From owner-freebsd-hackers Wed May 8 05:48:03 1996 Return-Path: owner-hackers Received: (from root@localhost) by freefall.freebsd.org (8.7.3/8.7.3) id FAA16559 for hackers-outgoing; Wed, 8 May 1996 05:48:03 -0700 (PDT) Received: from tfs.com (tfs.com [140.145.250.1]) by freefall.freebsd.org (8.7.3/8.7.3) with SMTP id FAA16554 for ; Wed, 8 May 1996 05:48:01 -0700 (PDT) Received: from critter.tfs.com by tfs.com (smail3.1.28.1) with SMTP id m0uH8et-0003wZC; Wed, 8 May 96 05:47 PDT Received: from localhost (localhost [127.0.0.1]) by critter.tfs.com (8.7.5/8.6.12) with SMTP id MAA01663; Wed, 8 May 1996 12:47:58 GMT X-Authentication-Warning: critter.tfs.com: Host localhost [127.0.0.1] didn't use HELO protocol To: Archie Cobbs cc: freebsd-hackers@FreeBSD.ORG Subject: Re: Fix for ipfw.c In-reply-to: Your message of "Tue, 07 May 1996 20:21:59 MST." <199605080321.UAA26444@bubba.whistle.com> Date: Wed, 08 May 1996 12:47:57 +0000 Message-ID: <1661.831559677@critter.tfs.com> From: Poul-Henning Kamp Sender: owner-hackers@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk > > The ``ipfw'' program has a problem in that it doesn't gracefully > detect when the list of tcp/udp ports is too long or improperly > specified (ie, any range must come first). More precisely, it just > core dumps.. :-) > > So I took the liberty of fixing it, plus a couple of error messages. > Could someone in charge look at this and check it in? Thanks, got it! Poul-Henning -- Poul-Henning Kamp | phk@FreeBSD.ORG FreeBSD Core-team. http://www.freebsd.org/~phk | phk@login.dknet.dk Private mailbox. whois: [PHK] | phk@ref.tfs.com TRW Financial Systems, Inc. Future will arrive by its own means, progress not so.