So I think a number of people were confused about what DFD actually *did*.
I think this is best explained by an example.
Here is a sample transcript, bash$ is the Unix command line and
dfd_keeper is the dfd command line. Basically I connect up, show the
rules in the example script, block the IP
Hello guys,
Following this link: http://www.nimlabs.org/~nim/dirtynat.html
I learned that I can do some dirty NAT trick in my firewall.
So.. How can I manage the PREROUTING and POSTROUTING rules in PF? And
Netmap?
Using Iptables/netfilter could be this:
iptables -v -t nat -A PREROUTING -d
In addition to preventing infected PC's from using their own SMTP engine
to send out spam by blocking port 25 from all but the mail server. I
would also like to add those hosts automatically to a table in order to
block their access altogether so that the infected PC's cannot attempt
other