From owner-freebsd-hackers Tue Sep 17 23:22:01 1996 Return-Path: owner-hackers Received: (from root@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id XAA27075 for hackers-outgoing; Tue, 17 Sep 1996 23:22:01 -0700 (PDT) Received: from cheops.anu.edu.au (avalon@cheops.anu.edu.au [150.203.76.24]) by freefall.freebsd.org (8.7.5/8.7.3) with ESMTP id XAA26942 for ; Tue, 17 Sep 1996 23:21:44 -0700 (PDT) Message-Id: <199609180621.XAA26942@freefall.freebsd.org> Received: by cheops.anu.edu.au (1.37.109.16/16.2) id AA110847661; Wed, 18 Sep 1996 16:21:01 +1000 From: Darren Reed Subject: Re: IPFW !IP# To: adam@veda.is (Adam David) Date: Wed, 18 Sep 1996 16:21:01 +1000 (EST) Cc: freebsd-hackers@freebsd.org In-Reply-To: <199609180251.CAA11480@veda.is> from "Adam David" at Sep 18, 96 02:51:28 am X-Mailer: ELM [version 2.4 PL23] Content-Type: text Sender: owner-hackers@freebsd.org X-Loop: FreeBSD.org Precedence: bulk In some mail from Adam David, sie said: > > I can implement exclusion of a block of IP addresses at low execution cost. > Does anyone dislike this idea? Which flags mask would be more preferred for > this purpose, 0xc000 or 0x0003? (does anything already use 0x0003?) > Are the unused flags perhaps reserved for something more useful than this? > > # ipfw add deny all from !${my_network}:${my_netmask} to any out via ${gate_if} > # ipfw add deny all from any to !${my_network}:${my_netmask} in via ${gate_if} > > This set of 2 rules would otherwise take 48 rules to enforce for a class C > network with a single domain gateway, for instance. This is just rule writing. HOw about: # ipfw add pass all from ${my_network}:${my_netmask} to any out via ${gate_if} # ipfw add pass all from any to ${my_network}:${my_netmask} in via ${gate_if} # ipfw add deny all from any to any out via ${gate_if} # ipfw add deny all from any to any in via ${gate_if} Darren