From owner-cvs-all Tue Feb 13 10:12:30 2001 Delivered-To: cvs-all@freebsd.org Received: from critter.freebsd.dk (flutter.freebsd.dk [212.242.40.147]) by hub.freebsd.org (Postfix) with ESMTP id 411D137B4EC; Tue, 13 Feb 2001 10:12:18 -0800 (PST) Received: from critter (localhost [127.0.0.1]) by critter.freebsd.dk (8.11.1/8.11.1) with ESMTP id f1DICBw52577; Tue, 13 Feb 2001 19:12:11 +0100 (CET) (envelope-from phk@critter.freebsd.dk) To: Warner Losh Cc: Luigi Rizzo , cvs-committers@FreeBSD.org, cvs-all@FreeBSD.org Subject: Re: cvs commit: src/sys/netinet ip_fw.c ip_fw.h src/sbin/ipfw ipfw.8 ipfw.c In-Reply-To: Your message of "Tue, 13 Feb 2001 10:55:26 MST." <200102131755.f1DHtQW39918@harmony.village.org> Date: Tue, 13 Feb 2001 19:12:11 +0100 Message-ID: <52575.982087931@critter> From: Poul-Henning Kamp Sender: owner-cvs-all@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG In message <200102131755.f1DHtQW39918@harmony.village.org>, Warner Losh writes: >In message <52435.982085938@critter> Poul-Henning Kamp writes: >: A forwarded packet would encounter three lists of rules: >: >: Input list on arrival interface >: forwarding list >: Output list on departure interface > >That would make my life easier here. Right now I have a shell script >with nested for loops to prevent bogus packets coming in (and no >filtering at all going out). When there's 8 interfaces, it gets ugly >fast. Try 16 then :-) Yes, I think this is an overhaul of IPFW which has been needed for a long time. -- Poul-Henning Kamp | UNIX since Zilog Zeus 3.20 phk@FreeBSD.ORG | TCP/IP since RFC 956 FreeBSD committer | BSD since 4.3-tahoe Never attribute to malice what can adequately be explained by incompetence. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe cvs-all" in the body of the message