From owner-freebsd-hackers Tue Jan 7 19:18:14 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.4/8.8.4) id TAA09158 for hackers-outgoing; Tue, 7 Jan 1997 19:18:14 -0800 (PST) Received: from cheops.anu.edu.au (avalon@cheops.anu.edu.au [150.203.76.24]) by freefall.freebsd.org (8.8.4/8.8.4) with ESMTP id TAA09127; Tue, 7 Jan 1997 19:18:07 -0800 (PST) Message-Id: <199701080318.TAA09127@freefall.freebsd.org> Received: by cheops.anu.edu.au (1.37.109.16/16.2) id AA024833424; Wed, 8 Jan 1997 14:17:04 +1100 From: Darren Reed Subject: Re: FreeBSD as a cleanwall To: proff@suburbia.net Date: Wed, 8 Jan 1997 14:17:04 +1100 (EDT) Cc: hsu@clinet.fi, hackers@FreeBSD.org, security@FreeBSD.org In-Reply-To: <19970107230406.6676.qmail@suburbia.net> from "proff@suburbia.net" at Jan 8, 97 10:04:06 am X-Mailer: ELM [version 2.4 PL23] Content-Type: text Sender: owner-hackers@FreeBSD.org X-Loop: FreeBSD.org Precedence: bulk In some mail from proff@suburbia.net, sie said: [..] > fast masking from RMON > my socket credential code > > Bpf primarily exists to cut down kernel<->user space talk, and I > don't think it is useful elsewhere, except as a slow portable > low-level substrate. Some RMON (one?) system(s) have support for > bpf code, but except for ip/tcp options and quantitative decisions, > fast masks work very well. What's "fast masking" ? Darren