Hello,
Thanks everyone for your comments. I should have guessed that it
would be a Java script or something. I disabled Java in
Internet Explorer and the site I was talking about was not able
to get the internal ip address anymore. Thanks again.
--
Best regards,
W
Hello,
I know this has been discussed before, but I looked through the
list and could not find what I was looking for. I was browsing
a security audit website and not only did it show the external ip
address given to me by my isp (this is to be expected), but it also
> what was it?
It is rather embarrassing actually. I run BIND internally for caching
and name resolution and forgot to reenable it when I upgraded
/etc/rc.conf.
> think about testing that altq stuff
I just might now. Thanks for the diff.
---
Outgoing mail is certified Virus Free.
Checked by A
My mistake. I just figured out the problem. Thank You.
---
Outgoing mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.422 / Virus Database: 237 - Release Date: 11/20/2002
I read the pf.conf man page and did not see anything about disabling
altq now that is merged with pf. I don't really have a need to have it
running and for some reason, my gateway is no longer passing any traffic
after upgrading to -current today. Do I have to add altq rules for
traffic to passed
> I don't think you ever need to pass any traffic at the border gateway
just > to drop it at the final destination, you can just as well drop
it at the > > border.
Excellent point. I have taken care of it as suggested. Thanks again.
---
Outgoing mail is certified Virus Free.
Checked by AVG an
> Yes, the 'keep state' option in that rules allows replies to your
> outgoing UDP packets.
I figured that was the case, but I just wanted to verify. I definitely
want to continue using "keep state" on outgoing UDP traffic so I decided
to install a software firewall on the particular Windows mac
I have noticed that when I use some p2p file sharing programs, Kazaa
more specifically, that some udp traffic is able to slip back through my
OpenBSD box running nat/pf. I was curious if this is because I use a
"pass out on $Ext proto udp all keep state" rule, and traffic initiated
by me is allow
I have noticed that incoming UDP traffic from programs like Kazaa are
able to slip right through PF. I pass all outgoing traffic on the
firewall (TCP/UDP) and block most everything coming in except for a
couple of services (none of which use UDP). Am I correct in thinking
that the reason this tr
Could you post your entire nat.conf. The :18 means that the syntax
error is on line 18 of the file. You probably knew that, but I would
like to see it.
Try this:
ext_if = "dc0" # External Interface
int_if = "dc1" # Internal Interface
IntNet = "192.168.1.0/24" # Internal Network
Put spaces between the equal signs just in case.
Leave the brackets out around the interfaces.
Use $ext_if, $int_if, and $IntNet for filter rules, but try not using
th
11 matches
Mail list logo