=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/41.html,v retrieving revision 1.29 retrieving revision 1.30 diff -c -r1.29 -r1.30 *** www/41.html 2007/03/06 16:33:39 1.29 --- www/41.html 2007/03/06 17:03:53 1.30 *************** *** 124,163 ****
  • syslogd(8) can now pipe logs directly to other programs, making real-time log analysis easier.
  • the IP_RECVTTL ! ip(4) socket option allows programs to receive the incoming ttl on raw and udp sockets.
  • the IP_MINTTL ! ip(4) socket option allows programs to ask the kernel to discard any packets with a ttl smaller than the given one, for implementing the IP TTL security hack aka the Generalized TTL Security Mechanism specified in RFC 3682.
  • multiple, independent routing tables, with ! pf(4) acting as selector. ! route(8) can be told which table to work with now, and routing daemons have been modified to cope as well.
  • the ! pflog(4) interface is now clonable. ! pf(4) can log to multiple pflog interfaces now, each rule can specify which pflog interface to log to. ! pflogd(8) and ! spamlogd(8) can now be told which pflog interface to work with.
  • the ! pfsync(4) interface is now clonable as well, thus only there when actually needed.
  • ! pfctl(8) can now expire table entries.
  • allow ! pf(4) rules inside anchors to have their counters reset, and make counter read & reset an atomic operation.
  • ! sensorsd(8) dampens status changes now, thus not alerting for a single wrong sensor read, since many sensors lie once in a while. --- 124,163 ----
  • syslogd(8) can now pipe logs directly to other programs, making real-time log analysis easier.
  • the IP_RECVTTL ! ip(4) socket option allows programs to receive the incoming ttl on raw and udp sockets.
  • the IP_MINTTL ! ip(4) socket option allows programs to ask the kernel to discard any packets with a ttl smaller than the given one, for implementing the IP TTL security hack aka the Generalized TTL Security Mechanism specified in RFC 3682.
  • multiple, independent routing tables, with ! pf(4) acting as selector. ! route(8) can be told which table to work with now, and routing daemons have been modified to cope as well.
  • the ! pflog(4) interface is now clonable. ! pf(4) can log to multiple pflog interfaces now, each rule can specify which pflog interface to log to. ! pflogd(8) and ! spamlogd(8) can now be told which pflog interface to work with.
  • the ! pfsync(4) interface is now clonable as well, thus only there when actually needed.
  • ! pfctl(8) can now expire table entries.
  • allow ! pf(4) rules inside anchors to have their counters reset, and make counter read & reset an atomic operation.
  • ! sensorsd(8) dampens status changes now, thus not alerting for a single wrong sensor read, since many sensors lie once in a while. *************** *** 643,649 **** alt="OpenBSD"> www@openbsd.org
    ! $OpenBSD: 41.html,v 1.29 2007/03/06 16:33:39 henning Exp $ --- 643,649 ---- alt="OpenBSD"> www@openbsd.org
    ! $OpenBSD: 41.html,v 1.30 2007/03/06 17:03:53 henning Exp $