David Marec wrote:
hi,

I am trying to get protftp running into a jail, avalaible from outside the host.

First, i wrote rules to redirect ftp traffic from ext_if to the jail and to nat jailled traffic to ext_if. After login, the data connection keeps being closed in passive mode; the active mode is running well.

then, i tried to use ftp-proxy, by adding the following entries into rc.conf:
 ftpproxy_enable="yes"
 ftpproxy_flags="-vv -R ftp.server.address -p 21 -b ext.if"

and followed the tutorial i found on the openbsd website:
http://www.openbsd.org/faq/pf/ftp.html

But, i can't even connect to the ftp server.

What is the right way to use ftp-proxy ?

Are you sure you need ftp-proxy?
I have ProFTPd in jail on private IP bidirectional NATed by PF 1:1 to public IP with following rules:

binat on $ext_if from $jail_addr_1 to any -> $ext_addr_1

## pass incoming in to jails (from outside world)
## The filter engine will see the IP packet as it looks after translation has taken place pass in on $ext_if inet proto tcp from any to $jail_addr_1 port $jail_tcp_1_inports

## pass in/out (both directions) on jail interface (operations inside jail)
pass on $jail_if inet from $jail_addr_1 to $jail_addr_1

## passive FTP transfer - highports - for FTP in Jail (must use MasqueradeAddress in proftpd.conf) pass in on $ext_if inet proto tcp from any to $jail_addr_1 port 54000 >< 55000 keep state


And in proftpd.conf I have:

# If Jail has NATed local IP address
MasqueradeAddress       1.2.3.4
PassivePorts            54000 55000

(1.2.3.4 is public IP address on which FTP will be accessible)

You do not need 1:1 mapping, you can use NAT + RDR rules to redirect just some port range in to you jail.

Miroslav Lachman
_______________________________________________
[email protected] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-pf
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to