diff options
author | Daniel Hartmeier <dhartmei@cvs.openbsd.org> | 2003-02-08 20:13:21 +0000 |
---|---|---|
committer | Daniel Hartmeier <dhartmei@cvs.openbsd.org> | 2003-02-08 20:13:21 +0000 |
commit | 615fa40fdb9c9961935e2cefd2bd118c7225347b (patch) | |
tree | 2fb3cd51ac24eb8f16755de83ae21fd59d9172f8 /sbin/pfctl/pfctl_parser.c | |
parent | 18a76cba38a02030b3e3550931ecf3ffc7b27e97 (diff) |
Add scrub option 'random-id', which replaces IP IDs with random values
for outgoing packets that are not fragmented (after reassembly), to
compensate for predictable IDs generated by some hosts, and defeat
fingerprinting and NAT detection as described in the Bellovin paper
http://www.research.att.com/~smb/papers/fnat.pdf. ok theo@
Diffstat (limited to 'sbin/pfctl/pfctl_parser.c')
-rw-r--r-- | sbin/pfctl/pfctl_parser.c | 4 |
1 files changed, 3 insertions, 1 deletions
diff --git a/sbin/pfctl/pfctl_parser.c b/sbin/pfctl/pfctl_parser.c index 61a8994dfa9..88c25e44bde 100644 --- a/sbin/pfctl/pfctl_parser.c +++ b/sbin/pfctl/pfctl_parser.c @@ -1,4 +1,4 @@ -/* $OpenBSD: pfctl_parser.c,v 1.139 2003/02/02 19:25:06 henning Exp $ */ +/* $OpenBSD: pfctl_parser.c,v 1.140 2003/02/08 20:13:20 dhartmei Exp $ */ /* * Copyright (c) 2001 Daniel Hartmeier @@ -917,6 +917,8 @@ print_filter(struct pf_rule *r, int verbose) printf("fragment "); if (r->rule_flag & PFRULE_NODF) printf("no-df "); + if (r->rule_flag & PFRULE_RANDOMID) + printf("random-id "); if (r->min_ttl) printf("min-ttl %d ", r->min_ttl); if (r->max_mss) |