Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 26 Jan 2001 00:05:58 -0600
From:      Bill Fumerola <billf@mu.org>
To:        Justin Stanford <jus@security.za.net>
Cc:        questions@freebsd.org, security@freebsd.org
Subject:   Re: ipfw security patch problem..
Message-ID:  <20010126000558.I57121@elvis.mu.org>
In-Reply-To: <Pine.BSF.4.21.0101260756090.397-100000@athena.za.net>; from jus@security.za.net on Fri, Jan 26, 2001 at 08:00:04AM %2B0200
References:  <Pine.BSF.4.21.0101260756090.397-100000@athena.za.net>

next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, Jan 26, 2001 at 08:00:04AM +0200, Justin Stanford wrote:
> Hi,
> 
> I upgraded my ipfw yesterday on my 4.0-STABLE system with the patch by
> following the instructions to the letter for the security bug discovered
> by Aragon Gouveia, and compile and install appeared to go seamlessly.
> 
> However, ipfw now gives me this type of problem:
> 
> [root@athena]~# ipfw add 5000 deny tcp from any to 196.30.167.200 515 via rl0
> 05000 deny tcp from any to 196.30.167.200 515 via rl0
> ip_fw_ctl: empty interface name
> ipfw: setsockopt(IP_FW_ADD): Invalid argument
> [root@athena]~#

You have to compile ipfw(8), compile a new kernel (or reload a new module),
and ipfw(8) needs to have /sys/netinet/ip_fw.h copied to /usr/include/netinet
unless you used buildworld(this needs to happen before recompiling ipfw).

-- 
Bill Fumerola - security yahoo         / Yahoo! inc.
              - fumerola@yahoo-inc.com / billf@FreeBSD.org





To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010126000558.I57121>