summaryrefslogtreecommitdiff
path: root/sbin/pfctl/pfctl_parser.c
diff options
context:
space:
mode:
authorDaniel Hartmeier <dhartmei@cvs.openbsd.org>2003-02-08 20:13:21 +0000
committerDaniel Hartmeier <dhartmei@cvs.openbsd.org>2003-02-08 20:13:21 +0000
commit615fa40fdb9c9961935e2cefd2bd118c7225347b (patch)
tree2fb3cd51ac24eb8f16755de83ae21fd59d9172f8 /sbin/pfctl/pfctl_parser.c
parent18a76cba38a02030b3e3550931ecf3ffc7b27e97 (diff)
Add scrub option 'random-id', which replaces IP IDs with random values
for outgoing packets that are not fragmented (after reassembly), to compensate for predictable IDs generated by some hosts, and defeat fingerprinting and NAT detection as described in the Bellovin paper http://www.research.att.com/~smb/papers/fnat.pdf. ok theo@
Diffstat (limited to 'sbin/pfctl/pfctl_parser.c')
-rw-r--r--sbin/pfctl/pfctl_parser.c4
1 files changed, 3 insertions, 1 deletions
diff --git a/sbin/pfctl/pfctl_parser.c b/sbin/pfctl/pfctl_parser.c
index 61a8994dfa9..88c25e44bde 100644
--- a/sbin/pfctl/pfctl_parser.c
+++ b/sbin/pfctl/pfctl_parser.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: pfctl_parser.c,v 1.139 2003/02/02 19:25:06 henning Exp $ */
+/* $OpenBSD: pfctl_parser.c,v 1.140 2003/02/08 20:13:20 dhartmei Exp $ */
/*
* Copyright (c) 2001 Daniel Hartmeier
@@ -917,6 +917,8 @@ print_filter(struct pf_rule *r, int verbose)
printf("fragment ");
if (r->rule_flag & PFRULE_NODF)
printf("no-df ");
+ if (r->rule_flag & PFRULE_RANDOMID)
+ printf("random-id ");
if (r->min_ttl)
printf("min-ttl %d ", r->min_ttl);
if (r->max_mss)