Dimitar Vassilev <[email protected]> writes:

> $tg_in on $ext_if inet proto udp from any to any port=syslog
> $tg_in on $ext_if from any to any flags P/FSRPAUEW
> $tg_in on $ext_if from any to any flags FPU/FSRPAUEW
> $tg_in on $ext_if from any to any flags FPU/FPU
> $tg_in on $ext_if from any to any flags /FSRA
> $tg_in on $ext_if from any to any flags FS/FSRA
> $tg_in on $ext_if from any to any flags FSPU/FSPRAU
> $tg_in on $ext_if from any to any flags FPU/FSRPAU
> $tg_in on $ext_if from any to any flags /FSRPAU
> $tg_in on $ext_if from any to any flags F/FSRA
> $tg_in on $ext_if from any to any flags U/FSRAU
> $tg_in on $ext_if from any to any flags S/FSRPAU
> $tg_in on $ext_if from any to any flags P/FSRPAU
> $tg_in on $ext_if from any to any flags A/A
> $tg_in on $ext_if from any to any flags P/P

Each time I see this or something like it, I'm equally baffled.  

If you understand what this does and you can point to any actual
benefit compared to a simple 'block' default at the very top of your
rule set, please enlighten the rest of us.  Explain each of these
lines, what they do in real life network traffic, and do back it all
up with tcpdump output (annotated if need be) and reproducible numbers
and statistics.

(otherwise, we will call it 'flags wanking', nevermind the quick gushers)

- P

-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.

Reply via email to