Date: Tue, 14 Oct 1997 20:19:27 +1000 (EST) From: "Daniel O'Callaghan" <danny@panda.hilink.com.au> To: Studded <Studded@dal.net> Cc: "freebsd-stable@freebsd.org" <freebsd-stable@FreeBSD.ORG> Subject: Re: Problem with rc.conf/rc.firewall Message-ID: <Pine.BSF.3.91.971014195421.5634D-100000@panda.hilink.com.au> In-Reply-To: <199710140043.RAA27934@mail.san.rr.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Doug,
On Mon, 13 Oct 1997, Studded wrote:
> the kernel from the same kernel config file I used with the
> 2.2-970901-STABLE sources previously that included ipfw. I set the
> firewall option to YES in rc.conf, and set the type to OPEN.
>
> A gold star to anyone who has already spotted the problem, the
> rc.firewall script expects "${firewall_type}" = "open", not OPEN, and
> it bombed out. IMO putting the firewall_type option rc.conf is a big
> mistake. It loses big in functionality what little it makes up for in
> convenience, especially when I'm 600 miles from the machine.
My first proposal to committers was that firewall_type would be in
rc.firewall, but it was pointed out that the model being progressively
adopted is to put more config into rc.conf and less into other rc.*.
I can't really see any advantage in putting firewall_type in rc.firewall,
other than that it would force the user to read (or at least see) the
first lines of rc.firewall. But the comment in rc.conf next to
firewall_type clearly informs the user to see rc.firewall for a fuller
explanation, and lines 5-15 of rc.firewall list the available values for
rc.firewall. I grant the case-sensitivity is awkward, and I'll look into
it, but firewall_type will stay in rc.conf for the moment.
> little-used options from an already crowded rc.conf. Suggestion number
> two is to make the type open BY DEFAULT, and let the person change it
> if need be. There is really no reason to set up stumbling blocks that
Two years ago, when I submitted patches for the TCP fragment offset bug,
prompting Poul-Henning Kamp to rewrite most of the ipfw code, there was a
function which allowed the user to set the default "policy" to open or
closed. PHK changed this to default closed all of the time to lower the
chances of a machine being set up which was "open" while the administrator
thought it was "closed". I can't count the number of times I've built a
kernel, rebooted, and been unable to telnet to the machine. I'm a slow
learner, I guess. Rather than change the default policy I changed
rc.network so that it would print warnings on the console if a kernel with
firewall functionality was booted and there were no appropriate settings
in rc.conf. I can't think of anything better to do than that, myself,
but I'm open to suggestions (other than "default policy open").
As I've said, I'll look into the case-sensitivity...
regards,
/* Daniel O'Callaghan */
/* HiLink Internet <http://www.hilink.com.au/> danny@hilink.com.au */
/* FreeBSD - works hard, plays hard... danny@freebsd.org */
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.91.971014195421.5634D-100000>
