From owner-freebsd-questions@FreeBSD.ORG Mon Jul 7 14:31:44 2003 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 5F40A37B401 for ; Mon, 7 Jul 2003 14:31:44 -0700 (PDT) Received: from out006.verizon.net (out006pub.verizon.net [206.46.170.106]) by mx1.FreeBSD.org (Postfix) with ESMTP id 7C9A043F75 for ; Mon, 7 Jul 2003 14:31:43 -0700 (PDT) (envelope-from cswiger@mac.com) Received: from mac.com ([141.149.47.46]) by out006.verizon.net (InterMail vM.5.01.05.33 201-253-122-126-133-20030313) with ESMTP id <20030707213142.IJVN16647.out006.verizon.net@mac.com>; Mon, 7 Jul 2003 16:31:42 -0500 Message-ID: <3F09E6BE.90309@mac.com> Date: Mon, 07 Jul 2003 17:31:42 -0400 From: Chuck Swiger Organization: The Courts of Chaos User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.4) Gecko/20030624 X-Accept-Language: en-us, en MIME-Version: 1.0 To: kientzle@acm.org References: <3F09E48B.3020300@acm.org> In-Reply-To: <3F09E48B.3020300@acm.org> X-Enigmail-Version: 0.76.1.0 X-Enigmail-Supports: pgp-inline, pgp-mime Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit X-Authentication-Info: Submitted using SMTP AUTH at out006.verizon.net from [141.149.47.46] at Mon, 7 Jul 2003 16:31:42 -0500 cc: freebsd-questions@freebsd.org Subject: Re: Logging packets dropped by IPFW X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 07 Jul 2003 21:31:44 -0000 Tim Kientzle wrote: > Is there any way to generate log information > about the packets dropped by IPFW? The 'log' > modifier doesn't seem to do anything on my > system right now , though from what I can tell, > it's supposed to only log the rule that was > triggered, which isn't the same thing at all. Did you recompile your kernel with these options: options IPFIREWALL_VERBOSE #enable logging to syslogd(8) options IPFIREWALL_FORWARD #enable transparent proxy support options IPFIREWALL_VERBOSE_LIMIT=100 #limit verbosity ...? Also consider: sysctl net.inet.tcp.log_in_vain=1 sysctl net.inet.udp.log_in_vain=1 -- -Chuck