ipfw.openip" ] ; then
  while read line
  do
    echo $line | grep -q "^#"
    if [ $? -eq 0 ] ; then continue ; fi
    proto="`echo $line | awk '{print $1}'`"
    ip="`echo $line | awk '{print $2}'`"
    if [ -z "$proto" -o -z "$ip" ] ; then continue ; fi
    $cmd $nextnum allow $proto from any to $ip in keep-state
    nextnum=`expr $nextnum + 1`
  done < /etc/ipfw.openip
fi
####################################################################


# Deny all other incoming troublemakers
####################################################################
$cmd 64000 deny log all from any to any
####################################################################

# Check for user custom rules
if [ -e "/etc/ipfw.custom" ] ; then
  sh /etc/ipfw.custom
fi

--------
$B4];3D>>;!wE}7W?tM}8&5f=j(B



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?ff6f7e858a570f49a56fed27090bd6cf38c.20160630071752>