On 2006/06/13 08:26, Jeff Quast wrote:
> On 6/13/06, Stuart Henderson <[EMAIL PROTECTED]> wrote:
> >
> > On 2006/06/13 12:26, Martin Toft wrote:
> > > Spruell, Darren-Perot wrote:
> > > >Maybe a better-designed application wouldn't have to make use of such a
> > > >clusterbag of ports in the first place?
> > >
> > > The ports do not belong to a single application. I operate a gateway and
> > > want to give high priority to legitimate protocols and low priority to
> > > everything else. At the moment I have chosen this long list of
> > > "legitimate" ports:
> >
> > Non-legitimate apps will also use these ports. You can't e.g. replicate
> > what ellacoya boxes do just using PF.
> >
> Maybe this can be shortened to the classical idea of ports <1024 being
> authoratative internet daemons,
> < 1024 high priority
> > 1024 low priority, except...

Depends what you're trying to do, but if it's e.g. throttling
p2p users, that's only going to be of limited help.

Relying on the side-behaviour of 'lots-of-connections' often
seen with some protocols you might want to restrict, but not so
often seen from a legitimate client, you have the option of
using max-src-states and throttling hosts in the overload
table. Care and attention is required though..

Reply via email to