From owner-freebsd-hackers@FreeBSD.ORG Tue Aug 3 16:01:01 2004 Return-Path: Delivered-To: freebsd-hackers@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 2CC5216A4CE for ; Tue, 3 Aug 2004 16:01:01 +0000 (GMT) Received: from mail.asarian-host.net (mail.asarian-host.net [194.109.160.70]) by mx1.FreeBSD.org (Postfix) with ESMTP id 8143143D69 for ; Tue, 3 Aug 2004 16:01:00 +0000 (GMT) SRS0=So2F/K8/=KZ=asarian-host.net=admin@asarian-host.net) Comments: To protect the identity of the sender, certain header fields are either not shown, or masked. Anonymous email accounts can be requested by filling in the appropriate form at: https://asarian-host.net/cgi-bin/signup.cgi Received: (from root@localhost) by mail.asarian-host.net (8.13.0/8.13.0) id i73G0x5i037712 for freebsd-hackers@freebsd.org; Tue, 3 Aug 2004 18:00:59 +0200 (CEST) (envelope-from admin@asarian-host.net) From: Mark Received-SPF: pass (asarian-host.net: domain of admin@asarian-host.net designates sender IP as SASL permitted sender) Message-Id: <200408031600.I73G0W9L037695@asarian-host.net> Date: Tue, 03 Aug 2004 16:00:59 GMT X-Authenticated-Sender: admin@asarian-host.net X-Trace: mu3q4hDlpIM58D8Txs+r79i2oRNOAUte6Qd7lGqB1Z4kM6HaRBndgp6sC1cmH2siUkneLHLCHr4h6TQwUedzLw== X-Complaints-To: abuse@asarian-host.net X-Abuse-Info: Please be sure to forward a copy of ALL headers, otherwise we are unable to process your complaint Organization: Asarian-host To: References: <20040803105731.197c7cd0.wmoran@potentialtech.com> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1441 X-Auth: Asarian-host PGP signature iQEVAwUAQQ+2uzFqW1BleBN9AQFlLgf/Q+BZOD22GgjydqYeD36LLjlD0UgeIb8i MkWMXBgojFXTpXXJRod75il28e4C2ROnTum8JPPR1mdhDW5mPyRNXil7ctTX96Ow KsiyO7EKrFKJOHHiZhmf4VZjvp4VRrYnfdEvQusZsVLCOD7r3lU7hkLHqRn77Phu qcusSUu8SKLlQeGxX+xKJZqWhXIg2R7jrzrwqdvs+jhV7G2FNms+O2h/u6draCp4 QiXw6+B6SzVu9uIL83ixljctjFVYeh2UmyEZaCRaFWGLb4MamGiu00p1rwzI8llD aK/Ee86GC3QndZCcTyYhRucmpBdTZA6llXJaIuDRcWGHesbxV7U5NA== =PZ/3 cc: freebsd-hackers@freebsd.org Subject: Re: One OR MORE of source and destination addresses? X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 03 Aug 2004 16:01:01 -0000 Bill Moran wrote: > How about using skipto instead of allow? Thus, if it passes the > first one, it can just skipto the next rule to be checked. i.e.: > > ipfw add 11 skipto 12 tcp from any to me 25 setup limit dst-addr 32 > ipfw add 12 allow tcp from any to me 25 setup limit src-addr 4 > > Thus, if rule 11 pases, it skips to rule 12. If it fails, it should > reject as always. The end result is that a packet _must_ pass both > rules to be allowed. I spoke too soon. :( It seems this sort of rules evokes a bug: http://lists.freebsd.org/pipermail/freebsd-ipfw/2004-April/001084.html My whole console is flooded with messages like these: "ipfw: install_state: entry already present, done" Is there a known patch? Thanks, - Mark