Date: Fri, 21 Mar 2003 09:14:35 +0900 From: Kimura Fuyuki <fuyuki@hadaly.org> To: FreeBSD-gnats-submit@FreeBSD.org Subject: misc/50154: Add /etc/periodic/security/610.ipf6denied Message-ID: <867katr2xg.wl%fuyuki@hadaly.org>
next in thread | raw e-mail | index | archive | help
>Number: 50154 >Category: misc >Synopsis: Add /etc/periodic/security/610.ipf6denied >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Thu Mar 20 16:20:04 PST 2003 >Closed-Date: >Last-Modified: >Originator: Kimura Fuyuki >Release: FreeBSD 5.0-RELEASE-p4 i386 >Organization: >Environment: System: FreeBSD hadaly.dyndns.org 5.0-RELEASE-p4 FreeBSD 5.0-RELEASE-p4 #2: Fri Mar 7 13:26:51 JST 2003 root@hadaly.dyndns.org:/.2/obj/usr/src/sys/NS i386 >Description: Please add /etc/periodic/security/610.ipf6denied. This is very natural because we have - ipv6_ipfilter_rules (rc.conf option) - 500.ipfwdenied - 510.ipfdenied - 600.ip6fwdenied >How-To-Repeat: >Fix: diff -ruN etc.orig/defaults/periodic.conf etc/defaults/periodic.conf --- etc.orig/defaults/periodic.conf Fri Mar 21 09:02:57 2003 +++ etc/defaults/periodic.conf Thu Mar 20 12:59:50 2003 @@ -165,6 +166,9 @@ # 600.ip6fwdenied daily_status_security_ip6fwdenied_enable="YES" + +# 610.ipf6denied +daily_status_security_ipf6denied_enable="YES" # 650.ip6fwlimit daily_status_security_ip6fwlimit_enable="YES" diff -ruN etc.orig/periodic/security/610.ipf6denied etc/periodic/security/610.ipf6denied --- etc.orig/periodic/security/610.ipf6denied Thu Jan 1 09:00:00 1970 +++ etc/periodic/security/610.ipf6denied Tue Mar 18 12:39:29 2003 @@ -0,0 +1,53 @@ +#!/bin/sh - +# +# Copyright (c) 2001 The FreeBSD Project +# All rights reserved. +# +# Redistribution and use in source and binary forms, with or without +# modification, are permitted provided that the following conditions +# are met: +# 1. Redistributions of source code must retain the above copyright +# notice, this list of conditions and the following disclaimer. +# 2. Redistributions in binary form must reproduce the above copyright +# notice, this list of conditions and the following disclaimer in the +# documentation and/or other materials provided with the distribution. +# +# THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND +# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +# ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE +# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +# OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +# OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +# SUCH DAMAGE. +# +# $FreeBSD$ +# + +# If there is a global system configuration file, suck it in. +# +if [ -r /etc/defaults/periodic.conf ] +then + . /etc/defaults/periodic.conf + source_periodic_confs +fi + +. /etc/periodic/security/security.functions + +rc=0 + +case "$daily_status_security_ipf6denied_enable" in + [Yy][Ee][Ss]) + TMP=`mktemp ${TMPDIR:-/tmp}/security.XXXXXXXXXX` + if ipfstat -nhio6 2>/dev/null | grep block > ${TMP}; then + check_diff new_only ipf6 ${TMP} "${host} ipf6 denied packets:" + fi + rc=$? + rm -f ${TMP};; + *) rc=0;; +esac + +exit $rc >Release-Note: >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?867katr2xg.wl%fuyuki>