Date: Fri, 29 Oct 1999 23:57:28 +0200 From: Poul-Henning Kamp <phk@critter.freebsd.dk> To: nate@mt.sri.com (Nate Williams) Cc: "Ronald F. Guilmette" <rfg@monkeys.com>, freebsd-bugs@FreeBSD.ORG Subject: Re: Some fixes for some non-features of the /etc/rc.firewall script Message-ID: <6725.941234248@critter.freebsd.dk> In-Reply-To: Your message of "Fri, 29 Oct 1999 15:51:40 MDT." <199910292151.PAA06826@mt.sri.com>
next in thread | previous in thread | raw e-mail | index | archive | help
In message <199910292151.PAA06826@mt.sri.com>, Nate Williams writes: >> The second patch below allows outsiders to connect to your AUTH port (113). >> I found that allowing this will cut down a lot on the number of pointless >> "Deny" log messages you will get if you don't have this, because a *lot* >> of things out in the real world (most notably Sendmail) _will_ try to >> connect to your local auth port whenever you connect out to them. > >Or you can simply ignore them completely w/out logging them, since AUTH >is a useless protocol, and you really shouldn't have a real AUTH daemon >running on your box in any case. On this topic also consider the "dummy" AUTH server in inetd... -- Poul-Henning Kamp FreeBSD coreteam member phk@FreeBSD.ORG "Real hackers run -current on their laptop." FreeBSD -- It will take a long time before progress goes too far! To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?6725.941234248>