Date: Wed, 31 Oct 2001 21:21:31 -0500 From: Mike Tancsa <mike@sentex.net> To: Spades <spades@galaxynet.org> Cc: freebsd-security@freebsd.org Subject: Re: IDS135/ICMP_ICMP-REDIRECT_HOST Message-ID: <5.1.0.14.0.20011031211852.06278230@192.168.0.12> In-Reply-To: <3.0.32.20011101103631.02115a1c@smtp.magix.com.sg>
next in thread | previous in thread | raw e-mail | index | archive | help
I believe yes. If you add the keyword log, it will tell you what its
denying so you can verify for yourself. You dont want to eat all ICMP
traffic as some of it is desirable. An alternative to dealing with icmp
redirects is to do it via sysctl. See sysctl -a net.inet.icmp. Specifically,
net.inet.icmp.drop_redirect
and
net.inet.icmp.log_redirect
---Mike
At 10:36 AM 11/1/2001 +0800, Spades wrote:
>Just a quick question..
>
>By default of denying all incoming/outgoing ICMP via
>ipfw using: ipfw add 120 deny icmp from any to any
>
>Does it deny ICMP-REDIRECT packets?
>
>Bryan
>
>To Unsubscribe: send mail to majordomo@FreeBSD.org
>with "unsubscribe freebsd-security" in the body of the message
--------------------------------------------------------------------
Mike Tancsa, tel +1 519 651 3400
Sentex Communications, mike@sentex.net
Providing Internet since 1994 www.sentex.net
Cambridge, Ontario Canada www.sentex.net/mike
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5.1.0.14.0.20011031211852.06278230>
