Greets,
I think I have my pf rules pretty well configured
and I'm ready to implement them externally (to internet).
Before I do, I would really like to try some
penetration testing, search for vaulnerbilites/weakness/expolits
to make sure my rules are as sound as I believe they are.
I have of
On Mon, Aug 30, 2004 at 09:06:33PM -0400, Jason Opperisano wrote:
On Mon, 2004-08-30 at 14:18, cmustard wrote:
rule 1/0(match) block in on rl0: 84.2x.xxx.xx 192.168.3.2.6346: tcp 0 (DF)
rule 1/0(match) block in on rl0: 224.2x.xxx.xx 192.168.3.2.6346: tcp 0 (DF)
to me, this rule says it's
I am stumped by this pf behavior, maybe someone can shed some light.
The confusion is this:
I have the following macro set up:
it passes in, https, and mutella (6346) from the internet to my dmz.
INT_TO_DMZ = { 443, 6346, 6324 }
It seems to work, because i can attach to some gnutella servers
Technician
===
Virpack Inc.
1715 Pratt Drive Suite 3600
Blacksburg, VA 24060
Phone: 540-961-9160
Cell: 540-449-3308
E-mail: [EMAIL PROTECTED]
===
-Original Message-
From: cmustard [mailto:[EMAIL PROTECTED]
Sent: Monday, August 30, 2004 2
I seem to be a little confused about pf firewall rules, hopefully
someone can help me out.
My basic ideal set up would consist of
web/p2p/icecast/internet,etc services on dmz accessilbe to/from internet
and internal LAN.
private things running on LAN, cvs, development servers, bootp, not