From owner-freebsd-ipfw@FreeBSD.ORG Mon Dec 8 14:13:50 2003 Return-Path: Delivered-To: freebsd-ipfw@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 866A116A4CE for ; Mon, 8 Dec 2003 14:13:50 -0800 (PST) Received: from transport.cksoft.de (transport.cksoft.de [62.111.66.27]) by mx1.FreeBSD.org (Postfix) with ESMTP id CDFD143D1D for ; Mon, 8 Dec 2003 14:13:48 -0800 (PST) (envelope-from bzeeb-lists@lists.zabbadoz.net) Received: from transport.cksoft.de (localhost [127.0.0.1]) by transport.cksoft.de (Postfix) with ESMTP id 80B611FF903; Mon, 8 Dec 2003 23:13:46 +0100 (CET) Received: by transport.cksoft.de (Postfix, from userid 66) id E8BDD1FF921; Mon, 8 Dec 2003 23:13:44 +0100 (CET) Received: by mail.int.zabbadoz.net (Postfix, from userid 1060) id EEDB1154C7; Mon, 8 Dec 2003 22:13:34 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by mail.int.zabbadoz.net (Postfix) with ESMTP id E49C51538C; Mon, 8 Dec 2003 22:13:34 +0000 (UTC) Date: Mon, 8 Dec 2003 22:13:34 +0000 (UTC) From: "Bjoern A. Zeeb" X-X-Sender: bz@e0-0.zab2.int.zabbadoz.net To: Steve Bertrand In-Reply-To: <1070920483.704.169.camel@ptp.northnetworks.ca> Message-ID: References: <20031208215153.7941C2B4D47@remco.elvandar.org> <1070920483.704.169.camel@ptp.northnetworks.ca> MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII X-Virus-Scanned: by AMaViS cksoft-s20020300-20031204bz on transport.cksoft.de cc: freebsd-ipfw@freebsd.org cc: Remko Lodder Subject: Re: FW: Perl IPFW script X-BeenThere: freebsd-ipfw@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: IPFW Technical Discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 08 Dec 2003 22:13:50 -0000 On Mon, 8 Dec 2003, Steve Bertrand wrote: > > "/usr/bin/perl /path/scriptname" ? Is that going to work? > > > > is it executable .. > > etc? > > > > It is executable, however I will try adding the /usr/bin/perl to the > script name and see if that works. I'll have to do that tonight however, > as doing it now would knock about 5000 users offline temporarily ;o) on current the firewall_script is sourced into /etc/rc.d/ipfw: if [ -r "${firewall_script}" ]; then . "${firewall_script}" a perl script will always make this fail I guess. good luck for your users ;-) -- Bjoern A. Zeeb bzeeb at Zabbadoz dot NeT 56 69 73 69 74 http://www.zabbadoz.net/