Paul Wernau wrote:
> 
>>
>>   - One of the big high-level problems with IP Filter (as it is with
>>     _all_ firewall software) is visualizing how the rules perform.
>>     That is, being able to ask "what if?" questions concerning traffic
>>     from other hosts.  (Something like: "which rules would match if I
>>     received a TCP SYN packet for destination address a.b.c.d and port
>>     25 from host foo.bar.com, and what would be the resulting action
>>     taken by the system?")
>>
>>     As someone who uses this stuff frequently, this is often a sore
>>     point.  It can be hard to determine whether you've gotten
>>     everything just right unless you log into some remote system and
>>     start attacking your original machine.
>>
>>     Would it be possible to have something like "tcpdmatch" for this
>>     tool?
>>
> 
> There is an undocumented tool that is bundled with IP Filter called 
> "ipftest".  It is used by various test suites (both in the general open 
> source version and the OpenSolaris version) to do this sort of rule 
> logic testing.  It can take various types of input, etc.
> 
> It's kind of clunky - input -> rules -> results, and used in the suites 
> to compare expected vs actual.
> 
> I'm not positive that this is exactly what you're asking for, but it 
> certainly is the underpinnings.
> 
> /usr/lib/ipf/ipftest -> isaexec'd
> 

Thanks Paul. I'll take a look at ipftest.

-tony

Reply via email to