Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 26 Nov 2008 11:55:02 -0500
From:      Lowell Gilbert <freebsd-questions-local@be-well.ilk.org>
To:        eculp@casasponti.net
Cc:        Andrew Gould <andrewlylegould@gmail.com>, freebsd-questions@freebsd.org
Subject:   Re: firewall rules for bitlord, yahoo, limewire
Message-ID:  <4463ma2zrt.fsf@be-well.ilk.org>
In-Reply-To: <20081126102444.17qwm4xcthvk4kkww@intranet.casasponti.net> (eculp@casasponti.net's message of "Wed\, 26 Nov 2008 10\:24\:44 -0600")
References:  <492D51CB.9000201@a1poweruser.com> <20081126081306.17qwm4xcthtwcgw0o@intranet.casasponti.net> <d356c5630811260728s4991454ci11a25c3c316f1825@mail.gmail.com> <20081126102444.17qwm4xcthvk4kkww@intranet.casasponti.net>

next in thread | previous in thread | raw e-mail | index | archive | help
eculp@casasponti.net writes:

> Andrew Gould <andrewlylegould@gmail.com> escribi=F3:
>
>> On Wed, Nov 26, 2008 at 8:13 AM, <eculp@casasponti.net> wrote:
>>
>>>
>>> Hmmm.  Isn't life interesting.  I would like to know how to block them =
and
>>> others without causing strange secondary problems.
>>>
>>> Actually a default pf configuration will let them pass unless I'm
>>> forgetting something important.
>>>
>>> ed
>>>
>>
>> I share your pain, Ed.  I've had to perform 3 complete re-installations =
of
>> computers in my household in the last year.  Each time, I found a
>> ".limewire" file in a user's application folder.  The boys are now banned
>> from my wife's computer.  When the last culprit get's his computer back,=
 he
>> will find it running an operating system that is not supported by Limewi=
re.
>> The next time, he'll get it back without a network card.
>>
>> Andrew
>
> :)  I understand.  Hopefully someone has a reasonably efficient pf or
> ipfw based solution.  If it cuts some of the microsoft traffic that I
> am seeing much more of recently, I won't complain either. I have tried
> to control them by ip's and but domain names with limited success.
> Too many windows boxes at the office.

Regardless of what you do to "control" the unwanted applications, I'd
monitoring the traffic on the network as well.  I don't put many limits
on what my kid can do on the network, but he knows I'm looking over his
shoulder.  Virtually speaking.


--=20
Lowell Gilbert, embedded/networking software engineer, Boston area
		http://be-well.ilk.org/~lowell/



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4463ma2zrt.fsf>