I don't think I ever heard anything back about this, and it still
doesn't look right. Do you agree?

On Thu, Jul 17, 2008, David Schultz wrote:
> On Thu, Jul 17, 2008, Daniel Gerzo wrote:
> > @@ -194,6 +194,7 @@
> >     ${fwcmd} add deny tcp from any to any setup
> >  
> >     # Allow DNS queries out in the world
> > +   ${fwcmd} add pass tcp from me to any 53 setup keep-state
> >     ${fwcmd} add pass udp from me to any 53 keep-state
> >  
> >     # Allow NTP queries out in the world
> > @@ -294,6 +295,7 @@
> >     ${fwcmd} add pass tcp from any to any setup
> >  
> >     # Allow DNS queries out in the world
> > +   ${fwcmd} add pass tcp from ${oip} to any 53 setup keep-state
> >     ${fwcmd} add pass udp from ${oip} to any 53 keep-state
> >  
> >     # Allow NTP queries out in the world
> 
> Hmm, it doesn't look like this could possibly work, unless I'm
> missing something. Did you test it?
> 
> In one case the rule you added comes after an 'add pass tcp from
> any to any setup', and in the other case it comes after an 'add
> deny tcp from any to any setup', so in both cases, the line you
> added should be ineffectual.
> 
> Furthermore, I don't believe there's any reason to use keep-state
> with TCP. The rule to allow packets for already-established
> connections suffices.
_______________________________________________
cvs-all@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/cvs-all
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to