Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 29 Oct 1999 23:57:28 +0200
From:      Poul-Henning Kamp <phk@critter.freebsd.dk>
To:        nate@mt.sri.com (Nate Williams)
Cc:        "Ronald F. Guilmette" <rfg@monkeys.com>, freebsd-bugs@FreeBSD.ORG
Subject:   Re: Some fixes for some non-features of the /etc/rc.firewall script 
Message-ID:  <6725.941234248@critter.freebsd.dk>
In-Reply-To: Your message of "Fri, 29 Oct 1999 15:51:40 MDT." <199910292151.PAA06826@mt.sri.com> 

next in thread | previous in thread | raw e-mail | index | archive | help
In message <199910292151.PAA06826@mt.sri.com>, Nate Williams writes:
>> The second patch below allows outsiders to connect to your AUTH port (113).
>> I found that allowing this will cut down a lot on the number of pointless
>> "Deny" log messages you will get if you don't have this, because a *lot*
>> of things out in the real world (most notably Sendmail) _will_ try to
>> connect to your local auth port whenever you connect out to them.
>
>Or you can simply ignore them completely w/out logging them, since AUTH
>is a useless protocol, and you really shouldn't have a real AUTH daemon
>running on your box in any case.

On this topic also consider the "dummy" AUTH server in inetd...

--
Poul-Henning Kamp             FreeBSD coreteam member
phk@FreeBSD.ORG               "Real hackers run -current on their laptop."
FreeBSD -- It will take a long time before progress goes too far!


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-bugs" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?6725.941234248>