On 1999-08-16 15:15 -0700, Ed Baxter <[EMAIL PROTECTED]> wrote: Route redirect is based on ICMP. See "man ipfw" (or "man ipf") and referred man-pages for the packet filter extensions that allow blocking of all or specific ICMP redirect messages. If you are running a recent -current (After August 10th), then you can control how the kernel reacts on ICMP redirect packets: net.inet.icmp.log_redirect: 0 net.inet.icmp.drop_redirect: 0 Use "sysctl -w net.inet.icmp.drop_redirect=1" to ignore all ICMP redirects (possibly after prior logging, if "log_riderects" == 1. (You may want to merge that code into -stable, else: cd /sys/netinet cvs up -kk -j 1.35 ip_icmp.c Or apply the patch at the end of this file to just add the "drop" feature to -stable ...) Regards, STefan Index: ip_icmp.c =================================================================== RCS file: /usr/cvs/src/sys/netinet/ip_icmp.c,v retrieving revision 1.33.2.1 diff -u -2 -r1.33.2.1 ip_icmp.c --- ip_icmp.c 1999/03/06 23:11:41 1.33.2.1 +++ ip_icmp.c 1999/08/17 09:36:45 @@ -70,4 +70,8 @@ &icmpmaskrepl, 0, ""); +static int drop_redirect = 0; +SYSCTL_INT(_net_inet_icmp, OID_AUTO, drop_redirect, CTLFLAG_RW, + &drop_redirect, 0, ""); + #ifdef ICMP_BANDLIM @@ -463,4 +467,6 @@ case ICMP_REDIRECT: + if (drop_redirect) + break; if (code > 3) goto badcode; To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-stable" in the body of the message