public inbox for gentoo-amd64@lists.gentoo.org
 help / color / mirror / Atom feed
* [gentoo-amd64] KISS firewall not working on Gentoo Hardened
@ 2007-10-04  0:49 P.V.Anthony
  2007-10-04 16:24 ` [gentoo-amd64] " Duncan
  0 siblings, 1 reply; 7+ messages in thread
From: P.V.Anthony @ 2007-10-04  0:49 UTC (permalink / raw
  To: gentoo-amd64

Hi,

I was trying to get the KISS firewall working on Gentoo Hardened amd64.

The firewall script is from the following,
http://www.geocities.com/steve93138/

I am not at all good with firewalls. That is why I am using this KISS 
script.

Have emerged iptables. Currently using kernel version 2.6.22 from the 
gentoo hardened sources.

Searched google and found no good solution.

It seems that the kernel modules are different for some kernels versions.

Cannot find the ipt_unclean module. Tried compiling all the modules 
under Network.

If there are any links, please share them. Or better please help with 
advice.

P.V.Anthony
-- 
gentoo-amd64@gentoo.org mailing list



^ permalink raw reply	[flat|nested] 7+ messages in thread

* [gentoo-amd64]  Re: KISS firewall not working on Gentoo Hardened
  2007-10-04  0:49 [gentoo-amd64] KISS firewall not working on Gentoo Hardened P.V.Anthony
@ 2007-10-04 16:24 ` Duncan
  2007-10-04 18:55   ` Sebastian Redl
  2007-10-20 16:13   ` P.V.Anthony
  0 siblings, 2 replies; 7+ messages in thread
From: Duncan @ 2007-10-04 16:24 UTC (permalink / raw
  To: gentoo-amd64

"P.V.Anthony" <pvantony@singnet.com.sg> posted
470438AA.8040502@singnet.com.sg, excerpted below, on  Thu, 04 Oct 2007
08:49:46 +0800:

> I was trying to get the KISS firewall working on Gentoo Hardened amd64.
> 
> The firewall script is from the following,
> http://www.geocities.com/steve93138/
> 
> I am not at all good with firewalls. That is why I am using this KISS
> script.
> 
> Have emerged iptables. Currently using kernel version 2.6.22 from the
> gentoo hardened sources.
> 
> Searched google and found no good solution.
> 
> It seems that the kernel modules are different for some kernels
> versions.
> 
> Cannot find the ipt_unclean module. Tried compiling all the modules
> under Network.
> 
> If there are any links, please share them. Or better please help with
> advice.

First a direct answer, then my experience/opinion, FWIW.

Direct answer:  With a bit of googling, I found the following:

http://www.groupsrv.com/linux/about16735.html

The gist of it is that the ipt_unclean module was always considered 
experimental and not recommended by the IPTables folks, and was removed 
shortly before kernel 2.6.0, due to conflict with header usage for IETF 
network congestion notification.

It's also worth noting that it was never entirely free of problems -- 
race conditions and the like -- thus its constant "experimental" status 
even while it existed.  At one point, and the first page of the google 
results for it was full of hits on this, it was actually locking up the 
kernel.  Thus, while it was /intended/ to filter unclean packets, it was 
always considered iffy at best and was not recommended, since the cure 
was effectively worse than the disease!

Obviously, given the above, it's not something you'd want on in any case 
-- unless you were someone experimenting with it, thus the "experimental" 
label.

So that answer your question... you won't find that module per se in a 
2.6 kernel, and since it was removed before 2.6.0, any kind of firewall 
script you find that still references it is either for 2.4 kernels only 
(and then either specifically for folks experimenting, or by someone who 
obviously didn't know what he was doing), or hopelessly outdated at this 
point.  IOW, anything that references it without some sort of HUGE 
warning... isn't something I'd be trusting in the first place.

... Which brings me to the second part of this post, some "advice" since 
you asked for it, based on my own experience.  Obviously, this part is 
opinion only.  Feel free to treat it as worth what you are paying for it 
(nothing). =8^)

Personally, I tried a number of different firewall scripts, but wasn't 
really satisfied with any of them.  Most of them tried to do too much -- 
they had all sorts of config options for configuring big commercial 
networks, options for shutting off net access to a specific segment of 
the internal network at a specific time, for instance.  I didn't /need/ 
that sort of complex configuration, and it only made things more 
confusing, not less.

At the same time, stuff that should have been simple ended up hugely 
complex.  I was never sure which modules I needed for which options, and 
since I was configuring scripts that did the actual configuring of the 
IPTables based firewall, when something didn't work, I was never quite 
sure whether it was the script, or a bug in the kernel, or a missing 
module, or my mistake, or...  Well, I'm sure you can identify right about 
now! =8^(

So I decided that just wasn't going to work, and for several years I just 
depended on a NAPT based router (which I had bought when I was back on 
MSWormOS) to do my firewalling.  It was relatively simple, but had 
documentation, actually worked according to it, and did the job I needed 
done.

However, that router was an old generation 1.5 Netgear, limited to 10Mbit 
Ethernet on the WAN port, with actual thruput limited to about 6.5 Mbps.  
When my Internet connection was upped to 7Mbps, the router became the 
bottleneck, and I realized I either needed to buy a new one or quit 
putting off learning IPTables the /right/ way.

I learned IPTables directly.  As I expected, it was /much/ simpler than 
the scripts /ever/ were.  This is particularly true for Gentoo users 
already accustomed to running emerges and doing various other sysadmin 
tasks from a CLI, as opposed to doing everything from a GUI, and who 
already configure and compile their own kernel and don't run screaming 
when someone mentions the very idea of doing so in ordered to get a 
specific netfilter module.  Arguably, the scripts /could/ be better for 
folks used to running a distribution's precompiled binary kernel, with 
all its precompiled modules, who as I said run screaming at the very idea 
of compiling their own, tho I never found it so (I was on Mandrake back 
when I first tried, altho I must say I learned to compile my own kernel, 
even if it was from Mandrake sources, pretty early on), but my opinion is 
that most Gentoo users will be better served learning IPTables directly.  
It's NOT that hard, and as I said, I actually found it /vastly/ simpler 
than trying to figure out all those indirect scripts and the like.  YMMV 
of course...

So, assuming I've convinced you and you want to learn IPTables itself, 
what's an easy way to start?  Well, one way's to merge the iptables 
package and then read the iptables manpage.  From my experience, even 
that would be on par with trying to run those stupid supposedly "simple" 
firewall configuration scripts, but I'd call that "intermediate".  That 
works best after you have your bearings and know the basics.  There are 
easier ways to start.

You said firewall, but didn't mention whether you are more interested in 
running a firewall protecting a standalone machine, or whether you really 
had in mind a dedicated firewall machine, protecting a whole LAN worth of 
machines (tho that might be only one) behind it.

My case is the first, a firewall protecting a standalone machine, and in 
any event, as long as you have direct console access to your firewall, 
it's easiest to start there, and deal with the forwarding later, after 
you learn the basics.  If you are logging into your firewall machine over 
the LAN and don't have any direct console access, you do of course need 
to be careful you don't block your own command connection.  That's 
possible, but to keep things simple, the below assumes a direct console 
connection. 

For the Gentoo user especially, the simplest and most direct guide is the 
one DRobbins himself wrote for IBM developerWorks, back for kernel 2.4, 
but still useful today, and now hosted on the Gentoo infrastructure and 
listed in the main docs list.

http://www.gentoo.org/doc/en/articles/linux-24-stateful-fw-design.xml

Courtesy of some googling, here are some more paralleling that (links may 
wrap):

David Mair's very basic firewall protecting a standalone machine version:

http://www.cyberciti.biz/tips/how-do-i-build-a-simple-linux-firewall-for-
dsldial-up-connection.html

Here's another David Mair link, this one for a dedicated firewall 
protecting a LAN:

http://www.novell.com/coolsolutions/feature/18139.html

Another useful one.  As the DRobbins tutorial, it starts with a simple 
single standalone machine firewall and gets more complex from there:

http://wiki.centos.org/HowTos/Network/IPTables

If you are doing a dedicated router, Gentoo has a guide specifically for 
that, too.  In addition to firewalling and routing, it covers setting up 
additional stuff such as mail/web/ntp servers and the like, that you may 
wish to host on your firewall/router machine.
 
http://www.gentoo.org/doc/en/home-router-howto.xml

OK, here's the official netfilter site tutorial list, but unfortunately, 
it seems like it isn't kept up to date, and some of the links are dead-
ends.  Many of the others don't seem real appropriate, but I'll list a 
few of the more useful ones below:

http://www.netfilter.org/documentation/index.html#documentation-tutorials

The first one, IPTables Tutorial by Oskar Andreasson, may be useful if 
you don't know much about the basics of TCP/IP, and want to get a general 
orientation on that, with IPTables in mind, before you get to doing stuff 
with IPTables itself.

Down the list a way, there's Netfilter tutorial, by crhalpin.  It has a 
nice example at the end, specifically for a firewall/NAT box, thus it 
should be most useful for that, but it has a couple rather useful hints 
sections, "Tips and Style Issues", and "Common Mistakes (or Don't Follow 
in my Footsteps)".

The last three links on that official tutorials list are to 
professionally written magazine articles, by David Coulson.  The links 
are to the PDFs as taken straight from the magazines, so if you like nice 
glossy magazine layouts, these are likely to be right down your alley! 
=8^)

OK, some misc. discussion and additional links:

Useful info if you run bittorrent, by Vivek:

http://www.cyberciti.biz/tips/linux-iptables-open-bittorrent-tcp-
ports-6881-to-6889.html

For Gentoo, the in-tree iptables package places the iptables initscript 
in the usual place, /etc/init.d, with its config likewise in the usual 
place, /etc/conf.d.  Many of the above links use scripts to setup and 
take down their iptables setup, but Gentoo naturally already has that 
covered.  Once you get the running iptables setup the way you wish, 
configure /etc/conf.d/iptables, then run 

/etc/init.d/iptables save

to save your setup to the configured location.  FWIW, I decided I wanted 
mine in /etc/iptables.rules instead of the default /var location, but 
that of course is up to you. 

Particularly if you turned on the SAVE_ON_STOP option, you may wish to 
make it a point of backing up your useful config every time you change 
it, just to be sure your specific config you worked so hard to setup 
isn't accidentally overwritten by a non-working config if you change it.  
I like to use dates on my backups so I know when they were made, so along 
with my rules in /etc, I have a backup iptables.rules.20070731 (the last 
date I tweaked it) as well.

Once you have your config saved, you will want to add the iptables 
service to the appropriate runlevel, in boot if your network starts 
there, or in default if there.  It'll start before the network if it's in 
the appropriate level.  You can add it to nonetwork if you wish as well 
-- it won't harm anything, and will activate on any network interfaces as 
they are brought up if you start networking manually that way.

FWIW, in addition to the "save" action and the normal start/stop/restart/
zap type actions, Gentoo's iptables initscript has two additional 
actions, "reload", to reload the saved config, and "panic", which I've 
never used but appears to shut down all net access immediately, 
accomplished by setting everything to immediate drop.  (I'd be more 
inclined to unplug my cable modem in that situation, thus my not feeling 
the need to investigate the panic function, but it's useful to know it's 
there anyway.)

There are two commands to display active rules.  iptables -L lists them 
in one format, iptables-save, which outputs to STDOUT thus to the 
terminal if not redirected to a file, lists them in a somewhat different 
format.  iptables -L is perhaps more useful as an overview as it's more 
tabular and less cluttered, but the output of iptables-save is much 
closer to the command line parameters actually entered to create the 
rules.  Thus, iptables-save tends to be more useful when actually 
creating and deleting rules, or anyway I certainly found it so.

Finally, in addition to the stuff covered in the tutorials above, there 
are a few additional rules general and useful enough to mention here.

First, if your ISP (as mine) uses DHCP, you'll want to add a rule 
allowing that, since it won't be covered by the usual established,related 
rule because the connection is just being setup at that point.  After 
reading the tutorials above and referencing the iptables manpage if 
necessary, this should make enough sense that you can setup your own rule 
for it reasonably easily.  DHCP is an extension of bootp, and uses the 
same ports, udp ports 67 and 68.  Incoming, you'll want a rule allowing 
udp sport 67, dport 68.  The outgoing rule if you need one (basic setups 
normally allow outgoing by default, in which case you probably don't) 
would be the reverse, udp sport 68, dport 67.

Additionally, I found that while I wanted to log most traffic before it 
was dropped, I wanted to limit the logging rate so it wouldn't use up all 
the space on my log partition if I got attacked, and there were a few 
things, like messenger spam (udp dport 1026-1031 inbound) that were SO 
common it wasn't worth logging at all.  I accomplished this by setting up 
a logging chain, adding a rule to the end of the input chain (after all 
my normal allows) to jump to the logging chain.  The rules in this 
logging chain then drop anything (like udp dport 1026-1031 as mentioned 
above) I consider too common to log, with the last rule in the logging 
chain a rate-limited logging rule.  Processing then returns to the input 
chain, which having no additional rules (the one invoking the logging 
chain being the last one) and a DROP policy, then drops any remaining 
packets.

As the logging paragraph above indicates, I found it useful to create a 
few chains beyond the default INPUT/OUTPUT/FORWARD.  Specifically, I have 
(for input):

in-except, for exceptions to the following,
in-allow, for explicit allow rules,
in-log, to drop the real common stuff and log whatever has fallen thru.

The default INPUT chain with a default DROP policy then consists of three 
simple rules jumping to the above three input chains in order, as follows 
(format is as output by iptables-save):

-A INPUT -j in-except
-A INPUT -j in-allow
-A INPUT -j in-log

in-exceptions is currently empty, but from previous experience I've found 
it useful to have.  It comes in handy if I want to block packets from a 
specific IP or something that would otherwise be allowed.

in-allow has the following three rules:

-A in-allow -m state --state RELATED,ESTABLISHED -j ACCEPT
-A in-allow -i lo -j ACCEPT
-A in-allow -p udp -m udp --sport 67 --dport 68 -j ACCEPT

The related/established one should be well covered in the tutorials.  I 
allow everything from the localhost loopback interface, and as discussed 
above, I allow DHCP packets.  (The DHCP rule could be tightened down 
somewhat if necessary, but this works and is reasonably limited, 
considering the dhcp client only has the port open a limited time when it 
leases or renews the IP.)

in-log also has three rules, as follows:

-A in-log -i eth0 -p icmp -m icmp --icmp-type 8/0 -j DROP
-A in-log -i eth0 -p udp -m udp --dport 1026:1031 -j DROP
-A in-log -m limit --limit 20/hour -j LOG --log-prefix "IPTables:"

ICMP type 8/0 is ICMP echo, aka "ping", ICMP implementation.  I choose to 
drop this, and to do so before logging.  The second entry is the 
messenger spam entry I mentioned above, since the things otherwise fill 
my logs.  The third is the logging entry itself, using the default burst 
level of (IIRC) five, then limited to one every three minutes.

Since this is a stand-alone machine, I don't have to worry about 
forwarding so it's simply a default DROP policy. I don't have a reason to 
filter output, so it's simply a default ACCEPT policy.  Thus, similar to 
a NAPT based router, the only filtering I'm doing is on incoming packets, 
and generally limited to related/established, with a limited set of 
exceptions, and everything else rate-limit logged, again with a limited 
set of too-common exceptions, before dropping.

The entire set, again as output from iptables-save, is as follows (packet/
byte stats where displayed xxed out):

# Generated by iptables-save v1.3.8 on Thu Oct  4 07:00:23 2007
*filter
:INPUT DROP [xxx:xxx]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [xxx:xxx]
:in-allow - [0:0]
:in-except - [0:0]
:in-log - [0:0]
-A INPUT -j in-except
-A INPUT -j in-allow
-A INPUT -j in-log
-A in-allow -m state --state RELATED,ESTABLISHED -j ACCEPT
-A in-allow -i lo -j ACCEPT
-A in-allow -p udp -m udp --sport 67 --dport 68 -j ACCEPT
-A in-log -i eth0 -p icmp -m icmp --icmp-type 8/0 -j DROP
-A in-log -i eth0 -p udp -m udp --dport 1026:1031 -j DROP
-A in-log -m limit --limit 20/hour -j LOG --log-prefix "IPTables:"
COMMIT
# Completed on Thu Oct  4 07:00:23 2007

To enable that and provide a bit of additional flexibility, I have the 
following related kernel config items enabled (I prefer builtin for 
regularly used stuff, so most of these are =y here, but some can be 
modularized, =m, if desired):

#General netfilter option, under Networking > Networking Options
CONFIG_NETFILTER
# Under that...

# ... Under Core Netfilter Configuration

# Netfilter connection tracking support
CONFIG_NF_CONNTRACK_ENABLED
# FTP protocol support
CONFIG_NF_CONNTRACK_FTP
# Netfilter Xtables support
CONFIG_NETFILTER_XTABLES
# "NFLOG" target support
CONFIG_NETFILTER_XT_TARGET_NFLOG
# "helper" match support
CONFIG_NETFILTER_XT_MATCH_HELPER
# "limit" match support
CONFIG_NETFILTER_XT_MATCH_LIMIT
# Multiple port match support
CONFIG_NETFILTER_XT_MATCH_MULTIPORT
# "pkttype" packet type match support
CONFIG_NETFILTER_XT_MATCH_PKTTYPE
# "state" match support
CONFIG_NETFILTER_XT_MATCH_STATE

# ... Under IP: Netfilter Configuration

# IPv4 connection tracking support (required for NAT)
CONFIG_NF_CONNTRACK_IPV4
# IP tables support (required for filtering/masq/NAT)
CONFIG_IP_NF_IPTABLES
# IP range match support
CONFIG_IP_NF_MATCH_IPRANGE
# Owner match support
CONFIG_IP_NF_MATCH_OWNER
# Packet filtering
CONFIG_IP_NF_FILTER
# REJECT target support
CONFIG_IP_NF_TARGET_REJECT
# LOG target support
CONFIG_IP_NF_TARGET_LOG

All the other Netfilter related kernel options are off.

Hope that's all useful, if not to you then to someone, as it took me 
quite some time to compose it! =8^)

-- 
Duncan - List replies preferred.   No HTML msgs.
"Every nonfree program has a lord, a master --
and if you use the program, he is your master."  Richard Stallman

-- 
gentoo-amd64@gentoo.org mailing list



^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [gentoo-amd64]  Re: KISS firewall not working on Gentoo Hardened
  2007-10-04 16:24 ` [gentoo-amd64] " Duncan
@ 2007-10-04 18:55   ` Sebastian Redl
  2007-10-04 23:14     ` Homer Parker
  2007-10-04 23:20     ` Duncan
  2007-10-20 16:13   ` P.V.Anthony
  1 sibling, 2 replies; 7+ messages in thread
From: Sebastian Redl @ 2007-10-04 18:55 UTC (permalink / raw
  To: gentoo-amd64

Duncan wrote:
> "P.V.Anthony" <pvantony@singnet.com.sg> posted
> 470438AA.8040502@singnet.com.sg, excerpted below, on  Thu, 04 Oct 2007
> 08:49:46 +0800:
>
>   
>> I was trying to get the KISS firewall working on Gentoo Hardened amd64.
>>     
> Personally, I tried a number of different firewall scripts, but wasn't 
> really satisfied with any of them.  Most of them tried to do too much -- 
> they had all sorts of config options for configuring big commercial 
> networks, options for shutting off net access to a specific segment of 
> the internal network at a specific time, for instance.  I didn't /need/ 
> that sort of complex configuration, and it only made things more 
> confusing, not less.
>
> At the same time, stuff that should have been simple ended up hugely 
> complex.  I was never sure which modules I needed for which options, and 
> since I was configuring scripts that did the actual configuring of the 
> IPTables based firewall, when something didn't work, I was never quite 
> sure whether it was the script, or a bug in the kernel, or a missing 
> module, or my mistake, or...  Well, I'm sure you can identify right about 
> now! =8^(
>   
I have to disagree with this evaluation. In several years, I found that
shorewall makes simple things simple, and difficult things I've never
tried. My network is really, really simple: a
firewall/fileserver/everything with a slightly defective keyboard that I
carry a screen to when it doesn't work, plus a number of other computers
(one desktop, three laptops, usually) for various family members. The
firewall mainly does three things:
1) Block everything except a few services from the outside.
2) NAT.
3) A few direct port forwards to the desktop computer.

Configuring this is easy enough in IPTables (I did learn them somewhat,
out of interest, though I've forgotten a lot, too), but it's really,
really easy in shorewall.

In all the years I've used Gentoo now, I can only say that I'm highly
satisfied with the program. The only negative point I can find is that
it always wants to overwrite all the configuration files on an upgrade.

Sebastian Redl

-- 
gentoo-amd64@gentoo.org mailing list



^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [gentoo-amd64]  Re: KISS firewall not working on Gentoo Hardened
  2007-10-04 18:55   ` Sebastian Redl
@ 2007-10-04 23:14     ` Homer Parker
  2007-10-04 23:20     ` Duncan
  1 sibling, 0 replies; 7+ messages in thread
From: Homer Parker @ 2007-10-04 23:14 UTC (permalink / raw
  To: gentoo-amd64

On Thu, 2007-10-04 at 20:55 +0200, Sebastian Redl wrote:
> 
> Configuring this is easy enough in IPTables (I did learn them
> somewhat,
> out of interest, though I've forgotten a lot, too), but it's really,
> really easy in shorewall. 

	Seconded.. I've used it since 1.x in a variety of situations, and it's
always made short work of it. My previous home router had a several page
script to setup firewall rules and QOS on a 4 legged router that took me
a week or two to get right from pouring over lartc.org. i've done more
complex setups in very short time with shorewall. the docs at
shorewall.net are great and get simple firewall/routers up in no time,
and includes more complex setups such as Tom's Xen setup he uses at
home.

-- 
Homer Parker <hparker@gentoo.org>

-- 
gentoo-amd64@gentoo.org mailing list



^ permalink raw reply	[flat|nested] 7+ messages in thread

* [gentoo-amd64]  Re: KISS firewall not working on Gentoo Hardened
  2007-10-04 18:55   ` Sebastian Redl
  2007-10-04 23:14     ` Homer Parker
@ 2007-10-04 23:20     ` Duncan
  2007-10-04 23:38       ` Duncan
  1 sibling, 1 reply; 7+ messages in thread
From: Duncan @ 2007-10-04 23:20 UTC (permalink / raw
  To: gentoo-amd64

Sebastian Redl <sebastian.redl@getdesigned.at> posted
4705370A.4010709@getdesigned.at, excerpted below, on  Thu, 04 Oct 2007
20:55:06 +0200:

> Configuring this is easy enough in IPTables (I did learn them somewhat,
> out of interest, though I've forgotten a lot, too), but it's really,
> really easy in shorewall.

Interestingly, shorewall was one I tried... and got frustrated with.  It 
has likely improved since then, but that much?  The other possibility is 
that I was trying something a bit more advanced than what you need, and 
too advanced for it (back then?).

> In all the years I've used Gentoo now, I can only say that I'm highly
> satisfied with the program. The only negative point I can find is that
> it always wants to overwrite all the configuration files on an upgrade.

Try setting INSTALL_MASK appropriately in make.conf, set to the shorewall 
subdir or whatever.  I've never actually used this portage feature, but 
it's supposed to work quite well.  The effect would be that anything that 
matched wouldn't be installed.  It's the usual recommendation from the 
portage devs for stuff like that.  (I've been thinking about trying it 
for *.la files, since the way they work is a pain for Gentoo users and I 
read of someone doing it to good effect, but I've not gotten around to it 
yet.)

-- 
Duncan - List replies preferred.   No HTML msgs.
"Every nonfree program has a lord, a master --
and if you use the program, he is your master."  Richard Stallman

-- 
gentoo-amd64@gentoo.org mailing list



^ permalink raw reply	[flat|nested] 7+ messages in thread

* [gentoo-amd64]  Re: KISS firewall not working on Gentoo Hardened
  2007-10-04 23:20     ` Duncan
@ 2007-10-04 23:38       ` Duncan
  0 siblings, 0 replies; 7+ messages in thread
From: Duncan @ 2007-10-04 23:38 UTC (permalink / raw
  To: gentoo-amd64

Duncan <1i5t5.duncan@cox.net> posted pan.2007.10.04.23.20.43@cox.net,
excerpted below, on  Thu, 04 Oct 2007 23:20:44 +0000:

> The other possibility is
> that I was trying something a bit more advanced than what you need, and
> too advanced for it (back then?).

... or s/advanced/simple-but-weird/, based on the other responses?

I dunno.  Maybe it's just me, but I've certainly found iptables itself 
easier and simpler to work with than all the indirect solutions. <shrug>

-- 
Duncan - List replies preferred.   No HTML msgs.
"Every nonfree program has a lord, a master --
and if you use the program, he is your master."  Richard Stallman

-- 
gentoo-amd64@gentoo.org mailing list



^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [gentoo-amd64]  Re: KISS firewall not working on Gentoo Hardened
  2007-10-04 16:24 ` [gentoo-amd64] " Duncan
  2007-10-04 18:55   ` Sebastian Redl
@ 2007-10-20 16:13   ` P.V.Anthony
  1 sibling, 0 replies; 7+ messages in thread
From: P.V.Anthony @ 2007-10-20 16:13 UTC (permalink / raw
  To: gentoo-amd64

On this day, 05-October-2007 12:24 AM,  Duncan wrote:

> Hope that's all useful, if not to you then to someone, as it took me 
> quite some time to compose it! =8^)

Very useful and helpful. Especially the links.

Thank you very very much.

P.V.Anthony


-- 
gentoo-amd64@gentoo.org mailing list



^ permalink raw reply	[flat|nested] 7+ messages in thread

end of thread, other threads:[~2007-10-20 16:26 UTC | newest]

Thread overview: 7+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2007-10-04  0:49 [gentoo-amd64] KISS firewall not working on Gentoo Hardened P.V.Anthony
2007-10-04 16:24 ` [gentoo-amd64] " Duncan
2007-10-04 18:55   ` Sebastian Redl
2007-10-04 23:14     ` Homer Parker
2007-10-04 23:20     ` Duncan
2007-10-04 23:38       ` Duncan
2007-10-20 16:13   ` P.V.Anthony

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox