Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 17 Jul 2008 16:20:51 -0400
From:      David Schultz <das@FreeBSD.ORG>
To:        Daniel Gerzo <danger@FreeBSD.ORG>
Cc:        cvs-src@FreeBSD.ORG, src-committers@FreeBSD.ORG, cvs-all@FreeBSD.ORG
Subject:   Re: cvs commit: src/etc rc.firewall
Message-ID:  <20080717202051.GA27450@zim.MIT.EDU>
In-Reply-To: <200807172000.m6HK0iIh018197@repoman.freebsd.org>
References:  <200807172000.m6HK0iIh018197@repoman.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Jul 17, 2008, Daniel Gerzo wrote:
> @@ -194,6 +194,7 @@
>  	${fwcmd} add deny tcp from any to any setup
>  
>  	# Allow DNS queries out in the world
> +	${fwcmd} add pass tcp from me to any 53 setup keep-state
>  	${fwcmd} add pass udp from me to any 53 keep-state
>  
>  	# Allow NTP queries out in the world
> @@ -294,6 +295,7 @@
>  	${fwcmd} add pass tcp from any to any setup
>  
>  	# Allow DNS queries out in the world
> +	${fwcmd} add pass tcp from ${oip} to any 53 setup keep-state
>  	${fwcmd} add pass udp from ${oip} to any 53 keep-state
>  
>  	# Allow NTP queries out in the world

Hmm, it doesn't look like this could possibly work, unless I'm
missing something. Did you test it?

In one case the rule you added comes after an 'add pass tcp from
any to any setup', and in the other case it comes after an 'add
deny tcp from any to any setup', so in both cases, the line you
added should be ineffectual.

Furthermore, I don't believe there's any reason to use keep-state
with TCP. The rule to allow packets for already-established
connections suffices.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20080717202051.GA27450>