From owner-freebsd-security Thu May 10 2:13:53 2001 Delivered-To: freebsd-security@freebsd.org Received: from flood.ping.uio.no (flood.ping.uio.no [129.240.78.31]) by hub.freebsd.org (Postfix) with ESMTP id A5C3937B423 for ; Thu, 10 May 2001 02:13:49 -0700 (PDT) (envelope-from des@ofug.org) Received: (from des@localhost) by flood.ping.uio.no (8.9.3/8.9.3) id LAA64606; Thu, 10 May 2001 11:13:40 +0200 (CEST) (envelope-from des@ofug.org) X-URL: http://www.ofug.org/~des/ X-Disclaimer: The views expressed in this message do not necessarily coincide with those of any organisation or company with which I am or have been affiliated. To: nate@yogotech.com (Nate Williams) Cc: Michael Sharp , FreeBSD-security@FreeBSD.ORG Subject: Re: Ip filtering with ipfw References: <20010509160500.7232.cpmta@c000.sfo.cp.net> <15097.44134.876784.259823@nomad.yogotech.com> From: Dag-Erling Smorgrav Date: 10 May 2001 11:13:39 +0200 In-Reply-To: <15097.44134.876784.259823@nomad.yogotech.com> Message-ID: Lines: 17 User-Agent: Gnus/5.0808 (Gnus v5.8.8) Emacs/20.7 MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Nate Williams writes: > This is the default 'open' setup, yes, and happens because you added the > following (mentioned in another email). > > > SO, from /etc/rc.firewall I added IPFIREWALL_DEFAULT_TO_ACCEPT to my > > kernel and recompiled. > > Otherwise, rule 65000 wouldn't have existed. Wrong. The ruleset above is from a machine that doesn't have IPFIREWALL_DEFAULT_TO_ACCEPT, otherwise rule 65535 would be "allow ip from any to any" instead of "deny ip from any to any". Rule 65000 was added by /etc/rc.firewall, which knows nothing about kernel options. DES -- Dag-Erling Smorgrav - des@ofug.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message