From owner-freebsd-hackers Sat Aug 12 14:44:14 2000 Delivered-To: freebsd-hackers@freebsd.org Received: from etinc.com (et-gw.etinc.com [207.252.1.2]) by hub.freebsd.org (Postfix) with ESMTP id 0418F37B965 for ; Sat, 12 Aug 2000 14:44:10 -0700 (PDT) (envelope-from dennis@etinc.com) Received: from dbsys (dbsys.etinc.com [207.252.1.18]) by etinc.com (8.9.3/8.9.3) with SMTP id RAA22473; Sat, 12 Aug 2000 17:46:16 -0400 (EDT) Message-Id: <200008122146.RAA22473@etinc.com> X-Sender: dennis@etinc.com X-Mailer: QUALCOMM Windows Eudora Pro Version 4.0 Date: Sat, 12 Aug 2000 17:58:55 -0400 To: Bill Fumerola , FengYue From: Dennis Subject: Re: ipfw drop packets based on SYN &TTL Cc: hackers@FreeBSD.ORG In-Reply-To: <20000812173404.F65562@jade.chc-chimes.com> References: Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG At 05:34 PM 8/12/00 -0400, Bill Fumerola wrote: >On Sat, Aug 12, 2000 at 12:03:15PM -0700, FengYue wrote: > >> Hi, I need to drop packets using ipfw based on the value of >> TTL and the value of TTL on a 2.2.8-stable system. It seems >> ipfw does not support this, what options do I have? Why dont you just hack the IP code? its a lot easier than upgrading. DB To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message