From owner-freebsd-security Sun Feb 24 4:16:40 2002 Delivered-To: freebsd-security@freebsd.org Received: from flood.ping.uio.no (flood.ping.uio.no [129.240.78.31]) by hub.freebsd.org (Postfix) with ESMTP id DA0F037B400 for ; Sun, 24 Feb 2002 04:16:35 -0800 (PST) Received: by flood.ping.uio.no (Postfix, from userid 2602) id 518C15341; Sun, 24 Feb 2002 13:16:32 +0100 (CET) X-URL: http://www.ofug.org/~des/ X-Disclaimer: The views expressed in this message do not necessarily coincide with those of any organisation or company with which I am or have been affiliated. To: "Jeff Palmer" Cc: Subject: Re: Couple of concerns with default rc.firewall References: <003b01c1bcda$d4f06020$0286a8c0@home.lan> From: Dag-Erling Smorgrav Date: 24 Feb 2002 13:16:31 +0100 In-Reply-To: <003b01c1bcda$d4f06020$0286a8c0@home.lan> Message-ID: Lines: 16 User-Agent: Gnus/5.0808 (Gnus v5.8.8) Emacs/21.1 MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org "Jeff Palmer" writes: > Is there any reason in particular, that ALL icmp traffic is denied > by default, except for using the 'open' ruleset? The default rule #65535 is "deny ip from any to any". Wouldn't you be surprised if this *didn't* block all ICMP packets? Just add the following early on in your firewall ruleset: allow icmp from any to any icmptype 0,3,8,11 preferably *after* any anti-spoofing rules. DES -- Dag-Erling Smorgrav - des@ofug.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message