From owner-freebsd-security@FreeBSD.ORG Sat Nov 20 20:48:23 2004 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 68A3C16A4CE for ; Sat, 20 Nov 2004 20:48:23 +0000 (GMT) Received: from bunrab.catwhisker.org (adsl-63-193-123-122.dsl.snfc21.pacbell.net [63.193.123.122]) by mx1.FreeBSD.org (Postfix) with ESMTP id 10BDD43D53 for ; Sat, 20 Nov 2004 20:48:23 +0000 (GMT) (envelope-from david@catwhisker.org) Received: from bunrab.catwhisker.org (localhost [127.0.0.1]) by bunrab.catwhisker.org (8.13.1/8.13.1) with ESMTP id iAKKmMY6023504 for ; Sat, 20 Nov 2004 12:48:22 -0800 (PST) (envelope-from david@bunrab.catwhisker.org) Received: (from david@localhost) by bunrab.catwhisker.org (8.13.1/8.13.1/Submit) id iAKKmMpf023503 for freebsd-security@freebsd.org; Sat, 20 Nov 2004 12:48:22 -0800 (PST) (envelope-from david) Date: Sat, 20 Nov 2004 12:48:22 -0800 (PST) From: David Wolfskill Message-Id: <200411202048.iAKKmMpf023503@bunrab.catwhisker.org> To: freebsd-security@freebsd.org In-Reply-To: <20041120133048.N7533@zoraida.natserv.net> Subject: Re: Importing into rc.firewal rules X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Security issues [members-only posting] List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 20 Nov 2004 20:48:23 -0000 >Date: Sat, 20 Nov 2004 13:32:15 -0500 (EST) >From: Francisco Reyes >I have a grown list of IPs that I am "deny ip from ###.### to any". >Infected machines, hackers, etc.. OK.... >Is there a way to have this list outside of rc.firewall and just read it >in? Sure, if you modify rc.firewall or use a different mechanism to construct the rules. The supplied rc.firewall is a shell script; see ". file" in man sh for one way to read the contents of another file into a shell script. You could also generate the ipfw comamnds via some other (combination of) (scripting) language(s), including Perl or m4 -- as long as each such component you use is available at the time it is first invoked (rather early in the boot process). A lot is likely to depend on how dynamic the "grown list" is. Peace, david -- David H. Wolfskill david@catwhisker.org I resent spammers because spam is a DoS attack on my time. See http://www.catwhisker.org/~david/publickey.gpg for public key.