From owner-freebsd-ipfw@FreeBSD.ORG Mon Jun 24 11:06:47 2013 Return-Path: Delivered-To: freebsd-ipfw@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by hub.freebsd.org (Postfix) with ESMTP id D2F3B10A for ; Mon, 24 Jun 2013 11:06:47 +0000 (UTC) (envelope-from owner-bugmaster@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) by mx1.freebsd.org (Postfix) with ESMTP id C3A7C1DC8 for ; Mon, 24 Jun 2013 11:06:47 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.7/8.14.7) with ESMTP id r5OB6lfk001015 for ; Mon, 24 Jun 2013 11:06:47 GMT (envelope-from owner-bugmaster@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.7/8.14.7/Submit) id r5OB6lbx001013 for freebsd-ipfw@FreeBSD.org; Mon, 24 Jun 2013 11:06:47 GMT (envelope-from owner-bugmaster@FreeBSD.org) Date: Mon, 24 Jun 2013 11:06:47 GMT Message-Id: <201306241106.r5OB6lbx001013@freefall.freebsd.org> X-Authentication-Warning: freefall.freebsd.org: gnats set sender to owner-bugmaster@FreeBSD.org using -f From: FreeBSD bugmaster To: freebsd-ipfw@FreeBSD.org Subject: Current problem reports assigned to freebsd-ipfw@FreeBSD.org X-BeenThere: freebsd-ipfw@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: IPFW Technical Discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 24 Jun 2013 11:06:48 -0000 Note: to view an individual PR, use: http://www.freebsd.org/cgi/query-pr.cgi?pr=(number). The following is a listing of current problems submitted by FreeBSD users. These represent problem reports covering all versions including experimental development code and obsolete releases. S Tracker Resp. Description -------------------------------------------------------------------------------- o kern/178482 ipfw [ipfw] logging problem from vnet jail o kern/178480 ipfw [ipfw] dynamically loaded ipfw with a vimage kernel do o kern/178317 ipfw [ipfw] ipfw options need to specifed in specific order o kern/177948 ipfw [ipfw] ipfw fails to parse port ranges (p1-p2) for udp o kern/176503 ipfw [ipfw] ipfw layer2 problem o kern/169206 ipfw [ipfw] ipfw does not flush entries in table o conf/167822 ipfw [ipfw] [patch] start script doesn't load firewall_type o kern/166406 ipfw [ipfw] ipfw does not set ALTQ identifier for ipv6 traf o kern/165939 ipfw [ipfw] bug: incomplete firewall rules loaded if tables o kern/165190 ipfw [ipfw] [lo] [patch] loopback interface is not marking o kern/158066 ipfw [ipfw] ipfw + netgraph + multicast = multicast packets o kern/157689 ipfw [ipfw] ipfw nat config does not accept nonexistent int f kern/155927 ipfw [ipfw] ipfw stops to check packets for compliance with o bin/153252 ipfw [ipfw][patch] ipfw lockdown system in subsequent call o kern/153161 ipfw [ipfw] does not support specifying rules with ICMP cod o kern/152113 ipfw [ipfw] page fault on 8.1-RELEASE caused by certain amo o kern/148827 ipfw [ipfw] divert broken with in-kernel ipfw o kern/148430 ipfw [ipfw] IPFW schedule delete broken. o kern/148091 ipfw [ipfw] ipfw ipv6 handling broken. f kern/143973 ipfw [ipfw] [panic] ipfw forward option causes kernel reboo o kern/143621 ipfw [ipfw] [dummynet] [patch] dummynet and vnet use result o kern/137346 ipfw [ipfw] ipfw nat redirect_proto is broken o kern/137232 ipfw [ipfw] parser troubles o kern/135476 ipfw [ipfw] IPFW table breaks after adding a large number o o kern/129036 ipfw [ipfw] 'ipfw fwd' does not change outgoing interface n o kern/127230 ipfw [ipfw] [patch] Feature request to add UID and/or GID l f kern/122963 ipfw [ipfw] tcpdump does not show packets redirected by 'ip s kern/121807 ipfw [request] TCP and UDP port_table in ipfw o kern/116009 ipfw [ipfw] [patch] Ignore errors when loading ruleset from o kern/104682 ipfw [ipfw] [patch] Some minor language consistency fixes a o kern/103454 ipfw [ipfw] [patch] [request] add a facility to modify DF b o kern/103328 ipfw [ipfw] [request] sugestions about ipfw table o kern/97951 ipfw [ipfw] [patch] ipfw does not tie interface details to o kern/95084 ipfw [ipfw] [regression] [patch] IPFW2 ignores "recv/xmit/v o kern/86957 ipfw [ipfw] [patch] ipfw mac logging o bin/83046 ipfw [ipfw] ipfw2 error: "setup" is allowed for icmp, but s o kern/82724 ipfw [ipfw] [patch] [request] Add setnexthop and defaultrou o bin/78785 ipfw [patch] ipfw(8) verbosity locks machine if /etc/rc.fir o kern/60719 ipfw [ipfw] Headerless fragments generate cryptic error mes s kern/55984 ipfw [ipfw] [patch] time based firewalling support for ipfw o kern/48172 ipfw [ipfw] [patch] ipfw does not log size and flags o kern/46159 ipfw [ipfw] [patch] [request] ipfw dynamic rules lifetime f a kern/26534 ipfw [ipfw] Add an option to ipfw to log gid/uid of who cau 43 problems total. From owner-freebsd-ipfw@FreeBSD.ORG Tue Jun 25 19:10:30 2013 Return-Path: Delivered-To: freebsd-ipfw@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by hub.freebsd.org (Postfix) with ESMTP id CE45245A for ; Tue, 25 Jun 2013 19:10:30 +0000 (UTC) (envelope-from mline@ukr.net) Received: from ffe6.ukr.net (ffe6.ukr.net [195.214.192.56]) by mx1.freebsd.org (Postfix) with ESMTP id 83DB11ECB for ; Tue, 25 Jun 2013 19:10:30 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ukr.net; s=ffe; h=Date:Message-Id:From:To:Subject:Content-Type:Content-Transfer-Encoding:MIME-Version; bh=CKAQAF4GS/a9nEdaL6QilGlAUeqNlLwXkL45EIsGoxs=; b=ZZUoYZffk5goz6vpcQqPUP9ekojuftW5a6sE6FAzetG7XyyKmugFZlTXuoKWuEJbfdld6kagWQyr5nLlyAvNR20Pd4YLQHAjuRbFMhnfqQRWcdd/cnN2jGTj6zbtkjMwbUWlu4vemsL7HdaGAxk2ttFrjdJTMrJosrKYClfdsXk=; Received: from mail by ffe6.ukr.net with local ID 1UrYN0-000BnN-QZ for freebsd-ipfw@freebsd.org; Tue, 25 Jun 2013 21:53:38 +0300 MIME-Version: 1.0 Subject: Table add 255.255.255.255 bug To: freebsd-ipfw@freebsd.org From: "isp" X-Mailer: freemail.ukr.net 4.0 Message-Id: <39065.1372186418.14025189299918143488@ffe6.ukr.net> Date: Tue, 25 Jun 2013 21:53:38 +0300 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: binary Content-Disposition: inline X-Content-Filtered-By: Mailman/MimeDel 2.1.14 X-BeenThere: freebsd-ipfw@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: IPFW Technical Discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 25 Jun 2013 19:10:30 -0000 Hello. I have a problem with adding 255.255.255.255 address into ipfw table. I can't see it i "ipfw table list" [#south-router:/]# ipfw table 7 list 127.0.0.0/8 0 224.0.0.0/4 0 [#south-router:/]# ipfw table 7 add 255.255.255.255 [#south-router:/]# ipfw table 7 list 127.0.0.0/8 0 224.0.0.0/4 0 [#south-router:/]# ipfw table 7 add 255.255.255.255 ipfw: setsockopt(IP_FW_TABLE_XADD): File exists [#south-router:/]# ipfw table 7 delete 255.255.255.255 [#south-router:/]# ipfw table 7 list 127.0.0.0/8 0 224.0.0.0/4 0 [#south-router:/]# uname -a FreeBSD south-router 9.1-RELEASE-p3 FreeBSD 9.1-RELEASE-p3 #0: Tue Apr 30 20:02:00 EEST 2013 root@south:/usr/obj/usr/src/sys/SOUTH-ROUTER amd64 > From owner-freebsd-ipfw@FreeBSD.ORG Fri Jun 28 17:48:53 2013 Return-Path: Delivered-To: freebsd-ipfw@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) by hub.freebsd.org (Postfix) with ESMTP id 1C3D3F5E; Fri, 28 Jun 2013 17:48:53 +0000 (UTC) (envelope-from sodynet1@gmail.com) Received: from mail-pb0-x232.google.com (mail-pb0-x232.google.com [IPv6:2607:f8b0:400e:c01::232]) by mx1.freebsd.org (Postfix) with ESMTP id ECD1C1B73; Fri, 28 Jun 2013 17:48:52 +0000 (UTC) Received: by mail-pb0-f50.google.com with SMTP id wz7so2549482pbc.9 for ; Fri, 28 Jun 2013 10:48:52 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:date:message-id:subject:from:to:content-type; bh=Pu0/s4ycT2o/mTEW6lN5yWgu8mdecejQW9ZQas79kM0=; b=LW/j00ENlLUY8tccbb2L0Qy6CW1SNe6DvswD7qdEVH8E7C2CozaeCvG6S609rWSPKZ 9TvENOBYxDl/65KoXE2ru8E/a63RwEiCDBbcQ/Y3erR1RRm7Oax80xCyLngClMBIi7S7 eJH/2Q+q+Gb8haGrxFzp7GhVPhAgEqHSF0cxgwKLgS356i6awJnVm5ndXa9wmygTevDk jOuxPjQhbxSH/b++/cGsrmumC3z6BSEQIJPJGvP1F3CgJOAgv5vSuPNTXaUWA0c3jzl+ xLyfVRSuS8Up9z29IXKAEDCZvCOyivtHd+otMWbbngiF7OZD/q1+ttfbhX0KK4zJJ4U9 S3bA== MIME-Version: 1.0 X-Received: by 10.68.189.101 with SMTP id gh5mr4952093pbc.86.1372441732187; Fri, 28 Jun 2013 10:48:52 -0700 (PDT) Received: by 10.70.96.139 with HTTP; Fri, 28 Jun 2013 10:48:52 -0700 (PDT) Received: by 10.70.96.139 with HTTP; Fri, 28 Jun 2013 10:48:52 -0700 (PDT) Date: Fri, 28 Jun 2013 20:48:52 +0300 Message-ID: Subject: Dnay From: Sami Halabi To: freebsd-net@freebsd.org, freebsd-ipfw Content-Type: text/plain; charset=ISO-8859-1 X-Content-Filtered-By: Mailman/MimeDel 2.1.14 X-BeenThere: freebsd-ipfw@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: IPFW Technical Discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 28 Jun 2013 17:48:53 -0000 Hi, I would like to perform a full dnat/snat as in iptbles in: linux-ip.net/html/nat-dnat.html How it can be done in fbsd, I use ipgw. Thanks in advance, Sami From owner-freebsd-ipfw@FreeBSD.ORG Fri Jun 28 22:08:22 2013 Return-Path: Delivered-To: freebsd-ipfw@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) by hub.freebsd.org (Postfix) with ESMTP id 58CB7D10; Fri, 28 Jun 2013 22:08:22 +0000 (UTC) (envelope-from sodynet1@gmail.com) Received: from mail-pd0-x22c.google.com (mail-pd0-x22c.google.com [IPv6:2607:f8b0:400e:c02::22c]) by mx1.freebsd.org (Postfix) with ESMTP id 3534A18F5; Fri, 28 Jun 2013 22:08:22 +0000 (UTC) Received: by mail-pd0-f172.google.com with SMTP id z10so1274845pdj.31 for ; Fri, 28 Jun 2013 15:08:22 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:date:message-id:subject:from:to:content-type; bh=cP3UcPhHc2pVfIpVXrd8uRa53+uYxOZXKN8Zmrcz4X8=; b=Wt7dpZrIQZ5DWxiUeNXvGpWYIJnk14wXwVMr9JJTqjwUlfJf5WPeJkz1DOmNRQid1D dsuiAd4Blfgj8IRndISb0VoEO1ezeDu9Ob8VWwrKoJsrYBIvt+JZ+sRTDxCuBD9u7/zg X8O8LAazHwEHBRAnZ3ZqXseDs97PkPDNJ5BbnL9XEj4hUR3G3yTirKDN2hbfrY65ytSP Qux0+DbgY3FXqbc3eaGaWNwfqtCzcgSAAiOfrC63tqFE6DL/Wf1P5qNl0lx2zbKG+Oe9 29yDdjKOjJ00y505z9qsD0rOxwuxotg7T1eyEpEdczqfcapXerQdvmJLyaY0OGWWYPmS HT5w== MIME-Version: 1.0 X-Received: by 10.67.3.99 with SMTP id bv3mr13427171pad.140.1372457302043; Fri, 28 Jun 2013 15:08:22 -0700 (PDT) Received: by 10.70.96.139 with HTTP; Fri, 28 Jun 2013 15:08:22 -0700 (PDT) Date: Sat, 29 Jun 2013 01:08:22 +0300 Message-ID: Subject: DNAT in freebsd From: Sami Halabi To: freebsd-ipfw , "freebsd-net@freebsd.org" Content-Type: text/plain; charset=ISO-8859-1 X-Content-Filtered-By: Mailman/MimeDel 2.1.14 X-BeenThere: freebsd-ipfw@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: IPFW Technical Discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 28 Jun 2013 22:08:22 -0000 Hi, (sorry for sending again, the last email was with wrong subject) I would like to perform a full dnat/snat as in iptbles in: linux-ip.net/html/nat-dnat.html How it can be done in fbsd, I use ipfw. I seeked natd man page but its translation, and thr proxy_rule is for specefic port, not a whole transparancy. Thanks in advance, -- Sami Halabi Information Systems Engineer NMS Projects Expert FreeBSD SysAdmin Expert From owner-freebsd-ipfw@FreeBSD.ORG Sat Jun 29 00:30:56 2013 Return-Path: Delivered-To: freebsd-ipfw@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) by hub.freebsd.org (Postfix) with ESMTP id 1D637899; Sat, 29 Jun 2013 00:30:56 +0000 (UTC) (envelope-from pprocacci@datapipe.com) Received: from EXFESMQ03.datapipe-corp.net (exfesmq03.datapipe.com [64.27.120.67]) by mx1.freebsd.org (Postfix) with ESMTP id DA25C1DD4; Sat, 29 Jun 2013 00:30:55 +0000 (UTC) Received: from nat.myhome (192.168.128.103) by EXFESMQ03.datapipe-corp.net (192.168.128.28) with Microsoft SMTP Server (TLS) id 14.2.318.4; Fri, 28 Jun 2013 20:29:40 -0400 Date: Fri, 28 Jun 2013 19:29:59 -0500 From: "Paul A. Procacci" To: Sami Halabi Subject: Re: DNAT in freebsd Message-ID: <20130629002959.GB20376@nat.myhome> References: MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.21 (2010-09-15) X-Originating-IP: [192.168.128.103] Content-Transfer-Encoding: quoted-printable Cc: freebsd-ipfw , "freebsd-net@freebsd.org" X-BeenThere: freebsd-ipfw@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: IPFW Technical Discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 29 Jun 2013 00:30:56 -0000 > Hi, (sorry for sending again, the last email was with wrong subject) > I would like to perform a full dnat/snat as in iptbles in: > linux-ip.net/html/nat-dnat.html > How it can be done in fbsd, I use ipfw. > > I seeked natd man page but its translation, and thr proxy_rule is for > specefic port, not a whole transparancy. > Using in-kernel nat is probably a better choice IMHO. read `man ipfw(8)` The section labeled EXAMPLES has exactly what you need. Here is a snippet from the manpage to get you started: ------------------------------- Then to configure nat instance 123 to alias all the outgoing traffic with ip 192.168.0.123, blocking all incoming connections, trying to keep same ports on both sides, clearing aliasing table on address change and keep- ing a log of traffic/link statistics: ipfw nat 123 config ip 192.168.0.123 log deny_in reset same_ports ipfw nat 123 config redirect_addr 10.0.0.1 10.0.0.66 redirect_port tcp 192.168.0.1:80 500 redirect_proto udp 192.168.1.43 192.168.1.1 redirect_addr 192.168.0.10,192.168.0.11 10.0.0.100 # LSNAT redirect_port tcp 192.168.0.1:80,192.168.0.10:22 500 # LSNAT ------------------------------- ~Paul ________________________________ This message may contain confidential or privileged information. If you are= not the intended recipient, please advise us immediately and delete this m= essage. See http://www.datapipe.com/legal/email_disclaimer/ for further inf= ormation on confidentiality and the risks of non-secure electronic communic= ation. If you cannot access these links, please notify us by reply message = and we will send the contents to you. From owner-freebsd-ipfw@FreeBSD.ORG Sat Jun 29 06:50:15 2013 Return-Path: Delivered-To: freebsd-ipfw@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) by hub.freebsd.org (Postfix) with ESMTP id 7620A576; Sat, 29 Jun 2013 06:50:15 +0000 (UTC) (envelope-from sodynet1@gmail.com) Received: from mail-pa0-x230.google.com (mail-pa0-x230.google.com [IPv6:2607:f8b0:400e:c03::230]) by mx1.freebsd.org (Postfix) with ESMTP id 4DC171B4C; Sat, 29 Jun 2013 06:50:15 +0000 (UTC) Received: by mail-pa0-f48.google.com with SMTP id kp12so3210964pab.21 for ; Fri, 28 Jun 2013 23:50:15 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=obJiTNpnORlCIZgLSGHm5zwSxbZHUcNifxQtPzIdoYs=; b=e9W7ouHpqRFsMZajHO1up7wbWi8bx4ZYT/yfWiWIqsQKD2M8KvYYfRzy4hQD/mGZlu UY2EGWfgBk7WOv7G2T66DqVV7KWLK+PbEMgizsnAbt9wsVe2RY9huO/348wnjj7Cwhiv /Rm9/DBdV93OHS1mNIpOU+DK+uerbjAeTN4oG9qMT9Pln0Ev8tBHdlajhskI+AO8jEw+ qb13y1hVJScXLYVszzzn+Xfs7zEE0vi2wLy9HF4lL8K2fowhZv3gGNCBwB9RQyIaq369 M+HGaWvs56hL7C074KTOOTBXBvLjD7FwCIBpMbsMBzMh8pzpQNBivoffU5invI08zH5T agRg== MIME-Version: 1.0 X-Received: by 10.68.171.162 with SMTP id av2mr14745484pbc.104.1372488615092; Fri, 28 Jun 2013 23:50:15 -0700 (PDT) Received: by 10.70.96.139 with HTTP; Fri, 28 Jun 2013 23:50:15 -0700 (PDT) Received: by 10.70.96.139 with HTTP; Fri, 28 Jun 2013 23:50:15 -0700 (PDT) In-Reply-To: <20130629002959.GB20376@nat.myhome> References: <20130629002959.GB20376@nat.myhome> Date: Sat, 29 Jun 2013 09:50:15 +0300 Message-ID: Subject: Re: DNAT in freebsd From: Sami Halabi To: "Paul A. Procacci" Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.14 Cc: freebsd-net@freebsd.org, freebsd-ipfw X-BeenThere: freebsd-ipfw@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: IPFW Technical Discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 29 Jun 2013 06:50:15 -0000 I think I was misunderstood... Here is the situation i want to handle: My box is a router that handles several /24 behind. One of my links (em0) is connected to a private network 192.168.0.1 is me, my neighbour is 192.168.0.2. I want to make that any connection comes to 192.168.0.1 to go to ip 193.xxx.yyy.2 using specific public ip 84.xx.yy.1 And packets comming to my public 84.xx.yy.1 ip to be trsnslated as came from 192.168.0.1 and sent to 192.168.0.2/or ant other ips behind(192.168.1.xx/24). Hope that makes it clearer, and I appreciate any help. Sami =D7=91=D7=AA=D7=90=D7=A8=D7=99=D7=9A 29 =D7=91=D7=99=D7=95=D7=A0 2013 03:30= , =D7=9E=D7=90=D7=AA "Paul A. Procacci" : > > Hi, (sorry for sending again, the last email was with wrong subject) > > I would like to perform a full dnat/snat as in iptbles in: > > linux-ip.net/html/nat-dnat.html > > How it can be done in fbsd, I use ipfw. > > > > I seeked natd man page but its translation, and thr proxy_rule is for > > specefic port, not a whole transparancy. > > > > Using in-kernel nat is probably a better choice IMHO. > > read `man ipfw(8)` > > The section labeled EXAMPLES has exactly what you need. > Here is a snippet from the manpage to get you started: > > ------------------------------- > > > Then to configure nat instance 123 to alias all the outgoing traffic with > ip 192.168.0.123, blocking all incoming connections, trying to keep same > ports on both sides, clearing aliasing table on address change and keep- > ing a log of traffic/link statistics: > > ipfw nat 123 config ip 192.168.0.123 log deny_in reset same_ports > > > > ipfw nat 123 config redirect_addr 10.0.0.1 10.0.0.66 > redirect_port tcp 192.168.0.1:80 500 > redirect_proto udp 192.168.1.43 192.168.1.1 > redirect_addr 192.168.0.10,192.168.0.11 > 10.0.0.100 # LSNAT > redirect_port tcp 192.168.0.1:80, > 192.168.0.10:22 > 500 # LSNAT > > > ------------------------------- > > > ~Paul > > ________________________________ > > This message may contain confidential or privileged information. If you > are not the intended recipient, please advise us immediately and delete > this message. See http://www.datapipe.com/legal/email_disclaimer/ for > further information on confidentiality and the risks of non-secure > electronic communication. If you cannot access these links, please notify > us by reply message and we will send the contents to you. >