Subject: RE: Interface devices and security
To: port-i386@netbsd.org <port-i386@netbsd.org>
From: Steve Paul <stevep@mccue.com>
List: port-i386
Date: 12/21/1998 16:52:25
This is EXACTLY what I was looking for!
I am running 1.3.2 and a simple ICMP block from the examples
works great and doesn't interfere with any of my running services.
Thanks a million!
Steve
-----Original Message-----
From: Thilo Manske [SMTP:Thilo.Manske@HEH.Uni-Oldenburg.DE]
Sent: Monday, December 21, 1998 2:53 PM
To: port-i386@netbsd.org
Subject: Re: Interface devices and security
In message <01BE2CED.1D1A0B70.stevep@mccue.com>
Steve Paul <stevep@mccue.com> wrote:
> Is there some method or interface/kernal patch to make the
> server reject oversized packets/icmp data? Or maybe some
> listener program that shuts off these ports on detection of
> possible flood?
Maybe the "IP Filter" software that comes with NetBSD 1.3 is all you
need.
Please see http://coombs.anu.edu.au/~avalon/ip-filter.html , ipf(5),
ipf(8), /usr/share/examples/ipf/* for more information about it.
Bye,
Thilo.
--
Mir ist mein Signature entlaufen :-(. Wer es findet, sende es bitte an
Thilo.Manske@HEH.Uni-Oldenburg.DE zuruck. Danke!