RFC: my firewall ruleset(s)

2005-10-23 Thread Eric F Crist
Hey all. I'm relatively new to shell scripting and I'm looking for some comments on my firewall script. Comments on either the ipfw rules themselves or on my scripting lack of ability would be appreciated. Thanks. nerp.firewall Description: Binary data

Re: RFC: my firewall ruleset(s)

2005-10-23 Thread Eric F Crist
On Oct 23, 2005, at 10:44 AM, Eric F Crist wrote: Hey all. I'm relatively new to shell scripting and I'm looking for some comments on my firewall script. Comments on either the ipfw rules themselves or on my scripting lack of ability would be appreciated. Thanks. nerp.firewall

Re: RFC: my firewall ruleset(s)

2005-10-23 Thread Chuck Swiger
Eric F Crist wrote: Hey all. I'm relatively new to shell scripting and I'm looking for some comments on my firewall script. Comments on either the ipfw rules themselves or on my scripting lack of ability would be appreciated. Ugh. :-) IPFW knows how to increment rule numbers all by

Re: RFC: my firewall ruleset(s)

2005-10-23 Thread Eric F Crist
On Oct 23, 2005, at 11:12 AM, Chuck Swiger wrote: Eric F Crist wrote: Hey all. I'm relatively new to shell scripting and I'm looking for some comments on my firewall script. Comments on either the ipfw rules themselves or on my scripting lack of ability would be appreciated. Ugh.

Re: RFC: my firewall ruleset(s)

2005-10-23 Thread Chuck Swiger
Eric F Crist wrote: [ ... ] Ugh. :-) IPFW knows how to increment rule numbers all by itself; you can get rid of the rulenum1=`expr $rulenum1 + 50` stuff. I do this so that I have sufficient space between rules for my own sanity. By default, IPFW numbers rules that increment by 1. I have

Re: RFC: my firewall ruleset(s)

2005-10-23 Thread Giorgos Keramidas
On 2005-10-23 12:12, Chuck Swiger [EMAIL PROTECTED] wrote: You have anti-spoofing for the lookback, lo0 interface, but not for your other interfaces. You should add anti-spoofing rules, and also block strict and loose source routing [1]: # Stop strict and loose source routing add deny log