olá pessoal, alguém pode me ajudar com o meu pf.conf? Eu uso no OS X, mas não estou conseguindo abrir as portas, obrigado desde já.
set block-policy drop set optimization aggressive set ruleset-optimization basic set timeout { interval 5, tcp.opening 20 } set timeout { frag 15, tcp.established 150 } set timeout { tcp.first 30, tcp.closing 15, tcp.closed 15, tcp.finwait 15 } set timeout { udp.first 30, udp.single 30, udp.multiple 30 } set timeout { other.first 30, other.single 30, other.multiple 30 } set timeout { adaptive.start 5000, adaptive.end 10000 } set skip on lo0 set debug none set limit frags 5000 set state-policy if-bound set require-order yes set fingerprints "/usr/local/sbin/pf.os" tcp_out = "{ ssh, smtp, domain, www, https, 67, 80, 443, 554, 1900, 4662, 548, 587, 993, 1863, 2158, 3689, ntp, ftp, ftp-data }" udp_out = "{ domain, ntp, 68, 123, 192, 554, 5353, 1900, 4672 }" tcp_in = "{ 80, 443, 548, 554, 3689, 1900, 4662 }" udp_in = "{ 123, 192, 554, 1900, 5353, 4672 }" martians = "{ 127.0.0.0/8, 192.168.0.0/16, 172.16.0.0/12, 10.0.0.0/8, 169.254.0.0/16, 192.0.2.0/24, 0.0.0.0/8, 240.0.0.0/4 }" scrub in all no-df random-id max-mss 1440 min-ttl 15 #match in all scrub (no-df max-mss 1440) #OpenBSD 4.6 if = "en0" #icmp_types="echoreq" block in pass out antispoof for $if inet # allow icmp #pass in inet proto icmp all icmp-type $icmp_types #block in on $if inet proto icmp from ! en0 to any icmp-type 8 code 0 # Ativa a proteção contra falsificações para todas as interfaces block in quick from urpf-failed # allow out #pass out on $if proto udp from any to any port $tcp_out #pass out on $if proto tcp from any to any port $udp_out # allow in #pass in on $if proto tcp from any to any port $tcp_in #pass in on $if proto udp from any to any port $udp_in # allow out #pass out quick inet proto udp from any to any port $tcp_out #pass out quick inet proto tcp from any to any port $udp_out # allow in #pass in quick inet proto tcp from any to any port $tcp_in #pass in quick inet proto udp from any to any port $udp_in # block scans com nmap block in quick proto tcp flags FUP/WEUAPRSF block in quick proto tcp flags WEUAPRSF/WEUAPRSF block in quick proto tcp flags SRAFU/WEUAPRSF block in quick proto tcp flags /WEUAPRSF block in quick proto tcp flags SR/SR block in quick proto tcp flags SF/SF block drop in quick on $if from any os { NMAP } pass on lo0 all ------------------------- Histórico: http://www.fug.com.br/historico/html/freebsd/ Sair da lista: https://www.fug.com.br/mailman/listinfo/freebsd