Roger Price <deb...@rogerprice.org> writes: > Does the style of comment give a clue to the tool used ?
Earlier you posted a list of firewall rules like this: iptables -L -n --line-numbers reports Chain INPUT (policy ACCEPT) num target prot opt source destination 1 ufw-before-logging-input all -- 0.0.0.0/0 0.0.0.0/0 2 ufw-before-input all -- 0.0.0.0/0 0.0.0.0/0 3 ufw-after-input all -- 0.0.0.0/0 0.0.0.0/0 4 ufw-after-logging-input all -- 0.0.0.0/0 0.0.0.0/0 5 ufw-reject-input all -- 0.0.0.0/0 0.0.0.0/0 6 ufw-track-input all -- 0.0.0.0/0 0.0.0.0/0 So I would guess ufw.