History log of /src/usr.sbin/pf/man/man5 |
Revision | Date | Author | Comments |
1.5 | 23-Aug-2005 |
peter | pf needs to be started after the network is up, because some pf rules derive IP address(es) from the interface (e.g "... from any to fxp0"). This however, creates window for possible attacks from the network.
Implement the solution proposed by YAMAMOTO Takashi: Add /etc/defaults/pf.boot.conf and load it with the /etc/rc.d/pf_boot script before starting the network. People who don't like the default rules can override it with their own /etc/pf.boot.conf. The default rules have been obtained from OpenBSD.
No objections on: tech-security
|
1.4 | 27-Jun-2005 |
peter | Remove (pf)spamd. Its right to exist in NetBSD has been questioned since it appeared and whether it's really part of pf or not is still unclear. Looking at the other *BSDs it seems that they have left out spamd when importing pf, and now we do that too. Also, the name conflicted with another more popular used tool, after the rename to pfspamd it was left with completely unusable documentation which apparently no-one wanted to fix.
A port of the latest spamd will be imported into pkgsrc soon.
Suggested by several people, no objections on last proposal on tech-userlevel.
|
1.3 | 19-Apr-2005 |
tron | Remove copy of manual page created during build.
|
1.2 | 12-Apr-2005 |
jwise | spamd.conf is now pfspamd.conf.
|
1.1 | 14-Nov-2004 |
yamt | branches: 1.1.2; merge after importing pf from openbsd 3.6. (userland part)
some files were imported to the different places from the previous version. v3_5: etc/pf.conf etc/pf.os etc/spamd.conf share/man/man4/pf.4 share/man/man4/pflog.4 share/man/man5/pf.conf.5 share/man/man5/pf.os.5 share/man/man5/spamd.conf.5 v3_6: dist/pf/etc/pf.conf dist/pf/etc/pf.os dist/pf/etc/spamd.conf dist/pf/share/man/man4/pf.4 dist/pf/share/man/man4/pflog.4 dist/pf/share/man/man5/pf.conf.5 dist/pf/share/man/man5/pf.os.5 dist/pf/share/man/man5/spamd.conf.5
|
1.1.2.4 | 02-Sep-2005 |
tron | Pull up following revision(s) (requested by peter in ticket #717): usr.sbin/pf/man/man5/pf.boot.conf.5: revision 1.1 usr.sbin/postinstall/postinstall: revision 1.4 etc/rc.d/pf: revision 1.6 etc/rc.d/pf_boot: revision 1.1 usr.sbin/pf/etc/defaults/pf.boot.conf: revision 1.1 usr.sbin/pf/Makefile: revision 1.7 etc/rc.d/Makefile: revision 1.52 etc/mtree/special: revision 1.89 usr.sbin/pf/man/man5/Makefile: revision 1.5 usr.sbin/pf/etc/defaults/Makefile: revision 1.1 pf needs to be started after the network is up, because some pf rules derive IP address(es) from the interface (e.g "... from any to fxp0"). This however, creates window for possible attacks from the network. Implement the solution proposed by YAMAMOTO Takashi: Add /etc/defaults/pf.boot.conf and load it with the /etc/rc.d/pf_boot script before starting the network. People who don't like the default rules can override it with their own /etc/pf.boot.conf. The default rules have been obtained from OpenBSD. No objections on: tech-security
|
1.1.2.3 | 02-Jul-2005 |
tron | Pull up revision 1.4 (requested by peter in ticket #518): Remove (pf)spamd. Its right to exist in NetBSD has been questioned since it appeared and whether it's really part of pf or not is still unclear. Looking at the other *BSDs it seems that they have left out spamd when importing pf, and now we do that too. Also, the name conflicted with another more popular used tool, after the rename to pfspamd it was left with completely unusable documentation which apparently no-one wanted to fix. A port of the latest spamd will be imported into pkgsrc soon. Suggested by several people, no objections on last proposal on tech-userlevel.
|
1.1.2.2 | 07-May-2005 |
riz | Pull up revision 1.3 (requested by tron in ticket #148): Remove copy of manual page created during build.
|
1.1.2.1 | 13-Apr-2005 |
tron | Pull up revision 1.2 (requested by jwise in ticket #138): spamd.conf is now pfspamd.conf.
|
1.1 | 23-Aug-2005 |
peter | branches: 1.1.2; pf needs to be started after the network is up, because some pf rules derive IP address(es) from the interface (e.g "... from any to fxp0"). This however, creates window for possible attacks from the network.
Implement the solution proposed by YAMAMOTO Takashi: Add /etc/defaults/pf.boot.conf and load it with the /etc/rc.d/pf_boot script before starting the network. People who don't like the default rules can override it with their own /etc/pf.boot.conf. The default rules have been obtained from OpenBSD.
No objections on: tech-security
|
1.1.2.2 | 02-Sep-2005 |
tron | Pull up following revision(s) (requested by peter in ticket #717): usr.sbin/pf/man/man5/pf.boot.conf.5: revision 1.1 usr.sbin/postinstall/postinstall: revision 1.4 etc/rc.d/pf: revision 1.6 etc/rc.d/pf_boot: revision 1.1 usr.sbin/pf/etc/defaults/pf.boot.conf: revision 1.1 usr.sbin/pf/Makefile: revision 1.7 etc/rc.d/Makefile: revision 1.52 etc/mtree/special: revision 1.89 usr.sbin/pf/man/man5/Makefile: revision 1.5 usr.sbin/pf/etc/defaults/Makefile: revision 1.1 pf needs to be started after the network is up, because some pf rules derive IP address(es) from the interface (e.g "... from any to fxp0"). This however, creates window for possible attacks from the network. Implement the solution proposed by YAMAMOTO Takashi: Add /etc/defaults/pf.boot.conf and load it with the /etc/rc.d/pf_boot script before starting the network. People who don't like the default rules can override it with their own /etc/pf.boot.conf. The default rules have been obtained from OpenBSD. No objections on: tech-security
|
1.1.2.1 | 23-Aug-2005 |
tron | file pf.boot.conf.5 was added on branch netbsd-3 on 2005-09-02 12:29:36 +0000
|