From owner-freebsd-bugs Fri Oct 29 14:58:55 1999 Delivered-To: freebsd-bugs@freebsd.org Received: from critter.freebsd.dk (critter.freebsd.dk [212.242.40.131]) by hub.freebsd.org (Postfix) with ESMTP id 571C315019 for ; Fri, 29 Oct 1999 14:58:46 -0700 (PDT) (envelope-from phk@critter.freebsd.dk) Received: from critter.freebsd.dk (localhost [127.0.0.1]) by critter.freebsd.dk (8.9.3/8.9.2) with ESMTP id XAA06727; Fri, 29 Oct 1999 23:57:29 +0200 (CEST) (envelope-from phk@critter.freebsd.dk) To: nate@mt.sri.com (Nate Williams) Cc: "Ronald F. Guilmette" , freebsd-bugs@FreeBSD.ORG Subject: Re: Some fixes for some non-features of the /etc/rc.firewall script In-reply-to: Your message of "Fri, 29 Oct 1999 15:51:40 MDT." <199910292151.PAA06826@mt.sri.com> Date: Fri, 29 Oct 1999 23:57:28 +0200 Message-ID: <6725.941234248@critter.freebsd.dk> From: Poul-Henning Kamp Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org In message <199910292151.PAA06826@mt.sri.com>, Nate Williams writes: >> The second patch below allows outsiders to connect to your AUTH port (113). >> I found that allowing this will cut down a lot on the number of pointless >> "Deny" log messages you will get if you don't have this, because a *lot* >> of things out in the real world (most notably Sendmail) _will_ try to >> connect to your local auth port whenever you connect out to them. > >Or you can simply ignore them completely w/out logging them, since AUTH >is a useless protocol, and you really shouldn't have a real AUTH daemon >running on your box in any case. On this topic also consider the "dummy" AUTH server in inetd... -- Poul-Henning Kamp FreeBSD coreteam member phk@FreeBSD.ORG "Real hackers run -current on their laptop." FreeBSD -- It will take a long time before progress goes too far! To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message