Source-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[src/trunk]: src/external/bsd/blacklist Explain a bit more how to examine the...
details: https://anonhg.NetBSD.org/src/rev/194ba93ce6c7
branches: trunk
changeset: 352889:194ba93ce6c7
user: christos <christos%NetBSD.org@localhost>
date: Thu Apr 13 17:59:34 2017 +0000
description:
Explain a bit more how to examine the blacklist state.
diffstat:
external/bsd/blacklist/README | 12 +++++++++++-
1 files changed, 11 insertions(+), 1 deletions(-)
diffs (26 lines):
diff -r 83e16eb97a95 -r 194ba93ce6c7 external/bsd/blacklist/README
--- a/external/bsd/blacklist/README Thu Apr 13 17:45:56 2017 +0000
+++ b/external/bsd/blacklist/README Thu Apr 13 17:59:34 2017 +0000
@@ -1,4 +1,4 @@
-# $NetBSD: README,v 1.7 2015/01/26 00:34:50 christos Exp $
+# $NetBSD: README,v 1.8 2017/04/13 17:59:34 christos Exp $
This package contains library that can be used by network daemons to
communicate with a packet filter via a daemon to enforce opening and
@@ -98,6 +98,16 @@
...
}
+You can use 'blacklistctl dump -a' to list all the current entries
+in the database; the ones that have nfail <c>/<t> where <c>urrent
+>= <t>otal, should have an id assosiated with them; this means that
+there is a packet filter rule added for that entry. For npf, you
+can examine the packet filter dynamic rule entries using 'npfctl
+rule <rulename> list'. The number of current entries can exceed
+the total. This happens because entering packet filter rules is
+asynchronous; there could be other connection before the rule
+becomes activated.
+
Enjoy,
christos
Home |
Main Index |
Thread Index |
Old Index