In PF the default behaviour of `nat-to` is to overwrite the source
port of the outgoing packet with a random unused port number. You can
specify `static-port` to preserve the source port number.
In IPTables the default behaviour of the MASQUERADE and SNAT policies
is to try and preserve the source
Den mån 16 maj 2022 kl 10:35 skrev Elias Carter :
> OpenBSD/PF defaults to randomizing the source port whereas
> Linux/IPTables defaults to trying to keep the source port.
>
> I have found that preserving the source port if possible works better
> out of the box when hosting publicly accessable UDP
Am 16.05.2022 10:20 schrieb Elias Carter:
One possible advantage of randomizing source ports is that it helps
prevent fingerprinting of the devices behind the NAT? Are there any
other reasons?
Back in the days outgoing (tcp) connections had predictable port
numbers,
sequence numbers, time ba
Elias Carter wrote:
> I have found that preserving the source port if possible works better
> out of the box when hosting publicly accessable UDP applications
> within a private network.
Preserving the source port also works better for attacking services...
I don't see anything strange in what
Hi,
...on 2022-05-16 13:23:31, Philipp Buehler wrote:
> I cannot recall many applications from 20y ago that have been very keen
> on sending from certain ports (besides IKE already mentioned by JJ).
I seem to remember firewall rules that allowed only udp/53 as _source_ port
for DNS traffic.
On Mon, May 16, 2022 at 05:50:38PM +0200, Peter N. M. Hansteen wrote:
> There seems to be some sort of network problem reaching ftp.eu.openbsd.org
> since
> some time this morning -- I had just completed a pkg_add -u on a system and
> was about to do a sysupgrade to jump to a newer snapshot, but s
On 2022-05-16, Alexander Bochmann wrote:
> Hi,
>
> ...on 2022-05-16 13:23:31, Philipp Buehler wrote:
>
> > I cannot recall many applications from 20y ago that have been very keen
> > on sending from certain ports (besides IKE already mentioned by JJ).
>
> I seem to remember firewall rules that all
...on 2022-05-16 17:57:06, Stuart Henderson wrote:
> On 2022-05-16, Alexander Bochmann wrote:
> > I seem to remember firewall rules that allowed only udp/53 as _source_
> > port
> > for DNS traffic.
> Such rules often existed to cover replies, before the days
> of stateful firewalls.
I a
On Mon, May 16, 2022 at 6:23 AM Philipp Buehler
wrote:
> Back in the days outgoing (tcp) connections had predictable port
> numbers,
> sequence numbers, time based stamps of kinds and so on. This did change
> like "let's random all the things" and this was not only against
> fingerprinting
> but a
On Mon, May 16, 2022 at 2:28 AM Janne Johansson wrote:
> While I can see the appeal of trying, it still means the service is
> not really made to work for more than one client from that same NAT
> pool. Might be fine if you aim for "bill and bob and jenny who works
> from home" coming in from sepa
it's theo deraadt's birthday on the 19th.
please remember to wish him.
and after you've done so, stop blabbering around, and just shut-up and hack. ;)
-mayuresh
hi all .
i read
https://www.openbsd.org/faq/faq13.html ,
i set /etc/sysctl.conf
kern.audio.record=1
---
then i can input the sentence ( japanese ) by using microphone .
my microphone is usb audio r and the setting is pulseau0 .
regards
12 matches
Mail list logo