From b91839b32cb4e26c4efd58ce809adff8b307ee8e Mon Sep 17 00:00:00 2001 From: Igor Sobrado Date: Wed, 15 Apr 2009 08:27:09 +0000 Subject: code and Backus-Naur Form specification rules must fit on 80-column displays; while here, remove a few superfluous line breaks in examples. ok henning@, jmc@ --- share/man/man5/pf.conf.5 | 42 +++++++++++++++++++++--------------------- 1 file changed, 21 insertions(+), 21 deletions(-) (limited to 'share/man') diff --git a/share/man/man5/pf.conf.5 b/share/man/man5/pf.conf.5 index f491a9159ba..ae3cd3f8747 100644 --- a/share/man/man5/pf.conf.5 +++ b/share/man/man5/pf.conf.5 @@ -1,4 +1,4 @@ -.\" $OpenBSD: pf.conf.5,v 1.423 2009/04/15 07:21:26 jmc Exp $ +.\" $OpenBSD: pf.conf.5,v 1.424 2009/04/15 08:27:08 sobrado Exp $ .\" .\" Copyright (c) 2002, Daniel Hartmeier .\" All rights reserved. @@ -1911,7 +1911,8 @@ For instance: .Bd -literal -offset indent block all pass out proto tcp from any to any modulate state -pass in proto tcp from any to any port 25 flags S/SFRA modulate state +pass in proto tcp from any to any port 25 flags S/SFRA \e + modulate state .Ed .Pp Note that modulated connections will not recover when the state table @@ -2104,7 +2105,7 @@ by the block rule. .Bd -literal -offset indent block quick from \*(Ltbad_hosts\*(Gt pass in on $ext_if proto tcp to $webserver port www keep state \e - (max-src-conn-rate 100/10, overload \*(Ltbad_hosts\*(Gt flush global) + (max-src-conn-rate 100/10, overload \*(Ltbad_hosts\*(Gt flush global) .Ed .Sh OPERATING SYSTEM FINGERPRINTING Passive OS Fingerprinting is a mechanism to inspect nuances of a TCP @@ -2368,8 +2369,7 @@ ext_if = \&"kue0\&" block on $ext_if all anchor spam pass out on $ext_if all -pass in on $ext_if proto tcp from any \e - to $ext_if port smtp +pass in on $ext_if proto tcp from any to $ext_if port smtp .Ed .Pp blocks all packets on the external interface by default, then evaluates @@ -2378,8 +2378,7 @@ all rules in the named "spam", and finally passes all outgoing connections and incoming connections to port 25. .Bd -literal -offset indent -# echo \&"block in quick from 1.2.3.4 to any\&" \&| \e - pfctl -a spam -f - +# echo \&"block in quick from 1.2.3.4 to any\&" \&| pfctl -a spam -f - .Ed .Pp This loads a single rule into the @@ -2426,8 +2425,7 @@ spam are only evaluated for packets with destination port 25. Hence, .Bd -literal -offset indent -# echo \&"block in quick from 1.2.3.4 to any" \&| \e - pfctl -a spam -f - +# echo \&"block in quick from 1.2.3.4 to any" \&| pfctl -a spam -f - .Ed .Pp will only block connections from 1.2.3.4 to port 25. @@ -2715,10 +2713,10 @@ line = ( option | pf-rule | nat-rule | binat-rule | rdr-rule | include ) option = "set" ( [ "timeout" ( timeout | "{" timeout-list "}" ) ] | - [ "ruleset-optimization" [ "none" | "basic" | "profile" ]] | - [ "optimization" [ "default" | "normal" | - "high-latency" | "satellite" | - "aggressive" | "conservative" ] ] + [ "ruleset-optimization" [ "none" | "basic" | + "profile" ] ] | + [ "optimization" [ "default" | "normal" | "high-latency" | + "satellite" | "aggressive" | "conservative" ] ] [ "limit" ( limit-item | "{" limit-list "}" ) ] | [ "loginterface" ( interface-name | "none" ) ] | [ "block-policy" ( "drop" | "return" ) ] | @@ -2732,14 +2730,15 @@ option = "set" ( [ "timeout" ( timeout | "{" timeout-list "}" ) ] | pf-rule = action [ ( "in" | "out" ) ] [ "log" [ "(" logopts ")"] ] [ "quick" ] - [ "on" ifspec ] [ "fastroute" | route ] [ af ] [ protospec ] - hosts [ filteropts ] + [ "on" ifspec ] [ "fastroute" | route ] [ af ] + [ protospec ] hosts [ filteropts ] logopts = logopt [ [ "," ] logopts ] logopt = "all" | "user" | "to" interface-name filteropts = filteropt [ [ "," ] filteropts ] -filteropt = user | group | flags | icmp-type | icmp6-type | "tos" tos | +filteropt = user | group | flags | icmp-type | icmp6-type | + "tos" tos | ( "no" | "keep" | "modulate" | "synproxy" ) "state" [ "(" state-opts ")" ] | "scrub" "(" scrubopts ")" | "fragment" | "allow-opts" | @@ -2775,7 +2774,7 @@ antispoof-rule = "antispoof" [ "log" ] [ "quick" ] table-rule = "table" "\*(Lt" string "\*(Gt" [ tableopts ] tableopts = tableopt [ tableopts ] -tableopt = "persist" | "const" | "counters" | "file" string | +tableopt = "persist" | "const" | "counters" | "file" string | "{" [ tableaddrs ] "}" tableaddrs = tableaddr-spec [ [ "," ] tableaddrs ] tableaddr-spec = [ "!" ] tableaddr [ "/" mask-bits ] @@ -2825,8 +2824,9 @@ protospec = "proto" ( proto-name | proto-number | proto-list = ( proto-name | proto-number ) [ [ "," ] proto-list ] hosts = "all" | - "from" ( "any" | "no-route" | "urpf-failed" | "self" | host | - "{" host-list "}" | "route" string ) [ port ] [ os ] + "from" ( "any" | "no-route" | "urpf-failed" | "self" | + host | "{" host-list "}" | "route" string ) [ port ] + [ os ] "to" ( "any" | "no-route" | "self" | host | "{" host-list "}" | "route" string ) [ port ] @@ -2869,8 +2869,8 @@ tos = ( "lowdelay" | "throughput" | "reliability" | [ "0x" ] number ) state-opts = state-opt [ [ "," ] state-opts ] -state-opt = ( "max" number | "no-sync" | timeout | "sloppy" | "pflow" | - "source-track" [ ( "rule" | "global" ) ] | +state-opt = ( "max" number | "no-sync" | timeout | "sloppy" | + "pflow" | "source-track" [ ( "rule" | "global" ) ] | "max-src-nodes" number | "max-src-states" number | "max-src-conn" number | "max-src-conn-rate" number "/" number | -- cgit v1.2.3