Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 30 Mar 2004 05:44:55 -0000
From:      Wes Peters <wes@softweyr.com>
To:        darrenr@FreeBSD.org (Darren Reed)
Cc:        Sam Leffler <sam@errno.com>
Subject:   Re: ideal firewall solution
Message-ID:  <200403082237.32608.wes@softweyr.com>
In-Reply-To: <20040309041200.41CB516A4CF@hub.freebsd.org>
References:  <20040309041200.41CB516A4CF@hub.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Monday 08 March 2004 08:12 pm, Darren Reed wrote:
> In some mail I received from Sam Leffler, sie wrote
>
> > > To me there is no clear winner.
>
> Agreed.  The question that should have been asked and clearly
> answered is:
>
> What does FreeBSD gain from having pf in the base tree ?
>
> > > Honestly, i believe that the microcode-based approach of ipfw2 is
> > > a lot simpler to maintain and extend than the one used in pf
> > > (which resembles a lot the original ipfw), and dropping it would
> > > be a step backward.
> > > ipfw2 has some instructions (e.g. the 'address set') that greatly
> > > simplify the writing of rulesets.
>
> Has anone reviewed the Checkpoint patent with respect to whether
> or not ipfw2 violates it ?
>
> They patent an instruction/virtual mechanism for evaluating filter
> rules that is compiled by some user program.  I haven't looked at
> it in detail because ipfw2 isn't my area of responsiblity but
> someone should (if they haven't.)  When/if that is done, if someone
> can think about what it would be to use BPF instead of ipfw2 and
> if that makes any difference to the Checkpoint patent, I'd be
> further interested to know.  Patent #5,606,668 - read clause 8.

Probably unenforceable, because as written it falls all over the earlier 
work done in bpf and other sources.  If they had patented it as a unique 
application of packet filtering, it would probably fare better.  As it 
is, claim 8 is almost exactly a description of the workings of BPF or any 
other microcoded filter, with the exception of the words "security rule."

IANAL, this is based on my (very probably shaky) memory of a legal 
analysis done 6 years ago, at an employer where we were developing very 
similar "code" to go in an ASIC while being a Checkpoint FW-1 source 
customer.  Sticky ground all around.

-- 

        Where am I, and what am I doing in this handbasket?

Wes Peters                                               wes@softweyr.com



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200403082237.32608.wes>