From owner-freebsd-questions@FreeBSD.ORG Sat Mar 18 19:02:46 2006 Return-Path: X-Original-To: questions@freebsd.org Delivered-To: freebsd-questions@FreeBSD.ORG Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 744A316A422 for ; Sat, 18 Mar 2006 19:02:46 +0000 (UTC) (envelope-from infofarmer@gmail.com) Received: from zproxy.gmail.com (zproxy.gmail.com [64.233.162.206]) by mx1.FreeBSD.org (Postfix) with ESMTP id 7EE6D43D73 for ; Sat, 18 Mar 2006 19:02:40 +0000 (GMT) (envelope-from infofarmer@gmail.com) Received: by zproxy.gmail.com with SMTP id 14so817648nzn for ; Sat, 18 Mar 2006 11:02:39 -0800 (PST) DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:to:subject:mime-version:content-type:content-transfer-encoding:content-disposition; b=mv3EwkEMAFoD0htOa4QBnhXA1rXhplVwdYB2jTyV9VuTc3F0KhjLsYjh8c4p9a8m1wR1jd48FcavH4+zQ02yYR6IhiPIDnRGAuUB7eUiUlp6L6RdVLGKGqWSB6xrdRrH3TrLCID1nTfRFJW70vmshCI8MAOnrq7Tl7dmiKTT65k= Received: by 10.36.48.9 with SMTP id v9mr5570492nzv; Sat, 18 Mar 2006 11:02:39 -0800 (PST) Received: by 10.37.22.74 with HTTP; Sat, 18 Mar 2006 11:02:39 -0800 (PST) Message-ID: Date: Sat, 18 Mar 2006 22:02:39 +0300 From: "Andrew Pantyukhin" To: "FreeBSD Questions" MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Content-Disposition: inline Cc: Subject: IPSec NFS X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 18 Mar 2006 19:02:46 -0000 I use IPSec to secure rw access to NFS shares. What would you suggest to ensure that in no case whatsoever non-ipsec packet gets to NFS? I can use require-level policies and I can tell ipfw to only pass ipsec, but what if ipfw and setkey somehow fail, even for a few minutes? Should I rely on that not happening? Thanks!