similar to: cvs commit: src/contrib/pf/pfctl parse.y src/lib/libc/sys Symbol.map getsockopt.2 src/sbin/ipfw ipfw.8 ipfw2.c src/sys/conf NOTES options src/sys/contrib/ipfilter/netinet ip_fil_freebsd.c src/sys/contrib/pf/net pf.c pf_ioctl.c src/sys/kern init_sysent.c

Displaying 20 results from an estimated 100 matches similar to: "cvs commit: src/contrib/pf/pfctl parse.y src/lib/libc/sys Symbol.map getsockopt.2 src/sbin/ipfw ipfw.8 ipfw2.c src/sys/conf NOTES options src/sys/contrib/ipfilter/netinet ip_fil_freebsd.c src/sys/contrib/pf/net pf.c pf_ioctl.c src/sys/kern init_sysent.c"

2017 Mar 30
3
Network isolation for KVM guests
Hi all, What options exists under CentOS hosts to work with isolated networks?. For example, on BSD systems it is really trivial. In FreeBSD you can use setfib tools and on OpenBSD it is possible to use rdomain options. In 30 secs it is possible to work with isolated networks and assign process, ip address and routes (hidden from the main route table and ip addresses), etc. But I can't
2010 Jul 13
0
nginx-0.8.45
éÚÍÅÎÅÎÉÑ × nginx 0.8.45 13.07.2010 *) äÏÂÁ×ÌÅÎÉÅ: ÕÌÕÞÛÅÎÉÑ × ÍÏÄÕÌÅ ngx_http_xslt_filter. óÐÁÓÉÂÏ Laurence Rowe. *) éÓÐÒÁ×ÌÅÎÉÅ: ÏÔ×ÅÔ SSI ÍÏÄÕÌÑ ÍÏÇ ÐÅÒÅÄÁ×ÁÔØÓÑ ÎÅ ÐÏÌÎÏÓÔØÀ ÐÏÓÌÅ ËÏÍÁÎÄÙ include Ó ÐÁÒÁÍÅÔÒÏÍ wait="yes"; ÏÛÉÂËÁ ÐÏÑ×ÉÌÁÓØ × 0.7.25. óÐÁÓÉÂÏ íÁËÓÉÍÕ äÕÎÉÎÕ. *) éÓÐÒÁ×ÌÅÎÉÅ: ÄÉÒÅËÔÉ×Á listen ÎÅ
2010 Jul 05
0
nginx-0.8.44
Changes with nginx 0.8.44 05 Jul 2010 *) Change: now nginx does not cache by default backend responses, if they have a "Set-Cookie" header line. *) Feature: the "listen" directive supports the "setfib" parameter. Thanks to Andrew Filonov. *) Bugfix: the "sub_filter" directive might change
2017 Mar 30
0
Network isolation for KVM guests
Use libvirt with mac/ip spoofing enabled. https://libvirt.org/formatnwfilter.html https://libvirt.org/firewall.html -- Sent from the Delta quadrant using Borg technology! Nux! www.nux.ro ----- Original Message ----- > From: "C. L. Martinez" <carlopmart at gmail.com> > To: centos-virt at centos.org > Sent: Thursday, 30 March, 2017 15:06:58 > Subject: [CentOS-virt]
2024 Apr 16
0
nginx-1.25.5
Изменения в nginx 1.25.5 16.04.2024 *) Добавление: виртуальные сервера в модуле stream. *) Добавление: модуль ngx_stream_pass_module. *) Добавление: параметры deferred, accept_filter и setfib директивы listen в модуле stream. *) Добавление: определение размера строки кеша процессора для некоторых архитектур. Спасибо
2024 Apr 16
0
nginx-1.25.5
Changes with nginx 1.25.5 16 Apr 2024 *) Feature: virtual servers in the stream module. *) Feature: the ngx_stream_pass_module. *) Feature: the "deferred", "accept_filter", and "setfib" parameters of the "listen" directive in the stream module. *) Feature: cache line size detection for some
2006 Jul 14
1
Any ongoing effort to port /etc/rc.d/pf_boot, /etc/pf.boot.conf from NetBSD ?
Hi, [I have added freebsd-security to recipient list as I consider this issue a security risk] Paul Schenkeveld wrote: > Hello, > > On Fri, Jul 14, 2006 at 01:26:38PM +0300, Ari Suutari wrote: >> Hi, >> >> Does anyone know if there are any plans to bring >> pf boot-time protection (ie. /etc/rc.d/pf_boot and >> related config files) from NetBSD to FreeBSD
2003 May 10
1
OpenSSH_3.6.1p2 getsockopt TCP_NODELAY bogus message on Solaris 8
I ran into the following problem the first time I used OpenSSH_3.6.1p2 on Solaris 8 (sparc, 32-bit): $ ssh kiwi Enter passphrase for RSA key '/net/sic/export/ford/home/eggert/.ssh/identity': getsockopt TCP_NODELAY: Socket operation on non-socket Last login: Sat May 10 14:27:01 2003 from ip-66-80-53-59.d Sun Microsystems Inc. SunOS 5.8 Generic Patch October 2001
2003 Oct 26
1
getsockopt TCP_NODELAY: Socket operation on non-socket
We get the warning above whenever we use a ProxyCommand. We _know_ it's a pipe, so we can't use sockopts on it. So we shouldn't bitch about it. This breaks all kinds of things which use SSH transparently; including pine, which really wants the first thing it receives from an IMAP server to be a valid imap greeting... which $subject is not. $ ssh -o "proxycommand sh -c '(
2011 Jul 21
1
[Bug 8313] New: Minix Support - check for netinet/{in_systm,ip}.h and SO_BROADCAST
https://bugzilla.samba.org/show_bug.cgi?id=8313 Summary: Minix Support - check for netinet/{in_systm,ip}.h and SO_BROADCAST Product: rsync Version: 3.1.0 Platform: x86 OS/Version: Other Status: NEW Severity: enhancement Priority: P5 Component: core AssignedTo: wayned at
2003 Sep 02
1
netinet/pim_var.h: No such file or directory
netinet/pim_var.h: No such file or directory I saw this when I was searching thru the archives and I didn't notice a response. I had this problem and my workaround was to use "find" to find the file and copy it to /usr/include/netinet directory. Then the "depend" stage completed and the build and install phases worked too.
2018 Dec 12
2
[PATCH] drop old netinet/in_systm.h include
This header provides only three typedefs: n_long, n_short, and n_time. OpenSSH doesn't use it at all, and the headers it includes don't. So punt this ancient include since it offers nothing useful. --- defines.h | 1 - includes.h | 1 - misc.c | 1 - readconf.c | 1 - servconf.c | 1 - 5 files changed, 5 deletions(-) diff --git a/defines.h b/defines.h index
2004 Sep 07
1
ipfw2 in 5.2.1
hi - this is my first post to this list so go easy on me ! I am trying to find info on using ipfw2 with freebsd 5.2.1 as I have read that it supports MAC address based firewalling. Situation is, I have a small externally managed VPN network, about 12 different subnets all terminating in my office location, and all managed by a tier 1 telco. Problem is, their CPE routers do not have any firewalling
2003 Mar 29
0
IPFW2
Hi, has anybody an example of firewall rules written with IPFW2 using the MAC asdress? Regards, Dirk Hombrecher
2008 Dec 02
3
ipfw2.c,v 1.76.2.17
Hi. Since this revision (appeared in 6.3) I think ipfw violates POLA. I mean "ipfw table N list" shows values of table in Internet '.' notation. A friend of mine was surprised to found Internet representation of this "optional 32-bit unsigned value". For example security/bruteblock stores unix timestamps here and AFAICS there is no possibility to come back to the
2003 Jul 19
0
[PATCH] ipfw2 fails with 'bad command' error
>Submitter-Id: current-users >Originator: Andy Gilligan >Confidential: no >Synopsis: [PATCH] ipfw2 fails with 'bad command' error >Severity: serious >Priority: high >Category: bin >Class: sw-bug >Release: FreeBSD 4.8-STABLE i386 >Environment: System: FreeBSD vega 4.8-STABLE FreeBSD 4.8-STABLE #13: Sun Jul 20 01:01:07 BST 2003
2003 Jun 17
0
ipfw2 docs for dinamic rules
Dear FreeBSD! I would like to use custom rules file with ipfw2. My computer goes to the net via dial-up modem and kernel ppp type. Since I don't have experience with dinamic rules, but want to, reading tutorials stranded me somewhere in the middle. In this moment I need recall of known links to docs about topic. Provider gives new address every time when connected. One machine. Via ppp...
2003 Nov 01
2
ipfw2 logging
Dear list! I have a little problem, trying to enable logging of deny rule. I have enabled it via kernel: options IPFIREWALL options IPFIREWALL_VERBOSE options IPFIREWALL_VERBOSE_LIMIT=3 It is ipfw2. After that, my inten- tion was to use syslogd and !ipfw *.* /var/log/ipfw.log and newsyslog with /var/log/ipfw.log 600 3 100 * J In rc.conf I have firewall_enable="YES"
2004 Apr 22
0
ipfilter/ipfw + bridge + out checking
Hi all. I didn't find any thread discussing it, sorry if I am re-posting the same subject. Is there a way to check the ipfilter/ipfw out-flow with bridge? Is it implemented? I've heard its not done due a performance issue (it's writen in ipf-howto), but performance is not the main goal for me in this single situation. I would like to have the stateful firewall and the bridge _fully_
2003 Jun 06
0
Request for documenting IPSec, NAT/divert, ipfw, ipfilter ... in kernel flow ?
Hi, sorry for cross-mailing. Reply-to: set to freebsd-net. I have seen some discussion on freebsd-security etc. about some parts of the subject. I have seen older messages in archives. Regularly the same questions seem to come up. I have not found an all-including description of the answer to s.th. like: "Can anybody tell me the order packets get processed in kernel related to IPSec,