Clint Pachl wrote:
Is it possible for a cracker to compromise or root a machine on a network that has pf enabled with the single rule "block all in"?
I suspect you're just fishing, but in the interests of spirited debate....
- Is "block in all" the first rule, the last rule, or somewhere in between? (Yes, it DOES matter)
- Does the cracker have alternate methods of entry (tty, ssh, console, etc)?

Reply via email to