> clnsrv "allow    " tcp   ""   43 "${tcp_nicname_c}"    "${tcp_nicname_s}"
> clnsrv "allow    " tcp   ""   53 "${tcp_domain_c}"     "${tcp_domain_s}"
...
> ... on and on up to the 1024 and then a few splattered after that.

looks like the search path can become extremely long!.

> The single largest optimization would probably be a dispatch based on
> source or destination port, the latter being more prevelent.

ok... dispatch on ports is easy to implement, easier than dispatch
on (masked) IP's.

> I can't easily send out the actual IP firewall list, it may expose
> what ever router I grabbed it off of to an attack :-)

understand -- this is why i just asked only about the structure of the
ruleset and the length of the longest search path.

        cheers
        luigi

-----------------------------------+-------------------------------------
  Luigi RIZZO, [EMAIL PROTECTED]  . Dip. di Ing. dell'Informazione
  http://www.iet.unipi.it/~luigi/  . Universita` di Pisa
  TEL/FAX: +39-050-568.533/522     . via Diotisalvi 2, 56126 PISA (Italy)
  Mobile   +39-347-0373137
-----------------------------------+-------------------------------------


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message

Reply via email to