From owner-freebsd-ipfw@FreeBSD.ORG Sat Jul 14 18:51:42 2012 Return-Path: Delivered-To: freebsd-ipfw@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 9586F1065672; Sat, 14 Jul 2012 18:51:42 +0000 (UTC) (envelope-from smithi@nimnet.asn.au) Received: from sola.nimnet.asn.au (paqi.nimnet.asn.au [115.70.110.159]) by mx1.freebsd.org (Postfix) with ESMTP id 184BF8FC19; Sat, 14 Jul 2012 18:51:41 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by sola.nimnet.asn.au (8.14.2/8.14.2) with ESMTP id q6EIpeNC048485; Sun, 15 Jul 2012 04:51:40 +1000 (EST) (envelope-from smithi@nimnet.asn.au) Date: Sun, 15 Jul 2012 04:51:39 +1000 (EST) From: Ian Smith To: Chris Rees In-Reply-To: Message-ID: <20120715042336.H74353@sola.nimnet.asn.au> References: <201207141614.q6EGEi7P024139@freefall.freebsd.org> <20120715025005.I74353@sola.nimnet.asn.au> MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Cc: freebsd-ipfw@freebsd.org, freebsd-bugs@freebsd.org Subject: Re: kern/165939: [ipw] security bug: incomplete firewall rules loaded if tables are used in ipfw.conf X-BeenThere: freebsd-ipfw@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: IPFW Technical Discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 14 Jul 2012 18:51:42 -0000 On Sat, 14 Jul 2012 18:59:54 +0100, Chris Rees wrote: > On 14 Jul 2012 18:49, "Ian Smith" wrote: > > > > On Sat, 14 Jul 2012, crees@freebsd.org wrote: > > > http://www.freebsd.org/cgi/query-pr.cgi?pr=165939 [..] > > Yes, to such a ruleset you'd need to add 'table all flush' too. > > > > ipfw flush specifically does not flush tables. I've long relied upon > > that, using mostly static tables only reloaded from a file saved hourly > > by cron, when $firewall_script finds tables are not loaded - ie at boot. > > Not A Bug then? Not For Me at least, Chris. Maybe ipfw(8) isn't specific enough about flush? I can't speak for others, but don't think flushing all tables in rc.firewall useful when it's easy to include in your particular ruleset. cheers, Ian