Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 12 Aug 2000 17:58:55 -0400
From:      Dennis <dennis@etinc.com>
To:        Bill Fumerola <billf@chimesnet.com>, FengYue <fengyue@bluerose.windmoon.nu>
Cc:        hackers@FreeBSD.ORG
Subject:   Re: ipfw drop packets based on SYN &TTL
Message-ID:  <200008122146.RAA22473@etinc.com>
In-Reply-To: <20000812173404.F65562@jade.chc-chimes.com>
References:  <Pine.BSF.4.10.10008121201050.10718-100000@bluerose.windmoon.nu> <Pine.BSF.4.21.0008121329570.81297-100000@green.dyndns.org> <Pine.BSF.4.10.10008121201050.10718-100000@bluerose.windmoon.nu>

next in thread | previous in thread | raw e-mail | index | archive | help
At 05:34 PM 8/12/00 -0400, Bill Fumerola wrote:
>On Sat, Aug 12, 2000 at 12:03:15PM -0700, FengYue wrote:
>
>> Hi, I need to drop packets using ipfw based on the value of
>> TTL and the value of TTL on a 2.2.8-stable system.  It seems
>> ipfw does not support this, what options do I have? 

Why dont you just hack the IP code? its a lot easier than upgrading. 

DB


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200008122146.RAA22473>