Date: Sat, 11 Nov 2006 22:18:03 +0100 From: Dan Lukes <dan@obluda.cz> To: freebsd-security@freebsd.org Subject: Re: src/etc/rc.firewall simple ${fw_pass} tcp from any to any established Message-ID: <45563E0B.6010509@obluda.cz> In-Reply-To: <159176.35953.qm@web30310.mail.mud.yahoo.com> References: <159176.35953.qm@web30310.mail.mud.yahoo.com>
next in thread | previous in thread | raw e-mail | index | archive | help
R. B. Riddick napsal/wrote, On 11/11/06 20:33: >> Statefull rules can stop the sophisticated intruder, but are often more >> vulnerable to DoS attacks. > Hmm... U mean, when someone creates a lot of states? > At least pf can limit that... Yes. "Limit" mean - some packet (connections, states) are denied. The rest is question - is algorithm smart enough to limit attackers packet but no legitimate connections (or, at least, try to block attacker and try not to block legitimate connections). Especially against attacker with full knowledge of algorithm. > But here it looks like just the good guys can create a state (from the > good-network via the public network to the trusted web sites), so that states > can't hurt, I think... Yes, in that case you are true. Dan -- Dan Lukes SISAL MFF UK AKA: dan@obluda.cz, dan@freebsd.cz,dan@kolej.mff.cuni.cz
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?45563E0B.6010509>