Hi,

Daniel Hartmeier wrote:
And to get rid of the "hole", you need to get the order right so there
is nothing being exposed before the pf module is loaded. Once you have
ensured that nothing gets exposed before rc.d/pf is started, it's
trivial to make sure that that script only exits after pf has been
enabled and the production ruleset is in place.

        Too much tuning on security-related issue. The standard startup
        sequence should be secure. I really cannot understand what there
        is so bad on /etc/rc.d/pf_boot that it cannot be added to
        FreeBSD as NetBSD & OpenBSD use it or something similar.

        I'm not yelling after default block - others are and use it as
        a reason not to use something like pf_boot.

I think the chronological placement of rc.d/pf is already meant to
achieve precisely that, have you actually checked the rc.d scripts and
found some order that needs to be adjusted?

        I could of course adjust my rc.d scripts, but I would very much
        appreciate that security-related things are there correctly in
        standard setup.

        I'll try to port pf_boot myself if nobody else volunteers.
        (I don't think there is much porting to do, however).

                Ari S.
_______________________________________________
freebsd-pf@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-pf
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to