From owner-freebsd-users-jp@freebsd.org Thu Jun 30 07:18:03 2016 Return-Path: Delivered-To: freebsd-users-jp@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 2146FB8666B for ; Thu, 30 Jun 2016 07:18:03 +0000 (UTC) (envelope-from bounce-mc.us13_56657121.317381-freebsd-users-jp=FreeBSD.org@mail67.atl11.rsgsv.net) Received: from mail67.atl11.rsgsv.net (mail67.atl11.rsgsv.net [205.201.133.67]) by mx1.freebsd.org (Postfix) with ESMTP id DB2E82003 for ; Thu, 30 Jun 2016 07:18:02 +0000 (UTC) (envelope-from bounce-mc.us13_56657121.317381-freebsd-users-jp=FreeBSD.org@mail67.atl11.rsgsv.net) DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; s=k1; d=mail67.atl11.rsgsv.net; h=Subject:From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=abbywen1=3D126.com@mail67.atl11.rsgsv.net; bh=3zy60vLmBy3ho/7HCGLwo72Owvw=; b=s9FUShp/yB1gpcV/y2+w296XDl96xP1CuLPRp2sKykyQF9LT9ugR7VOpXK5FjFCZOvajtB9cItYW 80vgF/4phEnhQFmEX4ezAL29lzqYGhXyrsD1xsTjZD/jDyTeMi4CXRdyxyfqodIKRPc4PwKAwNNO 3JWnizA+uvq1pc8ghYI= Received: from (127.0.0.1) by mail67.atl11.rsgsv.net id hej3qk1lgi0n for ; Thu, 30 Jun 2016 07:18:00 +0000 (envelope-from ) From: =?utf-8?Q?Abby=20|=20Kingfast=20SSD?= Reply-To: =?utf-8?Q?Abby=20|=20Kingfast=20SSD?= To: Date: Thu, 30 Jun 2016 07:18:00 +0000 Message-ID: X-Mailer: MailChimp Mailer - **CID5b0bf1126690bd6cf38c** X-Campaign: mailchimpff6f7e858a570f49a56fed270.5b0bf11266 X-campaignid: mailchimpff6f7e858a570f49a56fed270.5b0bf11266 X-Report-Abuse: Please report abuse for this campaign here: http://www.mailchimp.com/abuse/abuse.phtml?u=ff6f7e858a570f49a56fed270&id=5b0bf11266&e=90bd6cf38c X-MC-User: ff6f7e858a570f49a56fed270 X-Feedback-ID: 56657121:56657121.317381:us13:mc X-Accounttype: ff Sender: "Abby | Kingfast SSD" x-mcda: FALSE MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8"; format="fixed" Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.22 Subject: [FreeBSD-users-jp 95829] =?utf-8?q?Save_your_cost_with_Kingfast_SSD?= X-BeenThere: freebsd-users-jp@freebsd.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: Discussion relevant to FreeBSD communities in Japan List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 30 Jun 2016 07:18:03 -0000 View this email in your browser (http://us13.campaign-archive1.com/?u=3Dff= 6f7e858a570f49a56fed270&id=3D5b0bf11266&e=3D90bd6cf38c) ** A Letter From The Sales Manager ------------------------------------------------------------ Dear Friend=2C Good Day. This is Abby from Kingfast SSD=2C we are one of the leading and profession= al manufacturer of High-Tech SSD(Solid State Drive) products in China. We= provide a wide range of SSD products with different interfaces/capacities= to Consumer=2C enterprise and industrial customers. Our Advantage: KingFast provide 3 year warranty for ALL SSDs. KingFast built a longterm business with customers around the world. KingFast would like to join you to get win win. Please contact us if any interest for more information about product=2C da= ta sheet and prices. Thank and Regards=2C Sincerely=2C Abby Wen Sales Manager=2C Kingfast SSD Manufacturer =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D Copyright =C2=A9 2016=2C Kingfast SSD Manufacturer=2C All rights reserved. Our mailing address is: abby@kfast.com.cn | abbyw@kfast.com.cn This email was sent to freebsd-users-jp@FreeBSD.org (mailto:freebsd-users-jp@FreeBSD.org) why did I get this? (http://kfast.us13.list-manage.com/about?u=3Dff6f7e858= a570f49a56fed270&id=3Ddbd878d97a&e=3D90bd6cf38c&c=3D5b0bf11266) unsubscr= ibe from this list (http://kfast.us13.list-manage.com/unsubscribe?u=3Dff6f= 7e858a570f49a56fed270&id=3Ddbd878d97a&e=3D90bd6cf38c&c=3D5b0bf11266) upd= ate subscription preferences (http://kfast.us13.list-manage.com/profile?u= =3Dff6f7e858a570f49a56fed270&id=3Ddbd878d97a&e=3D90bd6cf38c) Shenzhen New KingFast Storage Technology CO.=2CLtd . #601=2C2rd building= =2CBlock A=2C Bao'an Internet industry park=2CBao'An District . Shenzhen= =2C 44 518000 . China Email Marketing Powered by MailChimp http://www.mailchimp.com/monkey-rewards/?utm_source=3Dfreemium_newsletter&= utm_medium=3Demail&utm_campaign=3Dmonkey_rewards&aid=3Dff6f7e858a570f49a56= fed270&afl=3D1 From owner-freebsd-users-jp@freebsd.org Thu Jun 30 08:39:55 2016 Return-Path: Delivered-To: freebsd-users-jp@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id F3AECB87851 for ; Thu, 30 Jun 2016 08:39:55 +0000 (UTC) (envelope-from maruyama@ism.ac.jp) Received: from garbha.ism.ac.jp (garbha.ism.ac.jp [133.58.120.13]) by mx1.freebsd.org (Postfix) with ESMTP id 964022FE7 for ; Thu, 30 Jun 2016 08:39:55 +0000 (UTC) (envelope-from maruyama@ism.ac.jp) Received: from indra.ism.ac.jp (garbha.ism.ac.jp [133.58.120.13]) by garbha.ism.ac.jp (8.15.2/8.15.2) with ESMTPS id u5U8dqdO054223 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Thu, 30 Jun 2016 17:39:52 +0900 (JST) (envelope-from maruyama@ism.ac.jp) Received: (from maruyama@localhost) by indra.ism.ac.jp (8.15.2/8.15.2/Submit) id u5U8dpjF016375; Thu, 30 Jun 2016 17:39:51 +0900 (JST) (envelope-from maruyama@ism.ac.jp) X-Authentication-Warning: indra.ism.ac.jp: maruyama set sender to maruyama@ism.ac.jp using -f From: maruyama@ism.ac.jp (=?iso-2022-jp?B?GyRCNF07M0Q+PjsbKEI=?=) To: Akihiro HIRANO Cc: freebsd-users-jp@freebsd.org In-Reply-To: <54a8b85f-54a4-0761-3acb-5acbcaccc534@t.kanazawa-u.ac.jp> (message from Akihiro HIRANO on Thu, 30 Jun 2016 16:12:43 +0900) Organization: =?iso-2022-jp?B?GyRCRX03Vz90TX04JjVmPWobKEI=?= Reply-To: maruyama@ism.ac.jp Date: Thu, 30 Jun 2016 17:39:51 +0900 Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset=iso-2022-jp Subject: [FreeBSD-users-jp 95830] Re: =?iso-2022-jp?b?aXBmdxskQiRIGyhCRE5T?= X-BeenThere: freebsd-users-jp@freebsd.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: Discussion relevant to FreeBSD communities in Japan List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 30 Jun 2016 08:39:56 -0000 平野 様 丸山です。 Thu, 30 Jun 2016 16:12:43 +0900 Akihiro HIRANO writes: > 支障がなければ、「ipfw list」の結果を示して頂くのが早道だと思います。 はい。 実験1(PC-BSD10.3) /etc/ipfw.custom (PC-BSDの出荷値、中はコメントだけ) /etc/ipfw.openports (PC-BSDの出荷値、udp 5353, tcp 22だけ) /etc/ipfw.rules (PC-BSDの出荷値、このメールの末尾に同封) # ipfw list 00020 allow ip from any to any via lo0 01000 check-state 01050 allow tcp from any to any established 01100 allow udp from any to any established 02000 allow ip from any to any out keep-state 02050 allow ip6 from any to any out keep-state 02100 allow ipv6-icmp from any to any keep-state 02150 allow icmp from any to any keep-state 10000 allow udp from any to any dst-port 5353 in keep-state 10001 allow tcp from any to any dst-port 22 in keep-state 64000 deny log ip from any to any 65535 allow ip from any to any この状態では dig @133.58.32.12 ism.ac.jp ns は正常に結果を表示。 実験2(PC-BSD10.3) /etc/ipfw.custom ipfw -q add 110 allow ip from 133.58.124.49 to any だけ。ここに 133.58.124.49 は DNSサーバー 133.58.32.12 に繋がるインター フェース。 /etc/ipfw.openports (PC-BSDの出荷値、udp 5353, tcp 22だけ) /etc/ipfw.rules (PC-BSDの出荷値、このメールの末尾に同封) # ipfw list 00020 allow ip from any to any via lo0 00110 allow ip from 133.58.124.49 to any 01000 check-state 01050 allow tcp from any to any established 01100 allow udp from any to any established 02000 allow ip from any to any out keep-state 02050 allow ip6 from any to any out keep-state 02100 allow ipv6-icmp from any to any keep-state 02150 allow icmp from any to any keep-state 10000 allow udp from any to any dst-port 5353 in keep-state 10001 allow tcp from any to any dst-port 22 in keep-state 64000 deny log ip from any to any 65535 allow ip from any to any このとき、 % dig @133.58.32.12 ism.ac.jp ns ; <<>> DiG 9.10.3-P4 <<>> @133.58.32.12 ism.ac.jp ns ; (1 server found) ;; global options: +cmd ;; connection timed out; no servers could be reached ---------------------------------------------------------------- /etc/ipfw.rules のPC-BSDの出荷値 ---------------------------------------------------------------- #!/bin/sh # To re-apply rules, you can run "sh /etc/ipfw.rules" # Flush out the list before we begin. ipfw -q -f flush # Set rules command prefix cmd="ipfw -q add" # No restrictions on loopback #################################################################### $cmd 00020 allow all from any to any via lo0 #################################################################### # Check the state of packets #################################################################### $cmd 01000 check-state $cmd 01050 allow tcp from any to any established $cmd 01100 allow udp from any to any established #################################################################### # Allow all outgoing packets #################################################################### $cmd 02000 allow ip from any to any out keep-state $cmd 02050 allow ip6 from any to any out keep-state $cmd 02100 allow ipv6-icmp from any to any keep-state $cmd 02150 allow icmp from any to any keep-state #################################################################### # Allow specific ports IN now # Add items to /etc/ipfw.openports in the format # {tcp|udp} #################################################################### nextnum=10000 if [ -e "/etc/ipfw.openports" ] ; then while read line do echo $line | grep -q "^#" if [ $? -eq 0 ] ; then continue ; fi proto="`echo $line | awk '{print $1}'`" port="`echo $line | awk '{print $2}'`" if [ -z "$proto" -o -z "$port" ] ; then continue ; fi $cmd $nextnum allow $proto from any to any $port in keep-state nextnum=`expr $nextnum + 1` done < /etc/ipfw.openports fi #################################################################### # Allow specific IPs incoming traffic now (Used for jails mainly) # Add items to /etc/ipfw.openip in the format # {ip4|ip6} #################################################################### nextnum=20000 if [ -e "/etc/ipfw.openip" ] ; then while read line do echo $line | grep -q "^#" if [ $? -eq 0 ] ; then continue ; fi proto="`echo $line | awk '{print $1}'`" ip="`echo $line | awk '{print $2}'`" if [ -z "$proto" -o -z "$ip" ] ; then continue ; fi $cmd $nextnum allow $proto from any to $ip in keep-state nextnum=`expr $nextnum + 1` done < /etc/ipfw.openip fi #################################################################### # Deny all other incoming troublemakers #################################################################### $cmd 64000 deny log all from any to any #################################################################### # Check for user custom rules if [ -e "/etc/ipfw.custom" ] ; then sh /etc/ipfw.custom fi -------- 丸山直昌@統計数理研究所