Hi again Kristof,

It appears you were right. ICMP flows through even with no rule set. I'm afraid
I'll have to build a custom kernel.

Thank you for your help,

Marin.

21 mars 2017 10:18 "Kristof Provost"  a écrit:

>  On 21 Mar 2017, at 9:43, Marin Bernard wrote: 
>  > Thanks for answering. Yes, I know that pf accepts rules mentioning 
>  > inexistent 
>  > interfaces. What puzzles me here is that my ruleset is actually 
>  > working. 
>  > With peer0 = 1.2.3.4 and peer1 = 5.6.7.8, the following ruleset works 
>  > as 
>  > expected: 
>  > 
>  > ----- 
>  > peers = "{1.2.3.4, 5.6.7.8}" 
>  > 
>  > set skip on lo 
>  > block all 
>  > 
>  > # Allow IKE 
>  > pass  in proto {tcp, udp} from $peers to self   port isakmp 
>  > pass out proto {tcp, udp} from self   to $peers port isakmp 
>  > 
>  > # Allow ICMPv4 echo requests only through IPsec 
>  > pass in on enc0 proto icmp from $peers to self icmp-type echoreq 
>  > ----- 
>  > 
>  > If there is no SA, it is impossible for a peer to ping another. As 
>  > soon 
>  > as IKE creates a SA, however, ping starts working. As you can see, 
>  > the last rule is explicitely bound to the inexistent enc0 interface, 
>  > and 
>  > yet is working fine. 
>  > 
>  Can you try without the enc0 rule? I suspect that what’s happening 
>  here is that 
>  the IPSec traffic is bypassing the firewall altogether. If that's the 
>  case the 
>  your traffic will still flow, even without the pass on enc0 rule. 
>  
>  If you want to filter on it it should work if you add ‘device enc’ 
>  to your 
>  kernel config. The man page suggests that should then allow you to 
>  filter IPSec 
>  traffic on enc0. 
>  
>  Regards, 
>  Kristof 



_______________________________________________
freebsd-pf@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-pf
To unsubscribe, send any mail to "freebsd-pf-unsubscr...@freebsd.org"

Reply via email to