From owner-freebsd-hackers Sat Mar 13 10: 2:34 1999 Delivered-To: freebsd-hackers@freebsd.org Received: from relay.ucb.crimea.ua (relay.ucb.crimea.ua [212.110.138.1]) by hub.freebsd.org (Postfix) with ESMTP id B2D6F14EAF; Sat, 13 Mar 1999 10:02:18 -0800 (PST) (envelope-from ru@ucb.crimea.ua) Received: (from ru@localhost) by relay.ucb.crimea.ua (8.9.2/8.9.2/UCB) id UAA95234; Sat, 13 Mar 1999 20:01:51 +0200 (EET) (envelope-from ru) Date: Sat, 13 Mar 1999 20:01:50 +0200 From: Ruslan Ermilov To: dg@freebsd.org Cc: FreeBSD Hackers Subject: ipflow and ipfirewall Message-ID: <19990313200150.A83040@relay.ucb.crimea.ua> Mail-Followup-To: dg@freebsd.org, FreeBSD Hackers Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Mailer: Mutt 0.95.3i X-Operating-System: FreeBSD 3.1-STABLE i386 Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG Hi! I thought about starting to use fast IP forwarding, but... It seems that such "fast forwardable" packets, when passed from ether_input(), for example, just simply bypass all firewall checks. Am I right? P.S. It would be fine to announce such changes via freebsd-announce and document all sysctl variables. Thanks, -- Ruslan Ermilov Sysadmin and DBA of the ru@ucb.crimea.ua United Commercial Bank +380.652.247.647 Simferopol, Ukraine http://www.FreeBSD.org The Power To Serve http://www.oracle.com Enabling The Information Age To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message