summaryrefslogtreecommitdiff
path: root/sys/netinet/ip_fw.c
diff options
context:
space:
mode:
authorPeter Wemm <peter@FreeBSD.org>1997-09-10 03:07:14 +0000
committerPeter Wemm <peter@FreeBSD.org>1997-09-10 03:07:14 +0000
commitffdd472de7a1a10f7f8fc8a0b5b343d52eb10d22 (patch)
tree495f9f1c97e7c3e328aab0c824a1c91e4a6ba421 /sys/netinet/ip_fw.c
parent10a91a42fcf18d46c35200a4531fc497a4456389 (diff)
Notes
Diffstat (limited to 'sys/netinet/ip_fw.c')
-rw-r--r--sys/netinet/ip_fw.c24
1 files changed, 16 insertions, 8 deletions
diff --git a/sys/netinet/ip_fw.c b/sys/netinet/ip_fw.c
index 22d2200ccf12a..6f76bde834da3 100644
--- a/sys/netinet/ip_fw.c
+++ b/sys/netinet/ip_fw.c
@@ -12,7 +12,7 @@
*
* This software is provided ``AS IS'' without any warranties of any kind.
*
- * $Id: ip_fw.c,v 1.61 1997/08/06 00:19:05 alex Exp $
+ * $Id: ip_fw.c,v 1.62 1997/08/23 14:28:22 alex Exp $
*/
/*
@@ -936,18 +936,23 @@ ip_fw_ctl(int stage, struct mbuf **mm)
void
ip_fw_init(void)
{
- struct ip_fw deny;
+ struct ip_fw default_rule;
ip_fw_chk_ptr = ip_fw_chk;
ip_fw_ctl_ptr = ip_fw_ctl;
LIST_INIT(&ip_fw_chain);
- bzero(&deny, sizeof deny);
- deny.fw_prot = IPPROTO_IP;
- deny.fw_number = (u_short)-1;
- deny.fw_flg |= IP_FW_F_DENY;
- deny.fw_flg |= IP_FW_F_IN | IP_FW_F_OUT;
- if (check_ipfw_struct(&deny) == NULL || add_entry(&ip_fw_chain, &deny))
+ bzero(&default_rule, sizeof default_rule);
+ default_rule.fw_prot = IPPROTO_IP;
+ default_rule.fw_number = (u_short)-1;
+#ifdef IPFIREWALL_DEFAULT_TO_ACCEPT
+ default_rule.fw_flg |= IP_FW_F_ACCEPT;
+#else
+ default_rule.fw_flg |= IP_FW_F_DENY;
+#endif
+ default_rule.fw_flg |= IP_FW_F_IN | IP_FW_F_OUT;
+ if (check_ipfw_struct(&default_rule) == NULL ||
+ add_entry(&ip_fw_chain, &default_rule))
panic(__FUNCTION__);
printf("IP packet filtering initialized, "
@@ -956,6 +961,9 @@ ip_fw_init(void)
#else
"divert disabled, ");
#endif
+#ifdef IPFIREWALL_DEFAULT_TO_ACCEPT
+ printf("default to accept, ");
+#endif
#ifndef IPFIREWALL_VERBOSE
printf("logging disabled\n");
#else