From owner-freebsd-bugs Fri Jun 4 16:21:52 1999 Delivered-To: freebsd-bugs@freebsd.org Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (Postfix) with ESMTP id 1CC4D155C3; Fri, 4 Jun 1999 16:21:14 -0700 (PDT) (envelope-from ru@FreeBSD.org) Received: (from ru@localhost) by freefall.freebsd.org (8.9.3/8.9.2) id QAA96332; Fri, 4 Jun 1999 16:21:13 -0700 (PDT) (envelope-from ru@FreeBSD.org) Date: Fri, 4 Jun 1999 16:21:13 -0700 (PDT) From: Message-Id: <199906042321.QAA96332@freefall.freebsd.org> To: cschuber@uumail.gov.bc.ca, ru@FreeBSD.org, freebsd-bugs@FreeBSD.org Subject: Re: conf/7928: Patch to allow execution of an IPFW shell script Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Synopsis: Patch to allow execution of an IPFW shell script State-Changed-From-To: open->feedback State-Changed-By: ru State-Changed-When: Fri Jun 4 16:18:28 PDT 1999 State-Changed-Why: Why not just specify your script in ``firewall_script'' variable? To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message