Date: Fri, 28 Jun 1996 07:18:17 -0500 From: Alex Nash <alex@fa.tdktca.com> To: rbezuide@mikom.csir.co.za Cc: nate@mt.sri.com, phk@FreeBSD.ORG, current@FreeBSD.ORG Subject: Re: IPFW bugs? (fwd) Message-ID: <31D3CD89.66FE4FE9@fa.tdktca.com> References: <Pine.BSI.3.91.960628054750.20070K-100000@Venus.mcs.com>
next in thread | previous in thread | raw e-mail | index | archive | help
> I tried this rule because I haven't seen anything like this
> before ...
Forget that you ever saw it -- it's evil! :)
> duzi# ipfw list
> FireWall chain entries: 128 0
> 65000 accept all from any to any
> 65535 deny all from any to any
> duzi# ipfw add 21 pass log all from any 53 to any via ed0
> 00021 accept log all from any 53 to any via ed0
> duzi# ipfw list
> FireWall chain entries: 192 0
> 00021 accept log all from any 53 to any via ed0
> 65000 accept all from any to any
> 65535 deny all from any to any
> duzi# ipfw delete 65000
>
> Connection gone .....
>
> According to this .. it is "seems" :) impossible that rule
> 21 can cause *EVERYTHING* to go through !
There's a logical explanation for that...I just can't think what
it is right now.
But seriously, if you look in src/sys/netinet/ip_fw.c, the
port checking is the very last thing done. Before it gets
to that pointit does this:
/* If wildcard, match */
if (f_prt == IP_FW_F_ALL)
goto got_match;
Therefore, anything with a protocol of ALL never gets to the
port checks.
> Another thing .. if you are able to delete the default rule
> then you do not "I think" :) have the latest ipfw, user level
> and kernel.
This is a legitimate concern as this particular fix has only
been in -stable since Monday.
Alex
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?31D3CD89.66FE4FE9>
