eny rules that follow this allow
rule.
Alternately, add an explicit set of logging rules to identify the
traffic that's being missed by your allow rule. For example:
${fwcmd} add pass udp from ${mail_gateway} to me 514 in via ${iif}
${fwcmd} add count log udp from ${mail_gateway} to
spond, but it's been suggested on
another list that setting routes to localhost will use less resources.
Ideally, I'd like to be able to block a few tens of thousands of IPs.
What's the scoop?
--
Paul Chvostek <[EMAIL PROTECTED]>
makes it look as if it's running something every time ...
something ... gets launched. But biff's not in any .profile, .cshrc or
.login. So I'm left scratching my head.
Can anybody shed some light on this?
--
Paul Chvostek <[E
ts which happen every
few minutes of traffic.
I've got other tcpdump details that may or may not be relevant, but
would certainly lengthen this email if included, so I won't include 'em.
Anybody have any idea what's going on? I'm stumped.
--
Paul Chvostek
he actual value of the netmask
should not affect ARP, since ARP doesn't know about CIDR.
> So I'm happy now.
Woo hoo! :)
I'd still like to know how to generate a gratuitous is-at. I mean,
besides forging it in dsniff's arpspoof.
--
Paul Chvostek