Remove files not in the v3_3_8 import.
This commit is contained in:
parent
96c630d7b2
commit
0decb68047
@ -1,11 +0,0 @@
|
||||
|
||||
If you get the following error whilst compiling:
|
||||
|
||||
In file included from /usr/local/lib/gcc-lib/sparc-sun-solaris2.3/2.6.3/include/sys/user.h:48,
|
||||
from /usr/include/sys/file.h:15,
|
||||
from ../ip_nat.c:15:
|
||||
/usr/include/sys/psw.h:19: #error Kernel include of psw.h
|
||||
|
||||
Remove (comment out) the line in
|
||||
/usr/local/lib/gcc-lib/sparc-sun-solaris2.3/2.6.3include/sys/user.h
|
||||
which includes psw.h
|
@ -1,19 +0,0 @@
|
||||
If you have BOTH GNU make and the normal make shipped with your system,
|
||||
DO NOT use the GNU make to build this package. If you have any errors
|
||||
relating to "(" or "TOP", check that you are using /usr/ccs/bin/make as
|
||||
shipped with Solaris 2.
|
||||
|
||||
If you get the following error whilst compiling:
|
||||
|
||||
In file included from /usr/local/lib/gcc-lib/sparc-sun-solaris2.3/2.6.3/include/sys/user.h:48,
|
||||
from /usr/include/sys/file.h:15,
|
||||
from ../ip_nat.c:15:
|
||||
/usr/include/sys/psw.h:19: #error Kernel include of psw.h
|
||||
|
||||
That means that you have a version of gcc build under on older release
|
||||
of Solaris 2.x
|
||||
|
||||
You need to reinstall gcc after each Solaris upgrade; gcc creates its own
|
||||
set of modified system include files which are only valid for the exact
|
||||
release on which gcc was build.
|
||||
|
@ -1,35 +0,0 @@
|
||||
|
||||
BSD/OS users.
|
||||
-------------
|
||||
|
||||
First, you need to build IP Filter. Do this from the "ip_fil3.2.x"
|
||||
directory with the command "make bsdos". If this completes successfully,
|
||||
install the various bits and pieces with "make install-bsd".
|
||||
|
||||
Prior to starting, it is a good idea for you to know what your kernel config
|
||||
file is (it appears that the script guesses incorrectly at present).
|
||||
|
||||
Once you have that in mind, run the 'kinstall' script in the correct
|
||||
BSDOS3 or BSDOS4 directory. This will attempt to patch a bunch of files
|
||||
or install the relevant .o files if you don't have kernel source.
|
||||
It will also go and install all the IP Filter .c and .h files where they
|
||||
can be find when it comes time to build the kernel.
|
||||
|
||||
The script will then pause and ask you for your kernel configuration
|
||||
file. After you enter this, it will add "options IPFILTER" to your
|
||||
kernel configuration file. IF YOU WANT TO DO LOGGING, ADD
|
||||
"options IPFILTER_LOG" to your kernel configuration file NOW!
|
||||
|
||||
Now that you've got your kernel configuration file done, use config
|
||||
to setup a new kernel build and complete with make.
|
||||
|
||||
When the kernel rebuilt is complete, put it into / and reboot with
|
||||
your new kernel. If IP Filter has been configured into your kernel
|
||||
correctly, you will see a message like this when your system boots:
|
||||
|
||||
IP Filter: initialized. Default = pass all, Logging = enabled
|
||||
|
||||
Upon logging in, the IP Filter commands ipfstat, et al, should all
|
||||
function properly.
|
||||
|
||||
Darren
|
@ -1,44 +0,0 @@
|
||||
|
||||
BSD/OS 3.x users.
|
||||
-----------------
|
||||
|
||||
First, you will need to either:
|
||||
(a) have a source license for the kernel so you can patch some files or
|
||||
(b) obtain the relevant pre-compiled .o files (I can't supply these yet).
|
||||
|
||||
The files which you will need patched are:
|
||||
ip_input.c, ip_output.c (maybe in_proto.c and ioconf.c.i386 too - NOT sure).
|
||||
|
||||
First, you need to build IP Filter. Do this from the "ip_fil3.2.x"
|
||||
directory with the command "make bsdos". If this completes successfully,
|
||||
install the various bits and pieces with "make install-bsd".
|
||||
|
||||
Prior to starting, it is a good idea for you to know what your kernel config
|
||||
file is (it appears that the script guesses incorrectly at present).
|
||||
|
||||
Once you have that in mind, run the 'kinstall' script in the BSDOS3
|
||||
directory. This will attempt to patch a bunch of files. If you've
|
||||
obtained the relevant .o files, ignore the errors, otherwise please
|
||||
report them to me and mention which version of BSD/OS you are using
|
||||
and on what platform (Sparc, i386, etc). It will also go and install
|
||||
all the IP Filter .c and .h files where they can be find when it comes
|
||||
time to build the kernel.
|
||||
|
||||
The script will then pause and ask you for your kernel configuration
|
||||
file. After you enter this, it will add "options IPFILTER" to your
|
||||
kernel configuration file. IF YOU WANT TO DO LOGGING, ADD
|
||||
"options IPFILTER_LOG" to your kernel configuration file NOW!
|
||||
|
||||
Now that you've got your kernel configuration file done, use config
|
||||
to setup a new kernel build and complete with make.
|
||||
|
||||
When the kernel rebuilt is complete, put it into / and reboot with
|
||||
your new kernel. If IP Filter has been configured into your kernel
|
||||
correctly, you will see a message like this when your system boots:
|
||||
|
||||
IP Filter: initialized. Default = pass all, Logging = enabled
|
||||
|
||||
Upon logging in, the IP Filter commands ipfstat, et al, should all
|
||||
function properly.
|
||||
|
||||
Darren
|
@ -1,108 +0,0 @@
|
||||
|
||||
IP Filter has been mostly tested under IRIX 6.2. It should work under IRIX 6.3
|
||||
as well. Under IRIX 5.3, it has been successfully compiled and linked in the
|
||||
kernel, but not tested. Compilation under IRIX >= 6.4 is not yet supported.
|
||||
|
||||
To build a kernel with the IP filter and install it on your system,
|
||||
follow these steps:
|
||||
|
||||
1. edit the top-level Makefile to
|
||||
a) comment-out the IPFLKM definition.
|
||||
This means changing the line reading:
|
||||
IPFLKM=-DIPFILTER_LKM
|
||||
to
|
||||
#IPFLKM=-DIPFILTER_LKM
|
||||
b) select the system's compiler (cc)
|
||||
This means changing the line reading:
|
||||
CC=gcc
|
||||
to
|
||||
CC=cc
|
||||
b) enable full optimization
|
||||
This means changing the lines reading:
|
||||
DEBUG=-g
|
||||
CFLAGS=-I$$(TOP)
|
||||
to
|
||||
DEBUG=
|
||||
CFLAGS=-O2 -I$$(TOP)
|
||||
|
||||
1. do "make irix" (Warning: GNU make is not supported, so if it has
|
||||
been installed on your system, verify your path and/or do "which make"
|
||||
to guarantee that IRIX's /sbin/make has precedence)
|
||||
|
||||
2. do "make install-irix" as root
|
||||
(a new kernel will be automatically built)
|
||||
|
||||
3. determine the filtering rules and place them in /etc/ipf.conf
|
||||
and /etc/ipnat.conf
|
||||
|
||||
4. do "init 6" as root to reboot with the new kernel
|
||||
|
||||
After restarting, the filter should be active and behaving according to
|
||||
the rules loaded from /etc/ipf.conf and /etc/ipfnat.conf.
|
||||
|
||||
These files can be changed at any time, and reloaded using the
|
||||
following command sequence:
|
||||
|
||||
# sh /etc/init.d/ipf stop; sh /etc/init.d/ipf start
|
||||
|
||||
|
||||
To remove the IP Filter from your kernel, follow these steps:
|
||||
|
||||
1. Delete the /var/sysgen/boot/ipfilter.o file
|
||||
|
||||
# rm /var/sysgen/boot/ipfilter.o
|
||||
|
||||
2. If SGI's ipfilter.o had been previously installed, restore it
|
||||
back to its original location
|
||||
|
||||
# mv /var/sysgen/boot/ipfilter.o.DIST /var/sysgen/boot/ipfilter.o
|
||||
|
||||
3. Build a new kernel
|
||||
|
||||
# /etc/autoconfig
|
||||
|
||||
4. Delete the /etc/rc2.d/S33ipf symbolic link
|
||||
|
||||
# rm /etc/rc2.d/S33ipf
|
||||
|
||||
5. Reboot
|
||||
|
||||
# init 6
|
||||
|
||||
|
||||
ADDITIONAL NOTES:
|
||||
|
||||
- The IP filter uses the same kernel interface to the IP driver as
|
||||
SGI's ipfilter. In fact, it is installed in place of SGI's
|
||||
/var/sysgen/boot/ipfilter.o module, after renaming it (if installed)
|
||||
to /var/sysgen/boot/ipfilter.o.DIST. You should ensure that SGI's
|
||||
ipfilterd daemon is not running simultaneously, since this package uses
|
||||
the same major device number.
|
||||
|
||||
- We have not tested IP Filter on a multiprocessor machine yet.
|
||||
However, feel free to try it and send your experiences/patches
|
||||
back to marc@CAM.ORG. SGI prescribes that kernel code be built on such
|
||||
systems with -D_MP_NETLOCKS -DMP. Therefore, these flags should
|
||||
probably be uncommented on the DFLAGS line of IRIX/Makefile if your
|
||||
machine has more than one processor.
|
||||
|
||||
- It is also possible to build IP Filter as a dynamically loadable
|
||||
kernel module (by retaining the IPFLKM=-DIPFILTER_LKM definition in the
|
||||
top-level Makefile), but this is not recommended other than for testing
|
||||
and debugging purposes, because the only possible method for dynamic
|
||||
attachment to the IP stack (instruction patching) is highly dependent
|
||||
on the processor architecture. The code provided has only been tested
|
||||
with IP22 CPU boards and can sometime cause panics during loading due
|
||||
to a potential race condition.
|
||||
|
||||
|
||||
CREDITS:
|
||||
|
||||
IP Filter was ported to IRIX by Marc Boucher <marc@CAM.ORG>
|
||||
|
||||
Marc Boucher wishes to thank the
|
||||
ICARI Institute (http://www.icari.qc.ca)
|
||||
and
|
||||
Aurelio Cascio <aurelio@toonboom.com>
|
||||
for their financial support and testing facilities, respectively.
|
||||
|
@ -1,50 +0,0 @@
|
||||
IP-Filter on Linux 2.0.31
|
||||
-------------------------
|
||||
|
||||
NOTE: I have *ONLY* compiled and created patches for using IP Filter on
|
||||
Linux 2.0.31. Any other kernel revision may need seprate patches.
|
||||
Also, I've only tested on a x86 CPU so I can't make any guarantees
|
||||
about it working on Sparc/Mac/Amiga.
|
||||
|
||||
First, you should do a sanity check of your system to make sure it will
|
||||
compile IP Filter. You will need a "libfl" and a "libelf". If you don't
|
||||
have these, install them before proceeding.
|
||||
|
||||
The installation and compiliation process assumes that Linux 2.0.31
|
||||
will be in the /usr/src/linux directory and that all the symbolic links
|
||||
in /usr/include match. /usr/src/linux may be a symbolic link too, but
|
||||
it must point to a 2.0.31 kernel source tree.
|
||||
|
||||
The first step is to make the IP Filter binaries. Do this with a
|
||||
"make linux" from the ip_fil3.2.x directory. If this completes with
|
||||
no errors, install IP Filter with a "make install-linux".
|
||||
|
||||
Now that the user part of it is complete, it is time to work on the kernel.
|
||||
To start this off, run "Linux/minstall". This will configure the devices
|
||||
you will need for the IP Filter. Then run "Linux/kinstall". This will
|
||||
patch your kernel source code and configuration files so you can enabled IP
|
||||
Filter. You must now go to /usr/src/linux and configure your kernel using one
|
||||
of the available interfaces to enable IP Filter. IP Filter will be presented
|
||||
as a three way choice "y/m/n" - select "m" to enable it. Save your kernel
|
||||
configuration file, rebuild, install and reboot with the new kernel.
|
||||
|
||||
When you've rebooted with the new kernel, you should be able to load
|
||||
IP Filter with the command "insmod if_ipl". All going will, you will
|
||||
see a message like this on your console:
|
||||
|
||||
IP Filter: initialized. Default = pass all, Logging = enabled
|
||||
|
||||
indicating that IP Filter has successfully been loaded into the kernel
|
||||
and is awaiting.
|
||||
|
||||
Darren
|
||||
|
||||
Features Not Available on Linux, yet:
|
||||
|
||||
- compiled into the kernel
|
||||
"<action> in on <if> to <if> ..."
|
||||
"<action> in on <if> dup-to <if> ..."
|
||||
"<action> in on <if> fastroute ..."
|
||||
"block return-rst ..."
|
||||
"map ... proxy ..." (Linux's masquerading is better at present)
|
||||
|
@ -1,59 +0,0 @@
|
||||
|
||||
To build a kernel for use with the loadable kernel module, follow these
|
||||
steps:
|
||||
1. do "make netbsd"
|
||||
|
||||
2. do "make install-bsd"
|
||||
(probably has to be done as root)
|
||||
|
||||
3(a) NetBSD systems prior to 1.2:
|
||||
run "NetBSD/minstall" as root
|
||||
3(b) NetBSD 1.2 systems or later:
|
||||
run "NetBSD-1.2/minstall" as root
|
||||
|
||||
4. build a new kernel
|
||||
|
||||
5. install and reboot with the new kernel
|
||||
|
||||
6. use modload(8) to load the packet filter with:
|
||||
modload if_ipl.o
|
||||
|
||||
7. do "modstat" to confirm that it has been loaded successfully.
|
||||
|
||||
There is no need to use mknod to create the device in /dev;
|
||||
- upon loading the module, it will create itself with the correct values,
|
||||
under the name (IPL_NAME) from the Makefile. It will also remove itself
|
||||
from /dev when it is modunload'd.
|
||||
|
||||
To build a kernel with the IP filter, follow these steps:
|
||||
|
||||
1. do "make netbsd"
|
||||
|
||||
2. do "make install-bsd"
|
||||
(probably has to be done as root)
|
||||
|
||||
3(a) NetBSD systems prior to 1.2:
|
||||
run "NetBSD/kinstall" as root
|
||||
3(b) NetBSD 1.2 systems or later:
|
||||
run "NetBSD-1.2/kinstall" as root
|
||||
3(c) If conf.c fails on the 2nd hunk of the patch, you will have to
|
||||
manually apply the patch.
|
||||
|
||||
4. build a new kernel
|
||||
|
||||
5. Create device files. For NetBSD-1.2 (or later), use 49 as the
|
||||
major number. For NetBSD-1.1 or earlier, use 59. Run these
|
||||
commands as root, substituting <major> for the appropriate number:
|
||||
|
||||
mknod /dev/ipl c <major> 0
|
||||
mknod /dev/ipnat c <major> 1
|
||||
mknod /dev/ipstate c <major> 2
|
||||
mknod /dev/ipauth c <major> 3
|
||||
|
||||
** NOTE: both the numbers 49 and 59 should be substituted with
|
||||
whatever number you inserted it into conf.c as.
|
||||
|
||||
6. install and reboot with the new kernel
|
||||
|
||||
Darren Reed
|
||||
darrenr@pobox.com
|
@ -1,28 +0,0 @@
|
||||
|
||||
For those running Solaris 2.5 or later, please read COMPILE.2.5 before
|
||||
building IP Filter.
|
||||
|
||||
Type "make solaris" to build all the required binaries. DO NOT USE THE
|
||||
GNU make!!!
|
||||
|
||||
Once IP Filter has been successfully compiled, you may then install it using
|
||||
the usual package method (using pkgadd), however, the package needs to be
|
||||
created, prior to pkgadd'ing. To create the package in /var/spool/pkg, change
|
||||
directory to SunOS5 and enter the following command:
|
||||
|
||||
make package
|
||||
|
||||
This will build the package into SunOS5/<arch>/root, copy that to
|
||||
/var/spool/pkg as a package and then start the installation using
|
||||
pkgadd.
|
||||
|
||||
As part of the postinstall script, it will install loadable kernel module
|
||||
as part of Solaris 2 (using add_drv) making it available for immeadiate use.
|
||||
|
||||
IP Filter will be installed into /opt/CYBSipf (programs, manual pages and
|
||||
examples) and create a directory /etc/opt/CYBSipf with a null body file
|
||||
called "ipf.conf" using touch. The rc scripts have been written to look
|
||||
for the configuration file here, using the installed binaries in /sbin.
|
||||
|
||||
Darren Reed
|
||||
darrenr@pobox.com
|
@ -1,40 +0,0 @@
|
||||
|
||||
To install as a Loadable Kernel Module (LKM):
|
||||
|
||||
1. do a "make solaris" in this directory
|
||||
|
||||
2. Run the script "SunOS4/minstall" as root.
|
||||
|
||||
3. change directory to SunOS4 and run "make install"
|
||||
|
||||
4. Reboot using the new kernel
|
||||
|
||||
5. use modload(8) to load the packet filter with:
|
||||
modload if_ipl.o
|
||||
|
||||
6. do "modstat" to confirm that it has been loaded successfully.
|
||||
|
||||
There is no need to use mknod to create the device in /dev;
|
||||
- upon loading the module, it will create itself with the correct
|
||||
values, under the name (IPL_NAME) from the Makefile. It will
|
||||
also remove itself from /dev when it is modunload'd.
|
||||
|
||||
|
||||
To install as part of a SunOS 4.1.x kernel:
|
||||
|
||||
1. do a "make solaris" in this directory
|
||||
|
||||
2. Run the script "SunOS4/kinstall" as root.
|
||||
NOTE: This script sets up /dev/ipl as char. device 59,0
|
||||
in /sys/sun/conf.c
|
||||
|
||||
3. Run the following commands as root:
|
||||
mknod /dev/ipl c 59 0
|
||||
mknod /dev/ipnat c 59 1
|
||||
mknod /dev/ipstate c 59 2
|
||||
mknod /dev/ipauth c 59 3
|
||||
|
||||
4. Reboot using the new kernel
|
||||
|
||||
Darren Reed
|
||||
darrenr@pobox.com
|
@ -1,44 +0,0 @@
|
||||
|
||||
To build a kernel for use with the loadable kernel module, follow these
|
||||
steps:
|
||||
1. do "make bsd"
|
||||
|
||||
2. cd to the "BSD" directory and type "make install"
|
||||
|
||||
3. run "4bsd/minstall" as root
|
||||
|
||||
4. build a new kernel
|
||||
|
||||
5. install and reboot with the new kernel
|
||||
|
||||
6. use modload(8) to load the packet filter with:
|
||||
modload if_ipl.o
|
||||
|
||||
7. do "modstat" to confirm that it has been loaded successfully.
|
||||
|
||||
There is no need to use mknod to create the device in /dev;
|
||||
- upon loading the module, it will create itself with the correct values,
|
||||
under the name (IPL_NAME) from the Makefile. It will also remove itself
|
||||
from /dev when it is modunload'd.
|
||||
|
||||
To build a kernel with the IP filter, follow these steps:
|
||||
|
||||
1. do "make bsd"
|
||||
|
||||
2. cd to the "BSD" directory and type "make install"
|
||||
|
||||
3. run "4bsd/kinstall" as root
|
||||
|
||||
4. build a new kernel
|
||||
|
||||
5. create devices for IP Filter as follows (assuming it was
|
||||
installed into the device table as char dev 20):
|
||||
mknod /dev/ipl c 20 0
|
||||
mknod /dev/ipnat c 20 1
|
||||
mknod /dev/ipstate c 20 2
|
||||
mknod /dev/ipauth c 20 3
|
||||
|
||||
6. install and reboot with the new kernel
|
||||
|
||||
Darren
|
||||
darrenr@pobox.com
|
@ -1,16 +0,0 @@
|
||||
#!/bin/sh
|
||||
LINUX=`uname -r | perl -e '$_=<>;@F=split(/\./);printf "%02d%02d\n",$F[0],$F[1];';`
|
||||
|
||||
case ${LINUX} in
|
||||
0200)
|
||||
make linuxrev "LINUXK=-DLINUX=${LINUX}"
|
||||
;;
|
||||
0201)
|
||||
make linuxrev "LINUXK=-DLINUX=${LINUX}"
|
||||
;;
|
||||
*)
|
||||
echo "invalid linux version $LINUX"
|
||||
exit 1;
|
||||
;;
|
||||
esac
|
||||
exit 0
|
@ -1,49 +0,0 @@
|
||||
#! /bin/sh
|
||||
if [ ! -f netinet/done ] ; then
|
||||
echo "Do NOT run this script directly, do 'make solaris'!"
|
||||
exit 1
|
||||
fi
|
||||
# $Id: buildsunos,v 2.1.2.1 1999/08/08 13:55:20 darrenr Exp $
|
||||
:
|
||||
rev=`uname -r | sed -e 's/^\([^\.]*\)\..*/\1/'`
|
||||
if [ -d /usr/ccs/bin ] ; then
|
||||
PATH=/usr/ccs/bin:${PATH}
|
||||
fi
|
||||
if [ $rev = 5 ] ; then
|
||||
cpu=`uname -p`
|
||||
cpudir=${cpu}-`uname -r`
|
||||
solrev=`uname -r | sh -c 'IFS=. read j n x; echo $n'`
|
||||
if [ ! -d SunOS5/${cpudir} -a ! -h SunOS5/${cpudir} ] ; then
|
||||
mkdir -p SunOS5/${cpudir}
|
||||
fi
|
||||
/bin/rm -f SunOS5/${cpudir}/Makefile
|
||||
/bin/rm -f SunOS5/${cpudir}/Makefile.ipsend
|
||||
ln -s `pwd`/SunOS5/Makefile SunOS5/${cpudir}/Makefile
|
||||
ln -s `pwd`/SunOS5/Makefile.ipsend SunOS5/${cpudir}/Makefile.ipsend
|
||||
ARCHINC=
|
||||
XARCH=
|
||||
if [ -d /opt/SUNWspro/bin ] ; then
|
||||
CC="/opt/SUNWspro/bin/cc ${CFL}"
|
||||
export CC
|
||||
/bin/optisa sparcv9 >/dev/null 2>&1
|
||||
if [ $? -eq 0 ] ; then
|
||||
ARCHINC="-I/usr/include/v9"
|
||||
XARCH="-xarch=v9 -xchip=ultra -dalign -xcode=abs32"
|
||||
fi
|
||||
else
|
||||
CC=gcc
|
||||
fi
|
||||
else
|
||||
cpu=`uname -m`
|
||||
cpudir=${cpu}-`uname -r`
|
||||
fi
|
||||
if [ $cpu = i386 ] ; then
|
||||
make ${1+"$@"} sunos5x86 SOLARIS2="-DSOLARIS2=$solrev" CPU= CPUDIR=${cpudir} CC="$CC $XARCH" XARCH="$XARCH" ARCHINC="$ARCHINC"
|
||||
exit $?
|
||||
fi
|
||||
if [ x$solrev = x ] ; then
|
||||
make ${1+"$@"} sunos$rev "ARCH=`uname -m`"
|
||||
exit $?
|
||||
fi
|
||||
make ${1+"$@"} sunos$rev SOLARIS2="-DSOLARIS2=$solrev" CPU= CPUDIR=${cpudir} CC="$CC $XARCH" XARCH="$XARCH" ARCHINC="$ARCHINC"
|
||||
exit $?
|
@ -1,2 +0,0 @@
|
||||
Æ. Ä..'!CVS
|
||||
protocols
|
@ -1,83 +0,0 @@
|
||||
/*
|
||||
* (C)opyright 1993,1994,1995 by Darren Reed.
|
||||
*
|
||||
* Redistribution and use in source and binary forms are permitted
|
||||
* provided that this notice is preserved and due credit is given
|
||||
* to the original author and the contributors.
|
||||
*/
|
||||
|
||||
/*
|
||||
* routines below for saving IP headers to buffer
|
||||
*/
|
||||
int iplopen(struct inode * inode, struct file * filp)
|
||||
{
|
||||
u_int min = MINOR(inode->i_rdev);
|
||||
|
||||
if (flags & FWRITE)
|
||||
return ENXIO;
|
||||
if (min)
|
||||
return ENXIO;
|
||||
iplbusy++;
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
int iplclose(struct inode * inode, struct file * filp)
|
||||
{
|
||||
u_int min = MINOR(inode->i_rdev);
|
||||
|
||||
if (min)
|
||||
return ENXIO;
|
||||
iplbusy--;
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* iplread/ipllog
|
||||
* all three of these must operate with at least splnet() lest they be
|
||||
* called during packet processing and cause an inconsistancy to appear in
|
||||
* the filter lists.
|
||||
*/
|
||||
int iplread(struct inode *inode, struct file *file, char *buf, int count)
|
||||
{
|
||||
register int ret, s;
|
||||
register size_t sz, sx;
|
||||
int error;
|
||||
|
||||
if (!uio->uio_resid)
|
||||
return 0;
|
||||
while (!iplused) {
|
||||
error = SLEEP(iplbuf, "ipl sleep");
|
||||
if (error)
|
||||
return error;
|
||||
}
|
||||
|
||||
SPLNET(s);
|
||||
|
||||
ret = sx = sz = MIN(count, iplused);
|
||||
if (iplh < iplt)
|
||||
sz = MIN(sz, LOGSIZE - (iplt - iplbuf));
|
||||
sx -= sz;
|
||||
|
||||
memcpy_tofs(buf, iplt, sz);
|
||||
buf += sz;
|
||||
iplt += sz;
|
||||
iplused -= sz;
|
||||
if ((iplh < iplt) && (iplt == iplbuf + LOGSIZE))
|
||||
iplt = iplbuf;
|
||||
|
||||
if (sx) {
|
||||
memcpy_tofs(buf, iplt, sx);
|
||||
ret += sx;
|
||||
iplt += sx;
|
||||
iplused -= sx;
|
||||
if ((iplh < iplt) && (iplt == iplbuf + LOGSIZE))
|
||||
iplt = iplbuf;
|
||||
}
|
||||
if (!iplused) /* minimise wrapping around the end */
|
||||
iplh = iplt = iplbuf;
|
||||
|
||||
SPLX(s);
|
||||
return ret;
|
||||
}
|
@ -1,201 +0,0 @@
|
||||
/*
|
||||
* (C)opyright 1995 by Darren Reed.
|
||||
*
|
||||
* This code may be freely distributed as long as it retains this notice
|
||||
* and is not changed in any way. The author accepts no responsibility
|
||||
* for the use of this software. I hate legaleese, don't you ?
|
||||
*
|
||||
* @(#)ip_compat.h 1.1 9/14/95
|
||||
*/
|
||||
|
||||
/*
|
||||
* These #ifdef's are here mainly for linux, but who knows, they may
|
||||
* not be in other places or maybe one day linux will grow up and some
|
||||
* of these will turn up there too.
|
||||
*/
|
||||
#ifndef ICMP_UNREACH
|
||||
# define ICMP_UNREACH ICMP_DEST_UNREACH
|
||||
#endif
|
||||
#ifndef ICMP_SOURCEQUENCH
|
||||
# define ICMP_SOURCEQUENCH ICMP_SOURCE_QUENCH
|
||||
#endif
|
||||
#ifndef ICMP_TIMXCEED
|
||||
# define ICMP_TIMXCEED ICMP_TIME_EXCEEDED
|
||||
#endif
|
||||
#ifndef ICMP_PARAMPROB
|
||||
# define ICMP_PARAMPROB ICMP_PARAMETERPROB
|
||||
#endif
|
||||
#ifndef IPVERSION
|
||||
# define IPVERSION 4
|
||||
#endif
|
||||
#ifndef IPOPT_MINOFF
|
||||
# define IPOPT_MINOFF 4
|
||||
#endif
|
||||
#ifndef IPOPT_COPIED
|
||||
# define IPOPT_COPIED(x) ((x)&0x80)
|
||||
#endif
|
||||
#ifndef IPOPT_EOL
|
||||
# define IPOPT_EOL 0
|
||||
#endif
|
||||
#ifndef IPOPT_NOP
|
||||
# define IPOPT_NOP 1
|
||||
#endif
|
||||
#ifndef IP_MF
|
||||
# define IP_MF ((u_short)0x2000)
|
||||
#endif
|
||||
#ifndef ETHERTYPE_IP
|
||||
# define ETHERTYPE_IP ((u_short)0x0800)
|
||||
#endif
|
||||
#ifndef TH_FIN
|
||||
# define TH_FIN 0x01
|
||||
#endif
|
||||
#ifndef TH_SYN
|
||||
# define TH_SYN 0x02
|
||||
#endif
|
||||
#ifndef TH_RST
|
||||
# define TH_RST 0x04
|
||||
#endif
|
||||
#ifndef TH_PUSH
|
||||
# define TH_PUSH 0x08
|
||||
#endif
|
||||
#ifndef TH_ACK
|
||||
# define TH_ACK 0x10
|
||||
#endif
|
||||
#ifndef TH_URG
|
||||
# define TH_URG 0x20
|
||||
#endif
|
||||
#ifndef IPOPT_EOL
|
||||
# define IPOPT_EOL 0
|
||||
#endif
|
||||
#ifndef IPOPT_NOP
|
||||
# define IPOPT_NOP 1
|
||||
#endif
|
||||
#ifndef IPOPT_RR
|
||||
# define IPOPT_RR 7
|
||||
#endif
|
||||
#ifndef IPOPT_TS
|
||||
# define IPOPT_TS 68
|
||||
#endif
|
||||
#ifndef IPOPT_SECURITY
|
||||
# define IPOPT_SECURITY 130
|
||||
#endif
|
||||
#ifndef IPOPT_LSRR
|
||||
# define IPOPT_LSRR 131
|
||||
#endif
|
||||
#ifndef IPOPT_SATID
|
||||
# define IPOPT_SATID 136
|
||||
#endif
|
||||
#ifndef IPOPT_SSRR
|
||||
# define IPOPT_SSRR 137
|
||||
#endif
|
||||
#ifndef IPOPT_SECUR_UNCLASS
|
||||
# define IPOPT_SECUR_UNCLASS ((u_short)0x0000)
|
||||
#endif
|
||||
#ifndef IPOPT_SECUR_CONFID
|
||||
# define IPOPT_SECUR_CONFID ((u_short)0xf135)
|
||||
#endif
|
||||
#ifndef IPOPT_SECUR_EFTO
|
||||
# define IPOPT_SECUR_EFTO ((u_short)0x789a)
|
||||
#endif
|
||||
#ifndef IPOPT_SECUR_MMMM
|
||||
# define IPOPT_SECUR_MMMM ((u_short)0xbc4d)
|
||||
#endif
|
||||
#ifndef IPOPT_SECUR_RESTR
|
||||
# define IPOPT_SECUR_RESTR ((u_short)0xaf13)
|
||||
#endif
|
||||
#ifndef IPOPT_SECUR_SECRET
|
||||
# define IPOPT_SECUR_SECRET ((u_short)0xd788)
|
||||
#endif
|
||||
#ifndef IPOPT_SECUR_TOPSECRET
|
||||
# define IPOPT_SECUR_TOPSECRET ((u_short)0x6bc5)
|
||||
#endif
|
||||
|
||||
#ifdef linux
|
||||
# define icmp icmphdr
|
||||
# define icmp_type type
|
||||
# define icmp_code code
|
||||
|
||||
/*
|
||||
* From /usr/include/netinet/ip_var.h
|
||||
* !%@#!$@# linux...
|
||||
*/
|
||||
struct ipovly {
|
||||
caddr_t ih_next, ih_prev; /* for protocol sequence q's */
|
||||
u_char ih_x1; /* (unused) */
|
||||
u_char ih_pr; /* protocol */
|
||||
short ih_len; /* protocol length */
|
||||
struct in_addr ih_src; /* source internet address */
|
||||
struct in_addr ih_dst; /* destination internet address */
|
||||
};
|
||||
|
||||
typedef struct {
|
||||
__u16 th_sport;
|
||||
__u16 th_dport;
|
||||
__u32 th_seq;
|
||||
__u32 th_ack;
|
||||
# if defined(__i386__) || defined(__MIPSEL__) || defined(__alpha__) ||\
|
||||
defined(vax)
|
||||
__u8 th_res:4;
|
||||
__u8 th_off:4;
|
||||
#else
|
||||
__u8 th_off:4;
|
||||
__u8 th_res:4;
|
||||
#endif
|
||||
__u8 th_flags;
|
||||
__u16 th_win;
|
||||
__u16 th_sum;
|
||||
__u16 th_urp;
|
||||
} tcphdr_t;
|
||||
|
||||
typedef struct {
|
||||
__u16 uh_sport;
|
||||
__u16 uh_dport;
|
||||
__s16 uh_ulen;
|
||||
__u16 uh_sum;
|
||||
} udphdr_t;
|
||||
|
||||
typedef struct {
|
||||
# if defined(__i386__) || defined(__MIPSEL__) || defined(__alpha__) ||\
|
||||
defined(vax)
|
||||
__u8 ip_hl:4;
|
||||
__u8 ip_v:4;
|
||||
# else
|
||||
__u8 ip_hl:4;
|
||||
__u8 ip_v:4;
|
||||
# endif
|
||||
__u8 ip_tos;
|
||||
__u16 ip_len;
|
||||
__u16 ip_id;
|
||||
__u16 ip_off;
|
||||
__u8 ip_ttl;
|
||||
__u8 ip_p;
|
||||
__u16 ip_sum;
|
||||
struct in_addr ip_src;
|
||||
struct in_addr ip_dst;
|
||||
} ip_t;
|
||||
|
||||
typedef struct {
|
||||
__u8 ether_dhost[6];
|
||||
__u8 ether_shost[6];
|
||||
__u16 ether_type;
|
||||
} ether_header_t;
|
||||
|
||||
# define bcopy(a,b,c) memmove(b,a,c)
|
||||
# define bcmp(a,b,c) memcmp(a,b,c)
|
||||
|
||||
# define ifnet device
|
||||
|
||||
#else
|
||||
|
||||
typedef struct udphdr udphdr_t;
|
||||
typedef struct tcphdr tcphdr_t;
|
||||
typedef struct ip ip_t;
|
||||
typedef struct ether_header ether_header_t;
|
||||
|
||||
#endif
|
||||
|
||||
#ifdef solaris
|
||||
# define bcopy(a,b,c) memmove(b,a,c)
|
||||
# define bcmp(a,b,c) memcmp(a,b,c)
|
||||
# define bzero(a,b) memset(a,0,b)
|
||||
#endif
|
@ -1,242 +0,0 @@
|
||||
/*
|
||||
* (C)opyright 1995 by Darren Reed.
|
||||
*
|
||||
* This code may be freely distributed as long as it retains this notice
|
||||
* and is not changed in any way. The author accepts no responsibility
|
||||
* for the use of this software. I hate legaleese, don't you ?
|
||||
*
|
||||
* @(#)ip_compat.h 1.2 12/7/95
|
||||
*/
|
||||
|
||||
/*
|
||||
* These #ifdef's are here mainly for linux, but who knows, they may
|
||||
* not be in other places or maybe one day linux will grow up and some
|
||||
* of these will turn up there too.
|
||||
*/
|
||||
#ifndef ICMP_UNREACH
|
||||
# define ICMP_UNREACH ICMP_DEST_UNREACH
|
||||
#endif
|
||||
#ifndef ICMP_SOURCEQUENCH
|
||||
# define ICMP_SOURCEQUENCH ICMP_SOURCE_QUENCH
|
||||
#endif
|
||||
#ifndef ICMP_TIMXCEED
|
||||
# define ICMP_TIMXCEED ICMP_TIME_EXCEEDED
|
||||
#endif
|
||||
#ifndef ICMP_PARAMPROB
|
||||
# define ICMP_PARAMPROB ICMP_PARAMETERPROB
|
||||
#endif
|
||||
#ifndef IPVERSION
|
||||
# define IPVERSION 4
|
||||
#endif
|
||||
#ifndef IPOPT_MINOFF
|
||||
# define IPOPT_MINOFF 4
|
||||
#endif
|
||||
#ifndef IPOPT_COPIED
|
||||
# define IPOPT_COPIED(x) ((x)&0x80)
|
||||
#endif
|
||||
#ifndef IPOPT_EOL
|
||||
# define IPOPT_EOL 0
|
||||
#endif
|
||||
#ifndef IPOPT_NOP
|
||||
# define IPOPT_NOP 1
|
||||
#endif
|
||||
#ifndef IP_MF
|
||||
# define IP_MF ((u_short)0x2000)
|
||||
#endif
|
||||
#ifndef ETHERTYPE_IP
|
||||
# define ETHERTYPE_IP ((u_short)0x0800)
|
||||
#endif
|
||||
#ifndef TH_FIN
|
||||
# define TH_FIN 0x01
|
||||
#endif
|
||||
#ifndef TH_SYN
|
||||
# define TH_SYN 0x02
|
||||
#endif
|
||||
#ifndef TH_RST
|
||||
# define TH_RST 0x04
|
||||
#endif
|
||||
#ifndef TH_PUSH
|
||||
# define TH_PUSH 0x08
|
||||
#endif
|
||||
#ifndef TH_ACK
|
||||
# define TH_ACK 0x10
|
||||
#endif
|
||||
#ifndef TH_URG
|
||||
# define TH_URG 0x20
|
||||
#endif
|
||||
#ifndef IPOPT_EOL
|
||||
# define IPOPT_EOL 0
|
||||
#endif
|
||||
#ifndef IPOPT_NOP
|
||||
# define IPOPT_NOP 1
|
||||
#endif
|
||||
#ifndef IPOPT_RR
|
||||
# define IPOPT_RR 7
|
||||
#endif
|
||||
#ifndef IPOPT_TS
|
||||
# define IPOPT_TS 68
|
||||
#endif
|
||||
#ifndef IPOPT_SECURITY
|
||||
# define IPOPT_SECURITY 130
|
||||
#endif
|
||||
#ifndef IPOPT_LSRR
|
||||
# define IPOPT_LSRR 131
|
||||
#endif
|
||||
#ifndef IPOPT_SATID
|
||||
# define IPOPT_SATID 136
|
||||
#endif
|
||||
#ifndef IPOPT_SSRR
|
||||
# define IPOPT_SSRR 137
|
||||
#endif
|
||||
#ifndef IPOPT_SECUR_UNCLASS
|
||||
# define IPOPT_SECUR_UNCLASS ((u_short)0x0000)
|
||||
#endif
|
||||
#ifndef IPOPT_SECUR_CONFID
|
||||
# define IPOPT_SECUR_CONFID ((u_short)0xf135)
|
||||
#endif
|
||||
#ifndef IPOPT_SECUR_EFTO
|
||||
# define IPOPT_SECUR_EFTO ((u_short)0x789a)
|
||||
#endif
|
||||
#ifndef IPOPT_SECUR_MMMM
|
||||
# define IPOPT_SECUR_MMMM ((u_short)0xbc4d)
|
||||
#endif
|
||||
#ifndef IPOPT_SECUR_RESTR
|
||||
# define IPOPT_SECUR_RESTR ((u_short)0xaf13)
|
||||
#endif
|
||||
#ifndef IPOPT_SECUR_SECRET
|
||||
# define IPOPT_SECUR_SECRET ((u_short)0xd788)
|
||||
#endif
|
||||
#ifndef IPOPT_SECUR_TOPSECRET
|
||||
# define IPOPT_SECUR_TOPSECRET ((u_short)0x6bc5)
|
||||
#endif
|
||||
|
||||
#ifdef linux
|
||||
# if LINUX < 0200
|
||||
# define icmp icmphdr
|
||||
# define icmp_type type
|
||||
# define icmp_code code
|
||||
# endif
|
||||
|
||||
/*
|
||||
* From /usr/include/netinet/ip_var.h
|
||||
* !%@#!$@# linux...
|
||||
*/
|
||||
struct ipovly {
|
||||
caddr_t ih_next, ih_prev; /* for protocol sequence q's */
|
||||
u_char ih_x1; /* (unused) */
|
||||
u_char ih_pr; /* protocol */
|
||||
short ih_len; /* protocol length */
|
||||
struct in_addr ih_src; /* source internet address */
|
||||
struct in_addr ih_dst; /* destination internet address */
|
||||
};
|
||||
|
||||
typedef struct {
|
||||
__u16 th_sport;
|
||||
__u16 th_dport;
|
||||
__u32 th_seq;
|
||||
__u32 th_ack;
|
||||
# if defined(__i386__) || defined(__MIPSEL__) || defined(__alpha__) ||\
|
||||
defined(vax)
|
||||
__u8 th_res:4;
|
||||
__u8 th_off:4;
|
||||
#else
|
||||
__u8 th_off:4;
|
||||
__u8 th_res:4;
|
||||
#endif
|
||||
__u8 th_flags;
|
||||
__u16 th_win;
|
||||
__u16 th_sum;
|
||||
__u16 th_urp;
|
||||
} tcphdr_t;
|
||||
|
||||
typedef struct {
|
||||
__u16 uh_sport;
|
||||
__u16 uh_dport;
|
||||
__s16 uh_ulen;
|
||||
__u16 uh_sum;
|
||||
} udphdr_t;
|
||||
|
||||
typedef struct {
|
||||
# if defined(__i386__) || defined(__MIPSEL__) || defined(__alpha__) ||\
|
||||
defined(vax)
|
||||
__u8 ip_hl:4;
|
||||
__u8 ip_v:4;
|
||||
# else
|
||||
__u8 ip_hl:4;
|
||||
__u8 ip_v:4;
|
||||
# endif
|
||||
__u8 ip_tos;
|
||||
__u16 ip_len;
|
||||
__u16 ip_id;
|
||||
__u16 ip_off;
|
||||
__u8 ip_ttl;
|
||||
__u8 ip_p;
|
||||
__u16 ip_sum;
|
||||
struct in_addr ip_src;
|
||||
struct in_addr ip_dst;
|
||||
} ip_t;
|
||||
|
||||
typedef struct {
|
||||
__u8 ether_dhost[6];
|
||||
__u8 ether_shost[6];
|
||||
__u16 ether_type;
|
||||
} ether_header_t;
|
||||
|
||||
typedef struct icmp {
|
||||
u_char icmp_type; /* type of message, see below */
|
||||
u_char icmp_code; /* type sub code */
|
||||
u_short icmp_cksum; /* ones complement cksum of struct */
|
||||
union {
|
||||
u_char ih_pptr; /* ICMP_PARAMPROB */
|
||||
struct in_addr ih_gwaddr; /* ICMP_REDIRECT */
|
||||
struct ih_idseq {
|
||||
n_short icd_id;
|
||||
n_short icd_seq;
|
||||
} ih_idseq;
|
||||
int ih_void;
|
||||
} icmp_hun;
|
||||
#define icmp_pptr icmp_hun.ih_pptr
|
||||
#define icmp_gwaddr icmp_hun.ih_gwaddr
|
||||
#define icmp_id icmp_hun.ih_idseq.icd_id
|
||||
#define icmp_seq icmp_hun.ih_idseq.icd_seq
|
||||
#define icmp_void icmp_hun.ih_void
|
||||
union {
|
||||
struct id_ts {
|
||||
n_time its_otime;
|
||||
n_time its_rtime;
|
||||
n_time its_ttime;
|
||||
} id_ts;
|
||||
struct id_ip {
|
||||
ip_t idi_ip;
|
||||
/* options and then 64 bits of data */
|
||||
} id_ip;
|
||||
u_long id_mask;
|
||||
char id_data[1];
|
||||
} icmp_dun;
|
||||
#define icmp_otime icmp_dun.id_ts.its_otime
|
||||
#define icmp_rtime icmp_dun.id_ts.its_rtime
|
||||
#define icmp_ttime icmp_dun.id_ts.its_ttime
|
||||
#define icmp_ip icmp_dun.id_ip.idi_ip
|
||||
#define icmp_mask icmp_dun.id_mask
|
||||
#define icmp_data icmp_dun.id_data
|
||||
} icmphdr_t;
|
||||
|
||||
# define bcopy(a,b,c) memmove(b,a,c)
|
||||
# define bcmp(a,b,c) memcmp(a,b,c)
|
||||
|
||||
# define ifnet device
|
||||
|
||||
#else
|
||||
|
||||
typedef struct udphdr udphdr_t;
|
||||
typedef struct tcphdr tcphdr_t;
|
||||
typedef struct ip ip_t;
|
||||
typedef struct ether_header ether_header_t;
|
||||
|
||||
#endif
|
||||
|
||||
#if defined(__SVR4) || defined(__svr4__)
|
||||
# define bcopy(a,b,c) memmove(b,a,c)
|
||||
# define bcmp(a,b,c) memcmp(a,b,c)
|
||||
# define bzero(a,b) memset(a,0,b)
|
||||
#endif
|
@ -1,3 +0,0 @@
|
||||
0Æ. Ä,..+CVS0Í
|
||||
.cvsignore0Î44arp.c0Ï Crashable0ÐMakefile0Ñarp.c0Ò
|
||||
dlcommon.c0Ódltest.h0Ôin_var.h0Õip.c0Öip_compat.h0×ip_var.h0Ø
|
@ -1,109 +0,0 @@
|
||||
.TH IPF 1
|
||||
.SH NAME
|
||||
ipf \- alters packet filtering lists for IP packet input and ouput
|
||||
.SH SYNOPSIS
|
||||
.B ipf
|
||||
[
|
||||
.B \-AdDEInorsUvyzZ
|
||||
] [
|
||||
.B \-l
|
||||
<block|pass|nomatch>
|
||||
] [
|
||||
.B \-F
|
||||
<i|o|a>
|
||||
]
|
||||
.B \-f
|
||||
<\fIfilename\fP>
|
||||
[
|
||||
.B \-f
|
||||
<\fIfilename\fP>
|
||||
[...]]
|
||||
.SH DESCRIPTION
|
||||
.PP
|
||||
\fBipf\fP opens the filenames listed (treating "\-" as stdin) and parses the
|
||||
file for a set of rules which are to be added or removed from the packet
|
||||
filter rule set.
|
||||
.PP
|
||||
Each rule processed by \fBipf\fP
|
||||
is added to the kernel's internal lists if there are no parsing problems.
|
||||
Rules are added to the end of the internal lists, matching the order in
|
||||
which they appear when given to \fBipf\fP.
|
||||
.SH OPTIONS
|
||||
.TP
|
||||
.B \-A
|
||||
Set the list to make changes to the active list (default).
|
||||
.TP
|
||||
.B \-d
|
||||
Turn debug mode on. Causes a hexdump of filter rules to be generated as
|
||||
it processes each one.
|
||||
.TP
|
||||
.B \-D
|
||||
Disable the filter (if enabled). Not effective for loadable kernel versions.
|
||||
.TP
|
||||
.B \-E
|
||||
Enable the filter (if disabled). Not effective for loadable kernel versions.
|
||||
.TP
|
||||
.BR \-F \0<param>
|
||||
This option specifies which filter list to flush. The parameter should
|
||||
either be "i" (input), "o" (output) or "a" (remove all filter rules).
|
||||
Either a single letter or an entire word starting with the appropriate
|
||||
letter maybe used. This option maybe before, or after, any other with
|
||||
the order on the command line being that used to execute options.
|
||||
.TP
|
||||
.BR \-f \0<filename>
|
||||
This option specifies which files
|
||||
\fBipf\fP should use to get input from for modifying the packet filter rule
|
||||
lists.
|
||||
.TP
|
||||
.B \-I
|
||||
Set the list to make changes to the inactive list.
|
||||
.TP
|
||||
.B \-l \0<param>
|
||||
Use of the \fB-l\fP flag toggles default logging of packets. Valid
|
||||
arguments to this option are \fBpass\fP, \fBblock\fP and \fBnomatch\fP.
|
||||
When an option is set, any packet which exits filtering and matches the
|
||||
set category is logged. This is most useful for causing all packets
|
||||
which don't match any of the loaded rules to be logged.
|
||||
.TP
|
||||
.B \-n
|
||||
This flag (no-change) prevents \fBipf\fP from actually making any ioctl
|
||||
calls or doing anything which would alter the currently running kernel.
|
||||
.TP
|
||||
.B \-o
|
||||
Force rules by default to be added/deleted to/from the output list, rather
|
||||
than the (default) input list.
|
||||
.TP
|
||||
.B \-r
|
||||
Remove matching filter rules rather than add them to the internal lists
|
||||
.TP
|
||||
.B \-s
|
||||
Swap the active filter list in use to be the "other" one.
|
||||
.TP
|
||||
.B \-U
|
||||
(SOLARIS 2 ONLY) Block packets travelling along the data stream which aren't
|
||||
recognised as IP packets. They will be printed out on the console.
|
||||
.TP
|
||||
.B \-v
|
||||
Turn verbose mode on. Displays information relating to rule processing.
|
||||
.TP
|
||||
.B \-y
|
||||
(SOLARIS 2 ONLY) Manually resync the in-kernel interface list maintained
|
||||
by IP Filter with the current interface status list.
|
||||
.TP
|
||||
.B \-z
|
||||
For each rule in the input file, reset the statistics for it to zero and
|
||||
display the statistics prior to them being zero'd.
|
||||
.TP
|
||||
.B \-Z
|
||||
Zero global statistics held in the kernel for filtering only (this doesn't
|
||||
affect fragment or state statistics).
|
||||
.DT
|
||||
.SH SEE ALSO
|
||||
ipfstat(8), ipftest(1), ipf(5)
|
||||
.SH DIAGNOSTICS
|
||||
.PP
|
||||
Needs to be run as root for the packet filtering lists to actually
|
||||
be affected inside the kernel.
|
||||
.SH BUGS
|
||||
.PP
|
||||
If you find any, please send email to me at darrenr@cyber.com.au
|
@ -1 +0,0 @@
|
||||
DF. Ä..–CVSD~MakefileDipf.1D€ipf.4D<EFBFBD>ipf.5D‚
|
@ -1,5 +0,0 @@
|
||||
WÆ. Ä..'&CVSWÜ example.1WÝ
|
||||
example.10WÞ
|
||||
example.11Wß
|
||||
example.12Wà
|
||||
example.13Wá example.2Wâ example.3Wã example.4Wä example.5Wå example.6Wæ example.7Wç example.8Wè example.9Wé
|
@ -1,16 +0,0 @@
|
||||
block
|
||||
block
|
||||
nomatch
|
||||
nomatch
|
||||
pass
|
||||
pass
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
block
|
||||
block
|
||||
nomatch
|
||||
nomatch
|
||||
pass
|
||||
pass
|
@ -1,108 +0,0 @@
|
||||
nomatch
|
||||
block
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
pass
|
||||
pass
|
||||
pass
|
||||
nomatch
|
||||
nomatch
|
||||
pass
|
||||
block
|
||||
block
|
||||
block
|
||||
nomatch
|
||||
nomatch
|
||||
block
|
||||
pass
|
||||
pass
|
||||
pass
|
||||
nomatch
|
||||
nomatch
|
||||
pass
|
||||
block
|
||||
block
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
block
|
||||
pass
|
||||
pass
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
pass
|
||||
block
|
||||
block
|
||||
block
|
||||
block
|
||||
block
|
||||
block
|
||||
pass
|
||||
pass
|
||||
pass
|
||||
pass
|
||||
pass
|
||||
pass
|
||||
nomatch
|
||||
block
|
||||
block
|
||||
block
|
||||
nomatch
|
||||
block
|
||||
nomatch
|
||||
pass
|
||||
pass
|
||||
pass
|
||||
nomatch
|
||||
pass
|
||||
nomatch
|
||||
pass
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
block
|
||||
block
|
||||
block
|
||||
block
|
||||
block
|
||||
nomatch
|
||||
pass
|
||||
pass
|
||||
pass
|
||||
pass
|
||||
pass
|
||||
block
|
||||
block
|
||||
nomatch
|
||||
block
|
||||
nomatch
|
||||
block
|
||||
pass
|
||||
pass
|
||||
nomatch
|
||||
pass
|
||||
nomatch
|
||||
pass
|
||||
block
|
||||
block
|
||||
block
|
||||
block
|
||||
block
|
||||
block
|
||||
pass
|
||||
pass
|
||||
pass
|
||||
pass
|
||||
pass
|
||||
pass
|
||||
block
|
||||
block
|
||||
block
|
||||
nomatch
|
||||
nomatch
|
||||
block
|
@ -1,66 +0,0 @@
|
||||
pass
|
||||
pass
|
||||
pass
|
||||
pass
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
block
|
||||
block
|
||||
block
|
||||
block
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
pass
|
||||
pass
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
block
|
||||
block
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
pass
|
||||
pass
|
||||
pass
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
block
|
||||
block
|
||||
block
|
||||
nomatch
|
||||
nomatch
|
@ -1,54 +0,0 @@
|
||||
pass
|
||||
pass
|
||||
pass
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
pass
|
||||
pass
|
||||
pass
|
||||
pass
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
block
|
||||
block
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
block
|
||||
block
|
||||
block
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
pass
|
||||
nomatch
|
||||
pass
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
block
|
@ -1,40 +0,0 @@
|
||||
nomatch
|
||||
block
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
pass
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
block
|
||||
block
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
pass
|
||||
pass
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
block
|
||||
block
|
||||
block
|
||||
nomatch
|
||||
nomatch
|
||||
pass
|
||||
pass
|
||||
pass
|
||||
nomatch
|
||||
block
|
||||
block
|
||||
block
|
||||
block
|
||||
block
|
||||
pass
|
||||
pass
|
||||
pass
|
||||
pass
|
||||
pass
|
@ -1,36 +0,0 @@
|
||||
block
|
||||
block
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
pass
|
||||
pass
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
block
|
||||
block
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
pass
|
||||
pass
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
block
|
||||
block
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
pass
|
||||
pass
|
@ -1,40 +0,0 @@
|
||||
nomatch
|
||||
block
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
pass
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
block
|
||||
block
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
pass
|
||||
pass
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
block
|
||||
block
|
||||
block
|
||||
nomatch
|
||||
nomatch
|
||||
pass
|
||||
pass
|
||||
pass
|
||||
nomatch
|
||||
block
|
||||
block
|
||||
block
|
||||
block
|
||||
block
|
||||
pass
|
||||
pass
|
||||
pass
|
||||
pass
|
||||
pass
|
@ -1,40 +0,0 @@
|
||||
nomatch
|
||||
block
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
pass
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
block
|
||||
block
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
pass
|
||||
pass
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
block
|
||||
block
|
||||
block
|
||||
nomatch
|
||||
nomatch
|
||||
pass
|
||||
pass
|
||||
pass
|
||||
nomatch
|
||||
block
|
||||
block
|
||||
block
|
||||
block
|
||||
block
|
||||
pass
|
||||
pass
|
||||
pass
|
||||
pass
|
||||
pass
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
@ -1,54 +0,0 @@
|
||||
block
|
||||
block
|
||||
block
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
pass
|
||||
pass
|
||||
pass
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
block
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
pass
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
block
|
||||
block
|
||||
block
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
pass
|
||||
pass
|
||||
pass
|
@ -1,36 +0,0 @@
|
||||
block
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
pass
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
block
|
||||
nomatch
|
||||
block
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
pass
|
||||
nomatch
|
||||
pass
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
@ -1,108 +0,0 @@
|
||||
block
|
||||
block
|
||||
block
|
||||
block
|
||||
block
|
||||
block
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
pass
|
||||
pass
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
block
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
pass
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
block
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
pass
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
pass
|
||||
pass
|
||||
pass
|
||||
pass
|
||||
pass
|
||||
pass
|
||||
block
|
||||
block
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
pass
|
||||
pass
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
nomatch
|
||||
block
|
||||
block
|
||||
nomatch
|
@ -1,4 +0,0 @@
|
||||
in 127.0.0.1 127.0.0.1
|
||||
in 1.1.1.1 1.2.1.1
|
||||
out 127.0.0.1 127.0.0.1
|
||||
out 1.1.1.1 1.2.1.1
|
@ -1,6 +0,0 @@
|
||||
in 1.1.1.1 2.1.1.1 opt lsrr
|
||||
in 1.1.1.1 2.1.1.1
|
||||
in 1.1.1.1 2.1.1.1 opt ts
|
||||
in 1.1.1.1 2.1.1.1 opt sec-class=topsecret
|
||||
in 1.1.1.1 2.1.1.1 opt ssrr,sec-class=topsecret
|
||||
in 1.1.1.1 2.1.1.1 opt sec
|
@ -1,11 +0,0 @@
|
||||
in on e0 tcp 1.1.1.1,1 2.1.2.2,23 S
|
||||
in on e0 tcp 1.1.1.1,1 2.1.2.2,23 A
|
||||
in on e1 tcp 2.1.2.2,23 1.1.1.1,1 A
|
||||
in on e0 tcp 1.1.1.1,1 2.1.2.2,23 F
|
||||
in on e0 tcp 1.1.1.1,1 2.1.2.2,23 A
|
||||
in on e0 tcp 1.1.1.1,2 2.1.2.2,23 A
|
||||
in on e1 udp 1.1.1.1,1 4.4.4.4,53
|
||||
in on e1 udp 2.2.2.2,2 4.4.4.4,53
|
||||
in on e0 udp 4.4.4.4,53 1.1.1.1,1
|
||||
in on e0 udp 4.4.4.4,1023 1.1.1.1,2049
|
||||
in on e0 udp 4.4.4.4,2049 1.1.1.1,1023
|
@ -1,35 +0,0 @@
|
||||
# 1.1.1.1,1025 -> 2.1.1.1,25 TTL=63 TCP DF SYN
|
||||
45 00 0028 0000 4000 3f 06 0000 01010101 02010101
|
||||
0401 0019 00000000 00000000 50 02 2000 0000 0000
|
||||
|
||||
# 1.1.1.1,1025 -> 2.1.1.1,25 TTL=63 TCP DF ACK
|
||||
45 00 0028 0000 4000 3f 06 0000 01010101 02010101
|
||||
0401 0019 00000000 00000000 50 10 2000 0000 0000
|
||||
|
||||
# 1.1.1.1,1025 -> 2.1.1.1,25 TTL=63 TCP DF MF FO=0 ACK
|
||||
45 00 0028 0000 6000 3f 06 0000 01010101 02010101
|
||||
0401 0019 00000000 00000000 50 10 2000 0000 0000
|
||||
|
||||
# 1.1.1.1,1025 -> 2.1.1.1,25 TTL=63 TCP DF FO=0
|
||||
45 00 001c 0000 6000 3f 06 0000 01010101 02010101
|
||||
0401 0019 00000000
|
||||
|
||||
# 1.1.1.1 -> 2.1.1.1 TTL=63 TCP DF FO=1 ACK
|
||||
45 00 001c 0000 6001 3f 06 0000 01010101 02010101
|
||||
00000000 50 10 2000
|
||||
|
||||
# 1.1.1.1 -> 2.1.1.1 TTL=63 UDP DF MF FO=0
|
||||
45 00 0014 0000 6000 3f 11 0000 01010101 02010101
|
||||
|
||||
# 1.1.1.1,53 -> 2.1.1.1,53 TTL=63 UDP MF FO=0
|
||||
45 00 0018 0000 2000 3f 11 0000 01010101 02010101
|
||||
0035 0035
|
||||
|
||||
# 1.1.1.1,1 -> 2.1.1.1,1 TTL=63 UDP MF FO=0
|
||||
45 00 001c 0000 2000 3f 11 0000 01010101 02010101
|
||||
0001 0001 0004 0000
|
||||
|
||||
# 1.1.1.1,53 -> 2.1.1.1,53 TTL=63 UDP MF FO=0
|
||||
45 00 001c 0000 2000 3f 11 0000 01010101 02010101
|
||||
0035 0035 0004 0000
|
||||
|
@ -1,39 +0,0 @@
|
||||
# 1.1.1.1,1025 -> 2.1.1.1,25 TTL=63 TCP DF,MF,FO=0 SYN
|
||||
45 00 0028 0001 4000 3f 06 0000 01010101 02010101
|
||||
0401 0019 00000000 00000000 50 02 2000 0000 0000
|
||||
|
||||
# 1.1.1.1,1025 -> 2.1.1.1,25 TTL=63 TCP MF ACK
|
||||
45 00 0024 0002 2000 3f 06 0000 01010101 02010101
|
||||
0401001900000000 0000000050102000
|
||||
|
||||
# 1.1.1.1,1025 -> 2.1.1.1,25 TTL=63 TCP FO=2 ACK
|
||||
45 00 002c 0002 0002 3f 06 0000 01010101 02010101
|
||||
0000000000010203 0405060708090a0b 0c0d0e0f10111213
|
||||
|
||||
# 1.1.1.1,1025 -> 2.1.1.1,25 TTL=63 TCP DF MF FO=0 SYN
|
||||
45 00 0028 0003 6000 3f 06 0000 01010101 02010101
|
||||
0401 0019 00000000 00000000 50 10 2000 0000 0000
|
||||
|
||||
# 1.1.1.1,1025 -> 2.1.1.1,25 TTL=63 TCP DF FO=0
|
||||
45 00 001c 0004 6000 3f 06 0000 01010101 02010101
|
||||
0401 0019 00000000
|
||||
|
||||
# 1.1.1.1 -> 2.1.1.1 TTL=63 TCP DF FO=1 SYN
|
||||
45 00 001c 0005 6001 3f 06 0000 01010101 02010101
|
||||
00000000 50 10 2000
|
||||
|
||||
# 1.1.1.1 -> 2.1.1.1 TTL=63 UDP DF MF FO=0
|
||||
45 00 0014 0006 6000 3f 11 0000 01010101 02010101
|
||||
|
||||
# 1.1.1.1,53 -> 2.1.1.1,53 TTL=63 UDP MF FO=0
|
||||
45 00 0018 0007 2000 3f 11 0000 01010101 02010101
|
||||
0035 0035
|
||||
|
||||
# 1.1.1.1,1 -> 2.1.1.1,1 TTL=63 UDP MF FO=0
|
||||
45 00 001c 0008 2000 3f 11 0000 01010101 02010101
|
||||
0035003500040000
|
||||
|
||||
# 1.1.1.1,53 -> 2.1.1.1,53 TTL=63 UDP FO=1
|
||||
45 00 001c 0008 0001 3f 11 0000 01010101 02010101
|
||||
0000000000000000
|
||||
|
@ -1,5 +0,0 @@
|
||||
in 127.0.0.1 127.0.0.1
|
||||
in 1.1.1.1 1.2.1.1
|
||||
in 1.1.1.2 1.2.1.1
|
||||
in 1.1.2.2 1.2.1.1
|
||||
in 1.2.2.2 1.2.1.1
|
@ -1,6 +0,0 @@
|
||||
in tcp 127.0.0.1,1 127.0.0.1,21
|
||||
in tcp 1.1.1.1,1 1.2.1.1,21
|
||||
in udp 127.0.0.1,1 127.0.0.1,21
|
||||
in udp 1.1.1.1,1 1.2.1.1,21
|
||||
in icmp 127.0.0.1 127.0.0.1
|
||||
in icmp 1.1.1.1 1.2.1.1
|
@ -1,5 +0,0 @@
|
||||
in 127.0.0.1 127.0.0.1
|
||||
in 1.1.1.1 1.2.1.1
|
||||
in 1.1.1.2 1.2.1.1
|
||||
in 1.1.2.2 1.2.1.1
|
||||
in 1.2.2.2 1.2.1.1
|
@ -1,5 +0,0 @@
|
||||
in 127.0.0.1 127.0.0.1
|
||||
in 1.1.1.1 1.1.1.1
|
||||
in 1.1.1.1 1.1.1.2
|
||||
in 1.1.1.1 1.1.2.2
|
||||
in 1.1.1.1 1.2.2.2
|
@ -1,28 +0,0 @@
|
||||
in tcp 1.1.1.1,0 2.2.2.2,2222
|
||||
in tcp 1.1.1.1,1 2.2.2.2,2222
|
||||
in tcp 1.1.1.1,23 2.2.2.2,2222
|
||||
in tcp 1.1.1.1,21 2.2.2.2,2222
|
||||
in tcp 1.1.1.1,1023 2.2.2.2,2222
|
||||
in tcp 1.1.1.1,1024 2.2.2.2,2222
|
||||
in tcp 1.1.1.1,1025 2.2.2.2,2222
|
||||
in tcp 1.1.1.1,32767 2.2.2.2,2222
|
||||
in tcp 1.1.1.1,32768 2.2.2.2,2222
|
||||
in tcp 1.1.1.1,65535 2.2.2.2,2222
|
||||
in tcp 1.1.1.1,5999 2.2.2.2,2222
|
||||
in tcp 1.1.1.1,6000 2.2.2.2,2222
|
||||
in tcp 1.1.1.1,6009 2.2.2.2,2222
|
||||
in tcp 1.1.1.1,6010 2.2.2.2,2222
|
||||
in udp 1.1.1.1,0 2.2.2.2,2222
|
||||
in udp 1.1.1.1,1 2.2.2.2,2222
|
||||
in udp 1.1.1.1,23 2.2.2.2,2222
|
||||
in udp 1.1.1.1,21 2.2.2.2,2222
|
||||
in udp 1.1.1.1,1023 2.2.2.2,2222
|
||||
in udp 1.1.1.1,1024 2.2.2.2,2222
|
||||
in udp 1.1.1.1,1025 2.2.2.2,2222
|
||||
in udp 1.1.1.1,32767 2.2.2.2,2222
|
||||
in udp 1.1.1.1,32768 2.2.2.2,2222
|
||||
in udp 1.1.1.1,65535 2.2.2.2,2222
|
||||
in udp 1.1.1.1,5999 2.2.2.2,2222
|
||||
in udp 1.1.1.1,6000 2.2.2.2,2222
|
||||
in udp 1.1.1.1,6009 2.2.2.2,2222
|
||||
in udp 1.1.1.1,6010 2.2.2.2,2222
|
@ -1,28 +0,0 @@
|
||||
in tcp 2.2.2.2,2222 1.1.1.1,0
|
||||
in tcp 2.2.2.2,2222 1.1.1.1,1
|
||||
in tcp 2.2.2.2,2222 1.1.1.1,23
|
||||
in tcp 2.2.2.2,2222 1.1.1.1,21
|
||||
in tcp 2.2.2.2,2222 1.1.1.1,1023
|
||||
in tcp 2.2.2.2,2222 1.1.1.1,1024
|
||||
in tcp 2.2.2.2,2222 1.1.1.1,1025
|
||||
in tcp 2.2.2.2,2222 1.1.1.1,32767
|
||||
in tcp 2.2.2.2,2222 1.1.1.1,32768
|
||||
in tcp 2.2.2.2,2222 1.1.1.1,65535
|
||||
in tcp 2.2.2.2,2222 1.1.1.1,5999
|
||||
in tcp 2.2.2.2,2222 1.1.1.1,6000
|
||||
in tcp 2.2.2.2,2222 1.1.1.1,6009
|
||||
in tcp 2.2.2.2,2222 1.1.1.1,6010
|
||||
in udp 2.2.2.2,2222 1.1.1.1,0
|
||||
in udp 2.2.2.2,2222 1.1.1.1,1
|
||||
in udp 2.2.2.2,2222 1.1.1.1,23
|
||||
in udp 2.2.2.2,2222 1.1.1.1,21
|
||||
in udp 2.2.2.2,2222 1.1.1.1,1023
|
||||
in udp 2.2.2.2,2222 1.1.1.1,1024
|
||||
in udp 2.2.2.2,2222 1.1.1.1,1025
|
||||
in udp 2.2.2.2,2222 1.1.1.1,32767
|
||||
in udp 2.2.2.2,2222 1.1.1.1,32768
|
||||
in udp 2.2.2.2,2222 1.1.1.1,65535
|
||||
in udp 2.2.2.2,2222 1.1.1.1,5999
|
||||
in udp 2.2.2.2,2222 1.1.1.1,6000
|
||||
in udp 2.2.2.2,2222 1.1.1.1,6009
|
||||
in udp 2.2.2.2,2222 1.1.1.1,6010
|
@ -1,9 +0,0 @@
|
||||
in icmp 1.1.1.1 2.1.1.1 echo
|
||||
in icmp 1.1.1.1 2.1.1.1 echo,1
|
||||
in icmp 1.1.1.1 2.1.1.1 echo,3
|
||||
in icmp 1.1.1.1 2.1.1.1 unreach
|
||||
in icmp 1.1.1.1 2.1.1.1 unreach,1
|
||||
in icmp 1.1.1.1 2.1.1.1 unreach,3
|
||||
in icmp 1.1.1.1 2.1.1.1 echorep
|
||||
in icmp 1.1.1.1 2.1.1.1 echorep,1
|
||||
in icmp 1.1.1.1 2.1.1.1 echorep,3
|
@ -1,6 +0,0 @@
|
||||
in tcp 1.1.1.1,1 2.1.2.2,1 S
|
||||
in tcp 1.1.1.1,1 2.1.2.2,1 SA
|
||||
in tcp 1.1.1.1,1 2.1.2.2,1 SF
|
||||
in tcp 1.1.1.1,1 2.1.2.2,1 SFPAUR
|
||||
in tcp 1.1.1.1,1 2.1.2.2,1 PAU
|
||||
in tcp 1.1.1.1,1 2.1.2.2,1 A
|
@ -1,6 +0,0 @@
|
||||
in 1.1.1.1 2.1.1.1 opt lsrr
|
||||
in 1.1.1.1 2.1.1.1 opt lsrr,ssrr
|
||||
in 1.1.1.1 2.1.1.1 opt ts
|
||||
in 1.1.1.1 2.1.1.1 opt sec-class=topsecret
|
||||
in 1.1.1.1 2.1.1.1 opt ssrr,sec-class=topsecret
|
||||
in 1.1.1.1 2.1.1.1 opt sec
|
@ -1,4 +0,0 @@
|
||||
block in all
|
||||
pass in all
|
||||
block out all
|
||||
pass out all
|
@ -1,18 +0,0 @@
|
||||
block in from any to any with not ipopts
|
||||
pass in from any to any with not opt sec-class topsecret
|
||||
block in from any to any with not opt ssrr,sec-class topsecret
|
||||
pass in from any to any with not opt ssrr,sec-class topsecret
|
||||
block in from any to any with not opt ts,sec-class topsecret
|
||||
pass in from any to any with not opt ts,sec-class topsecret
|
||||
block in from any to any with not opt sec-class secret
|
||||
pass in from any to any with not opt sec-class secret
|
||||
block in from any to any with not opt lsrr,ssrr
|
||||
pass in from any to any with not opt lsrr,ssrr
|
||||
pass in from any to any with not ipopts
|
||||
block in from any to any with not opt lsrr
|
||||
pass in from any to any with not opt lsrr
|
||||
block in from any to any with not opt ssrr,ts
|
||||
pass in from any to any with not opt ssrr,ts
|
||||
block in from any to any with not opt rr
|
||||
pass in from any to any with not opt rr
|
||||
block in from any to any with not opt sec-class topsecret
|
@ -1,6 +0,0 @@
|
||||
pass in proto tcp from any to any port = 23 flags S/SA keep state
|
||||
block in proto tcp from any to any port = 23 flags S/SA keep state
|
||||
pass in proto udp from any to any port = 53 keep frags
|
||||
block in proto udp from any to any port = 53 keep frags
|
||||
pass in proto udp from any to any port = 53 keep state
|
||||
block in proto udp from any to any port = 53 keep state
|
@ -1,6 +0,0 @@
|
||||
pass in proto tcp from any port > 1024 to any port = 25 with not short
|
||||
pass in proto tcp from any port > 1024 to any port = 25
|
||||
block in proto tcp from any to any with short
|
||||
block in proto tcp from any to any with frag
|
||||
pass in proto udp from any port = 53 to any port = 53
|
||||
block in proto udp from any port = 53 to any port = 53 with not short
|
@ -1,6 +0,0 @@
|
||||
pass in proto tcp from any to any port = 25 flags S/SA keep frags
|
||||
block in proto tcp from any to any port = 25 flags S/SA keep frags
|
||||
pass in proto udp from any to any port = 53 keep frags
|
||||
block in proto udp from any to any port = 53 keep frags
|
||||
pass in proto tcp from any to any port = 25 flags S/SA keep state keep frags
|
||||
block in proto tcp from any to any port = 25 flags S/SA keep state keep frags
|
@ -1,8 +0,0 @@
|
||||
block in from !1.1.1.1 to any
|
||||
pass in from 1.1.1.1 to !any
|
||||
block in from 1.1.1.1/24 to !any
|
||||
pass in from !1.1.1.1/24 to any
|
||||
block in from !1.1.1.1/16 to any
|
||||
pass in from 1.1.1.1/16 to !any
|
||||
block in from 1.1.1.1/0 to !any
|
||||
pass in from !1.1.1.1/0 to any
|
@ -1,6 +0,0 @@
|
||||
block in proto tcp from any to any
|
||||
pass in proto tcp from any to any
|
||||
block in proto udp from any to any
|
||||
pass in proto udp from any to any
|
||||
block in proto icmp from any to any
|
||||
pass in proto icmp from any to any
|
@ -1,8 +0,0 @@
|
||||
block in from 1.1.1.1 to any
|
||||
pass in from 1.1.1.1 to any
|
||||
block in from 1.1.1.1/24 to any
|
||||
pass in from 1.1.1.1/24 to any
|
||||
block in from 1.1.1.1/16 to any
|
||||
pass in from 1.1.1.1/16 to any
|
||||
block in from 1.1.1.1/0 to any
|
||||
pass in from 1.1.1.1/0 to any
|
@ -1,8 +0,0 @@
|
||||
block in from any to 1.1.1.1
|
||||
pass in from any to 1.1.1.1
|
||||
block in from any to 1.1.1.1/24
|
||||
pass in from any to 1.1.1.1/24
|
||||
block in from any to 1.1.1.1/16
|
||||
pass in from any to 1.1.1.1/16
|
||||
block in from any to 1.1.1.1/0
|
||||
pass in from any to 1.1.1.1/0
|
@ -1,48 +0,0 @@
|
||||
block in proto tcp from any port = 23 to any
|
||||
block in proto udp from any port = 23 to any
|
||||
block in proto tcp/udp from any port = 23 to any
|
||||
pass in proto tcp from any port <= 1023 to any
|
||||
pass in proto udp from any port <= 1023 to any
|
||||
pass in proto tcp/udp from any port <= 1023 to any
|
||||
block in proto tcp from any port >= 1024 to any
|
||||
block in proto udp from any port >= 1024 to any
|
||||
block in proto tcp/udp from any port >= 1024 to any
|
||||
pass in proto tcp from any port >= 1024 to any
|
||||
pass in proto udp from any port >= 1024 to any
|
||||
pass in proto tcp/udp from any port >= 1024 to any
|
||||
block in proto tcp from any port 0 >< 512 to any
|
||||
block in proto udp from any port 0 >< 512 to any
|
||||
block in proto tcp/udp from any port 0 >< 512 to any
|
||||
pass in proto tcp from any port 0 >< 512 to any
|
||||
pass in proto udp from any port 0 >< 512 to any
|
||||
pass in proto tcp/udp from any port 0 >< 512 to any
|
||||
block in proto tcp from any port 6000 <> 6009 to any
|
||||
block in proto udp from any port 6000 <> 6009 to any
|
||||
block in proto tcp/udp from any port 6000 <> 6009 to any
|
||||
pass in proto tcp from any port 6000 <> 6009 to any
|
||||
pass in proto udp from any port 6000 <> 6009 to any
|
||||
pass in proto tcp/udp from any port 6000 <> 6009 to any
|
||||
pass in proto tcp from any port = 23 to any
|
||||
pass in proto udp from any port = 23 to any
|
||||
pass in proto tcp/udp from any port = 23 to any
|
||||
block in proto tcp from any port != 21 to any
|
||||
block in proto udp from any port != 21 to any
|
||||
block in proto tcp/udp from any port != 21 to any
|
||||
pass in proto tcp from any port != 21 to any
|
||||
pass in proto udp from any port != 21 to any
|
||||
pass in proto tcp/udp from any port != 21 to any
|
||||
block in proto tcp from any port < 1024 to any
|
||||
block in proto udp from any port < 1024 to any
|
||||
block in proto tcp/udp from any port < 1024 to any
|
||||
pass in proto tcp from any port < 1024 to any
|
||||
pass in proto udp from any port < 1024 to any
|
||||
pass in proto tcp/udp from any port < 1024 to any
|
||||
block in proto tcp from any port > 1023 to any
|
||||
block in proto udp from any port > 1023 to any
|
||||
block in proto tcp/udp from any port > 1023 to any
|
||||
pass in proto tcp from any port > 1023 to any
|
||||
pass in proto udp from any port > 1023 to any
|
||||
pass in proto tcp/udp from any port > 1023 to any
|
||||
block in proto tcp from any port <= 1023 to any
|
||||
block in proto udp from any port <= 1023 to any
|
||||
block in proto tcp/udp from any port <= 1023 to any
|
@ -1,48 +0,0 @@
|
||||
block in proto tcp from any to any port = 23
|
||||
block in proto udp from any to any port = 23
|
||||
block in proto tcp/udp from any to any port = 23
|
||||
pass in proto tcp from any to any port <= 1023
|
||||
pass in proto udp from any to any port <= 1023
|
||||
pass in proto tcp/udp from any to any port <= 1023
|
||||
block in proto tcp from any to any port >= 1024
|
||||
block in proto udp from any to any port >= 1024
|
||||
block in proto tcp/udp from any to any port >= 1024
|
||||
pass in proto tcp from any to any port >= 1024
|
||||
pass in proto udp from any to any port >= 1024
|
||||
pass in proto tcp/udp from any to any port >= 1024
|
||||
block in proto tcp from any to any port 0 >< 512
|
||||
block in proto udp from any to any port 0 >< 512
|
||||
block in proto tcp/udp from any to any port 0 >< 512
|
||||
pass in proto tcp from any to any port 0 >< 512
|
||||
pass in proto udp from any to any port 0 >< 512
|
||||
pass in proto tcp/udp from any to any port 0 >< 512
|
||||
block in proto tcp from any to any port 6000 <> 6009
|
||||
block in proto udp from any to any port 6000 <> 6009
|
||||
block in proto tcp/udp from any to any port 6000 <> 6009
|
||||
pass in proto tcp from any to any port 6000 <> 6009
|
||||
pass in proto udp from any to any port 6000 <> 6009
|
||||
pass in proto tcp/udp from any to any port 6000 <> 6009
|
||||
pass in proto tcp from any to any port = 23
|
||||
pass in proto udp from any to any port = 23
|
||||
pass in proto tcp/udp from any to any port = 23
|
||||
block in proto tcp from any to any port != 21
|
||||
block in proto udp from any to any port != 21
|
||||
block in proto tcp/udp from any to any port != 21
|
||||
pass in proto tcp from any to any port != 21
|
||||
pass in proto udp from any to any port != 21
|
||||
pass in proto tcp/udp from any to any port != 21
|
||||
block in proto tcp from any to any port < 1024
|
||||
block in proto udp from any to any port < 1024
|
||||
block in proto tcp/udp from any to any port < 1024
|
||||
pass in proto tcp from any to any port < 1024
|
||||
pass in proto udp from any to any port < 1024
|
||||
pass in proto tcp/udp from any to any port < 1024
|
||||
block in proto tcp from any to any port > 1023
|
||||
block in proto udp from any to any port > 1023
|
||||
block in proto tcp/udp from any to any port > 1023
|
||||
pass in proto tcp from any to any port > 1023
|
||||
pass in proto udp from any to any port > 1023
|
||||
pass in proto tcp/udp from any to any port > 1023
|
||||
block in proto tcp from any to any port <= 1023
|
||||
block in proto udp from any to any port <= 1023
|
||||
block in proto tcp/udp from any to any port <= 1023
|
@ -1,6 +0,0 @@
|
||||
block in proto icmp from any to any icmp-type echo
|
||||
pass in proto icmp from any to any icmp-type echo
|
||||
block in proto icmp from any to any icmp-type unreach code 3
|
||||
pass in proto icmp from any to any icmp-type unreach code 3
|
||||
block in proto icmp from any to any icmp-type echorep
|
||||
pass in proto icmp from any to any icmp-type echorep
|
@ -1,6 +0,0 @@
|
||||
block in proto tcp from any to any flags S
|
||||
pass in proto tcp from any to any flags S
|
||||
block in proto tcp from any to any flags S/SA
|
||||
pass in proto tcp from any to any flags S/SA
|
||||
block in proto tcp from any to any flags S/APU
|
||||
pass in proto tcp from any to any flags S/APU
|
@ -1,18 +0,0 @@
|
||||
block in from any to any with ipopts
|
||||
pass in from any to any with opt sec-class topsecret
|
||||
block in from any to any with opt ssrr,sec-class topsecret
|
||||
pass in from any to any with opt ssrr,sec-class topsecret
|
||||
block in from any to any with opt ts,sec-class topsecret
|
||||
pass in from any to any with opt ts,sec-class topsecret
|
||||
block in from any to any with opt sec-class secret
|
||||
pass in from any to any with opt sec-class secret
|
||||
block in from any to any with opt lsrr,ssrr
|
||||
pass in from any to any with opt lsrr,ssrr
|
||||
pass in from any to any with ipopts
|
||||
block in from any to any with opt lsrr
|
||||
pass in from any to any with opt lsrr
|
||||
block in from any to any with opt ssrr,ts
|
||||
pass in from any to any with opt ssrr,ts
|
||||
block in from any to any with opt rr
|
||||
pass in from any to any with opt rr
|
||||
block in from any to any with opt sec-class topsecret
|
@ -1,6 +0,0 @@
|
||||
Ç. Ä..0þCVSGexpected0ÇinputDG$regress
|
||||
|
||||
.cvsignore
|
||||
!Makefile
|
||||
"dotest
|
||||
#hextest
|
Loading…
x
Reference in New Issue
Block a user