From mboxrd@z Thu Jan 1 00:00:00 1970 From: Rocco Stanzione Subject: MARK matching Date: Sat, 14 Dec 2002 02:49:21 -0600 Sender: netfilter-admin@lists.netfilter.org Message-ID: <200212140249.21687.iptables@linuxkungfu.org> Reply-To: grasshopper@linuxkungfu.org Mime-Version: 1.0 Content-Transfer-Encoding: quoted-printable Return-path: Errors-To: netfilter-admin@lists.netfilter.org List-Help: List-Post: List-Subscribe: , List-Id: List-Unsubscribe: , List-Archive: Content-Type: text/plain; charset="us-ascii" To: netfilter@lists.netfilter.org Group: I don't like the idea of allowing all traffic destined for the external I= P on=20 the external interface on a machine that doubles as a firewall and a serv= er. =20 But I have a webmail interface that doesn't work unless I do just that. = What=20 I want to know is, is it valid to use the MARK target on these packets on= =20 their way 'out' so that they can be recognized as not having been spoofed= ? I=20 haven't seen any documentation on using it like this, and I wonder if thi= s is=20 a viable solution, or if anyone has a better idea. Thanks, Rocco