Skip site navigation (1)Skip section navigation (2)
Date:      15 Jul 2002 16:25:36 +0200
From:      Dag-Erling Smorgrav <des@ofug.org>
To:        "Dmitry S. Rzhavin" <dima@rt.ru>
Cc:        security@FreeBSD.ORG
Subject:   Re: ipfw and keep-state
Message-ID:  <xzp1ya583vj.fsf@flood.ping.uio.no>
In-Reply-To: <3D32D849.E3D8F2BE@rt.ru>
References:  <3D32D849.E3D8F2BE@rt.ru>

next in thread | previous in thread | raw e-mail | index | archive | help
"Dmitry S. Rzhavin" <dima@rt.ru> writes:
> 10 pass tcp from any to ip2 in keep-state setup
> ... nothing interesting here
> 20 deny tcp from any to ip2
> 
> 
> Or, in other words, I want to pre-auth some packet with rile 10 to
> check it later. Then, I decide to drop it. 
> But ipfw creates dynamic rule "inet <-> ip1" and passes this
> session. I think this is not good. Why does ipfw works this way?

That's what you asked it to do.  Rule 10 basically says "if the packet
is a tcp SYN packet destined for ip2, stop examining it, let it
through, and remember to let all similar packets through in the
future"

DES
-- 
Dag-Erling Smorgrav - des@ofug.org

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?xzp1ya583vj.fsf>