From owner-freebsd-security Fri Jan 21 7:26:37 2000 Delivered-To: freebsd-security@freebsd.org Received: from point.osg.gov.bc.ca (point.osg.gov.bc.ca [142.32.102.44]) by hub.freebsd.org (Postfix) with ESMTP id DBB0515261 for ; Fri, 21 Jan 2000 07:26:31 -0800 (PST) (envelope-from Cy.Schubert@uumail.gov.bc.ca) Received: (from daemon@localhost) by point.osg.gov.bc.ca (8.8.7/8.8.8) id HAA11920; Fri, 21 Jan 2000 07:25:11 -0800 Received: from passer.osg.gov.bc.ca(142.32.110.29) via SMTP by point.osg.gov.bc.ca, id smtpda11912; Fri Jan 21 07:24:53 2000 Received: (from uucp@localhost) by passer.osg.gov.bc.ca (8.9.3/8.9.1) id HAA09825; Fri, 21 Jan 2000 07:24:53 -0800 (PST) Received: from cwsys9.cwsent.com(10.2.2.1), claiming to be "cwsys.cwsent.com" via SMTP by passer9.cwsent.com, id smtpdIw9823; Fri Jan 21 07:24:52 2000 Received: (from uucp@localhost) by cwsys.cwsent.com (8.9.3/8.9.1) id HAA01787; Fri, 21 Jan 2000 07:24:52 -0800 (PST) Message-Id: <200001211524.HAA01787@cwsys.cwsent.com> Received: from localhost.cwsent.com(127.0.0.1), claiming to be "cwsys" via SMTP by localhost.cwsent.com, id smtpdwu1781; Fri Jan 21 07:23:53 2000 X-Mailer: exmh version 2.1.1 10/15/1999 Reply-To: Cy Schubert - ITSD Open Systems Group From: Cy Schubert - ITSD Open Systems Group X-OS: FreeBSD 3.4-RELEASE X-Sender: cy To: Reinier Bezuidenhout Cc: robinson@netrinsics.com (Michael Robinson), freebsd-security@FreeBSD.ORG Subject: Re: stream.c workaround clarification In-reply-to: Your message of "Sat, 21 Jan 2000 11:46:53 +0200." <200001210946.LAA15150@oskar.dev.nanoteq.co.za> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Date: Fri, 21 Jan 2000 07:23:53 -0800 Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org In message <200001210946.LAA15150@oskar.dev.nanoteq.co.za>, Reinier Bezuidenhou t writes: > Hi .. > > Is there any similar rules in IPFW that simulates this ?? No, IPFW is stateless. > > Reinier > > > I've been using an ipfilter rule-list that includes the following two rules > : > > > > pass in log quick proto tcp from any to any flags S/SA > > pass in quick proto tcp from any to any keep state > > > > (I log connections to TCP ports that aren't "exempted" higher up in the rul > es.) > > > > >From the discussion it seems to me that this should have an equivalent > > protective effect as the official-sanctioned workaround, but I'd like to > > verify this to be true. Regards, Phone: (250)387-8437 Cy Schubert Fax: (250)387-5766 Sun/DEC Team, UNIX Group Internet: Cy.Schubert@uumail.gov.bc.ca ITSD Province of BC "COBOL IS A WASTE OF CARDS." To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message