Linked by Thom Holwerda on Tue 9th Jun 2009 20:50 UTC, submitted by ZacharyM
OpenBSD "As seen here, PF is now enabled by default. The default pf.conf will now pass in all traffic, except for TCP port 6000 normally used by remote-X11. By having the X server still listen on port 6000 but let PF block incoming packets that aren't coming from localhost you can still use local X sessions that needs to talk to the TCP port or runs through a port forward from remote, but at the same time don't expose your machine on the network. Recent changes to PF, like having packet reassembly enabled on all packets by default, will now help clean incoming traffic."
Permalink for comment 367673
To read all comments associated with this story, please click here.
by Finchwizard on Tue 9th Jun 2009 23:15 UTC
Member since:

Considering OpenBSD always prided itself in being the most secure OS with it's default install (Mainly due to it rejecting everything and having all the services turned off) I find it very weird that it would enable PF to forward ALL incoming connections in by default.

To me, it just seems very weird to go against something they've been doing for so long.

Reply Score: 1