Date: Sat, 12 Aug 2000 17:58:55 -0400 From: Dennis <dennis@etinc.com> To: Bill Fumerola <billf@chimesnet.com>, FengYue <fengyue@bluerose.windmoon.nu> Cc: hackers@FreeBSD.ORG Subject: Re: ipfw drop packets based on SYN &TTL Message-ID: <200008122146.RAA22473@etinc.com> In-Reply-To: <20000812173404.F65562@jade.chc-chimes.com> References: <Pine.BSF.4.10.10008121201050.10718-100000@bluerose.windmoon.nu> <Pine.BSF.4.21.0008121329570.81297-100000@green.dyndns.org> <Pine.BSF.4.10.10008121201050.10718-100000@bluerose.windmoon.nu>
next in thread | previous in thread | raw e-mail | index | archive | help
At 05:34 PM 8/12/00 -0400, Bill Fumerola wrote: >On Sat, Aug 12, 2000 at 12:03:15PM -0700, FengYue wrote: > >> Hi, I need to drop packets using ipfw based on the value of >> TTL and the value of TTL on a 2.2.8-stable system. It seems >> ipfw does not support this, what options do I have? Why dont you just hack the IP code? its a lot easier than upgrading. DB To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200008122146.RAA22473>