Date: Fri, 15 Dec 1995 13:02:16 +0100 From: "Frank ten Wolde" <franky@pinewood.nl> To: hackers@freebsd.org Subject: Order of rules in ip_fw chain Message-ID: <9512151302.ZM27077@pwood1.pinewood.nl>
next in thread | raw e-mail | index | archive | help
Hi,
I have three questions/suggestions for discussion on the implementation of
the ip firewall filter in FreeBSD 2.1.0. I would like to see who shares
my ideas or if there are sound reasons why *not* to modify the existing
implementation...
Here I go:
1) I would suggest adding the following lines of code in
.../sys/netinet/ip_fw.c, line 879:
ifdef IPFIREWALL
int
ip_fw_ctl(stage, m)
int stage;
struct mbuf *m;
{
if (securelevel >= 2) { NEW
return (EPERM); NEW
} NEW
if (stage == IP_FW_FLUSH) {
free_fw_chain(&ip_fw_chain);
return (0);
}
...
This would prevent any changes in the fw chain when running in
very secure level.
2) I noticed that the order in which the fw checks incoming packets is
*not* the same as the order in which the packet rules were added.
IMHO this should be fixed. I have not had the time (yet) to have
a look at the source myself, but will do so in the next few weeks.
3) I would suggest modifying ipfw.c to give some more informative
message if the setsockopt call fails. Now it only lists something
like "getsockopt failed", but it does not give you the reason.
A simple perror("") would do the trick I suppose. I will try and
have a look at the source code in the near future.
Any discussion welcome.
-Frank ten Wolde
--
----------------------------------------------------------------------
F.W. ten Wolde (PA3FMT) Pinewood Automation B.V.
E-mail: franky@pinewood.nl Kluyverweg 2a
Phone: +31-15 2682543 2629 HT Delft
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?9512151302.ZM27077>
