Date: Sat, 20 Nov 2004 20:22:49 -0800 From: Andrew Konstantinov <abkonstantinov@earthlink.net> To: freebsd-security@freebsd.org Subject: Re: Importing into rc.firewal rules Message-ID: <20041121042249.GA37865@root.kableu.com> In-Reply-To: <20041120133048.N7533@zoraida.natserv.net> References: <20041120133048.N7533@zoraida.natserv.net>
next in thread | previous in thread | raw e-mail | index | archive | help
--pWyiEgJYm5f9v55/ Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Sat, Nov 20, 2004 at 01:32:15PM -0500, Francisco Reyes wrote: > I have a grown list of IPs that I am "deny ip from ###.### to any". > Infected machines, hackers, etc.. >=20 > Is there a way to have this list outside of rc.firewall and just read it= =20 > in? I don't know how strong your bond with ipfw is, but it seems like pf has exactly what you need. For example: #--- excerpts from pf documentation --- Tables can also be populated from text files containing a list of IP addres= ses and networks: table <spammers> persist file "/etc/spammers" block in on fxp0 from <spammers> to any Tables can be manipulated on the fly by using pfctl(8). For instance, to add entries to the <spammers> table created above: # pfctl -t spammers -T add 218.70.0.0/16 #--- excerpts from pf documentation --- If ipfw isn't a tradition in your family, you might want to consider switch= ing to pf for those specific needs. :) Andrew --pWyiEgJYm5f9v55/ Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.6 (FreeBSD) iD8DBQFBoBgZ5Jhyz2/cFigRAlxtAKD8FAhpdXFrs6Y33M6u8WU3iq0jAQCgzkVZ ec5M8IeYwzsQFlu7Ts833XY= =Ch70 -----END PGP SIGNATURE----- --pWyiEgJYm5f9v55/--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20041121042249.GA37865>