Re: Unexpected port change inside STUN packet

2009-07-25 Thread John Blaze
Amazing, I can't believe it was something so simple.
Thank you both for the response, now the PS3 is working as it should

On 7/25/09, TorbjC8rn H. Orskaug  wrote:
> I had this issue with my PS3 aswell. Adding a rule like
>
>  nat on $ext_if from $ps3 to any -> ($ext_if) static-port
>
>  solved the issue on my end, YMMV. Apparently the ps3 didn't like
>  it if pf altered the source port in its packets.
>


--
Allegari nihil et allegatum non probare, paria sunt.



Re: PF: 3 NICS. 1 WAN, 2 LAN. How to manage each LAN open ports individually?

2009-07-25 Thread Andres Salazar
I apologize that my ruleset isnt very clear. Iam trying to put together a
ruleset that will allow the following access:

Outbound port 80 (web) & 53 (domain) from users at $int_if via $ext_if
Outbound port 80 (web) & 53 (domain) & 443 (ssl) & 22 (ssh) from $int_if2
via $ext_if

Thank you for the help.

Andres



Re: PF: 3 NICS. 1 WAN, 2 LAN. How to manage each LAN open ports individually?

2009-07-25 Thread Jason Dixon
On Sun, Jul 26, 2009 at 12:58:08AM -0500, Andres Salazar wrote:
> I apologize that my ruleset isnt very clear. Iam trying to put together a
> ruleset that will allow the following access:
> 
> Outbound port 80 (web) & 53 (domain) from users at $int_if via $ext_if
> Outbound port 80 (web) & 53 (domain) & 443 (ssl) & 22 (ssh) from $int_if2
> via $ext_if

Here's a basic ruleset that meets your requirements.  Hasn't been tested
for syntax.  Note that I make no effort to filter traffic between the
two internal segments.  This would require a different approach (no set
skip on internal if's, pass in on the internal if's explicitly).  There
are also no "pass out" rules for traffic originating from the firewall
itself, you'll probably want to add something for this.


ext_if = "re1"  

int_if = "re0"  

int_if2 = "re2" 


set skip on { lo $int_if $int_if2 }

scrub in

nat on $ext_if inet proto { tcp udp } from $int_if:network to any \
-> ($ext_if)
nat on $ext_if inet proto { tcp udp } from $int_if2:network to any \
-> ($ext_if)

block all
pass out on $ext_if inet proto tcp from $int_if:network to any \
port { 53 80 }
pass out on $ext_if inet proto udp from $int_if:network to any \
port 53
pass out on $ext_if inet proto tcp from $int_if2:network to any \
port { 22 53 80 443 }
pass out on $ext_if inet proto udp from $int_if2:network to any \
port 53


-- 
Jason Dixon
DixonGroup Consulting
http://www.dixongroup.net/



Re: PF: 3 NICS. 1 WAN, 2 LAN. How to manage each LAN open ports individually?

2009-07-25 Thread patrick keshishian
On Sat, Jul 25, 2009 at 9:23 PM, Jason Dixon wrote:
> On Sat, Jul 25, 2009 at 09:41:45PM -0500, Andres Salazar wrote:
>> Hello OpenBSD-misc,
>>
>> I have a newbie question in pf that Ive been trying to debug on what would
>> be wrong with my ruleset. Iam trying to have the users that are on $int_if
>> only have ports 80 & 52 opened out, and users on $int_if be able to have
>> less restrictions and more ports out. So far I have something like this
but
>> it isnt working:
>
> Allow me to be the first to say "RTFAQ".
>
>> ext_if = "re1"
>> int_if = "re0"
>> int_if2 = "re2"
>>
>>
>> set skip on lo
>>
>> scrub in
>>
>> nat on re1 from re0:network to any -> re1
>> nat on re1 from re2:network to any -> re1
>>
>> block all
>> pass quick on $ext_if // I have added this so that the firewall itself has
>> full internet access
>> #pass in quick on $int_if
>
> Here you're blocking all by default (inbound and outbound on all
> interfaces), but then you immediately "pass quick" (outbound *and*
> inbound) on your external interface. B Very wrong.
>
>> pass out log quick on $ext_if inet proto { tcp, udp } from ($ext_if) to
any
>> \
>> B  B  B port 53 keep state
>>
>> pass out log quick on $ext_if inet proto { tcp } from ($ext_if) to any \
>> B  B  B port 80 keep state
>
> Here you're passing outbound on your external interface for DNS and http
> traffic. B But a) you've already allowed everything on $ext_if so this is
> unnecessary, and b) you've never allowed any traffic from your internal
> interfaces.
>
> Honestly, I don't know *what* you're trying to accomplish because your
> description doesn't match anything in your ruleset. B Perhaps you can
> describe again what you're trying to do and what the differences are
> supposed to be between $int_if and $int_if2.

I think he has a few typos in his email that cause confusion. I think
what he wants is something like the following, which is not tested,
and I know this is a copout, but I'm tired and should not be doing
this:

/
--\
ext_if = "re1"
int_if = "re0"  # only ports 53 and 80 allowed out
int_if2 = "re2" # no restrictions on outbound traffic

set skip on lo
match in all scrub (no-df)  # XXX

# XXX I do not use NAT so leaving this to the experts
nat on re1 from re0:network to any -> re1
nat on re1 from re2:network to any -> re1

block all
pass out
pass in on $int_if2
pass in log on $int_if inet proto { tcp, udp } from any to any port { 53, 80
}
\
--/

He may need finer control over who from $int_if2 is allowed access to
the firewall.

--patrick



Re: PF: 3 NICS. 1 WAN, 2 LAN. How to manage each LAN open ports individually?

2009-07-25 Thread Jason Dixon
On Sat, Jul 25, 2009 at 09:41:45PM -0500, Andres Salazar wrote:
> Hello OpenBSD-misc,
> 
> I have a newbie question in pf that Ive been trying to debug on what would
> be wrong with my ruleset. Iam trying to have the users that are on $int_if
> only have ports 80 & 52 opened out, and users on $int_if be able to have
> less restrictions and more ports out. So far I have something like this but
> it isnt working:

Allow me to be the first to say "RTFAQ".
 
> ext_if = "re1"
> int_if = "re0"
> int_if2 = "re2"
> 
> 
> set skip on lo
> 
> scrub in
> 
> nat on re1 from re0:network to any -> re1
> nat on re1 from re2:network to any -> re1
> 
> block all
> pass quick on $ext_if // I have added this so that the firewall itself has
> full internet access
> #pass in quick on $int_if
 
Here you're blocking all by default (inbound and outbound on all
interfaces), but then you immediately "pass quick" (outbound *and*
inbound) on your external interface.  Very wrong.
 
> pass out log quick on $ext_if inet proto { tcp, udp } from ($ext_if) to any
> \
>  port 53 keep state
> 
> pass out log quick on $ext_if inet proto { tcp } from ($ext_if) to any \
>  port 80 keep state

Here you're passing outbound on your external interface for DNS and http
traffic.  But a) you've already allowed everything on $ext_if so this is
unnecessary, and b) you've never allowed any traffic from your internal
interfaces.

Honestly, I don't know *what* you're trying to accomplish because your
description doesn't match anything in your ruleset.  Perhaps you can
describe again what you're trying to do and what the differences are
supposed to be between $int_if and $int_if2.

-- 
Jason Dixon
DixonGroup Consulting
http://www.dixongroup.net/



PF: 3 NICS. 1 WAN, 2 LAN. How to manage each LAN open ports individually?

2009-07-25 Thread Andres Salazar
Hello OpenBSD-misc,

I have a newbie question in pf that Ive been trying to debug on what would
be wrong with my ruleset. Iam trying to have the users that are on $int_if
only have ports 80 & 52 opened out, and users on $int_if be able to have
less restrictions and more ports out. So far I have something like this but
it isnt working:

ext_if = "re1"
int_if = "re0"
int_if2 = "re2"


set skip on lo

scrub in

nat on re1 from re0:network to any -> re1
nat on re1 from re2:network to any -> re1

block all
pass quick on $ext_if // I have added this so that the firewall itself has
full internet access
#pass in quick on $int_if


pass out log quick on $ext_if inet proto { tcp, udp } from ($ext_if) to any
\
 port 53 keep state

pass out log quick on $ext_if inet proto { tcp } from ($ext_if) to any \
 port 80 keep state


I appreciate the help...

Andres



Sun Sparc64 problems

2009-07-25 Thread Duncan Patton a Campbell
Howdy?

I recently got hold of an Ultra-5 with 128mb.  By various
means I've managed to upgrad the prom to "*latest" and
everything appeared to install ok.  So now I simply 
cannot boot from the IDE disk I installed it on. 

I can boot from the install cd and mount this disk
as can be seen from the included files (seperated 
here with the token asdf are devls.txt, disklabel.txt, 
dmesg.txt, ifconfig-a.txt, mount.txt)

If anyone can shed some light on this for me I'd appreciate it.

Thanks,

Dhu

devls.txt

total 20
-rw-r--r--  1 root  wheel 9297 Mar  1 01:22 MAKEDEV
crw---  1 root  wheel 120,   0 Mar  1 01:22 bio
crw---  1 root  wheel 105,   0 Mar  1 01:22 bpf0
brw-r-  1 root  operator   18,   0 Mar  1 01:22 cd0a
brw-r-  1 root  operator   18,   2 Mar  1 01:22 cd0c
crw---  1 root  wheel   0,   0 Jul 26 00:48 console
crw-rw  1 root  operator   18,   3 Mar  1 01:22 enrst0
brw-rw  1 root  operator   11,   3 Mar  1 01:22 enst0
crw-rw  1 root  operator   18,   2 Mar  1 01:22 erst0
brw-rw  1 root  operator   11,   2 Mar  1 01:22 est0
brw-r-  1 root  operator   16,   0 Mar  1 01:22 fd0a
brw-r-  1 root  operator   16,   1 Mar  1 01:22 fd0b
brw-r-  1 root  operator   16,   2 Mar  1 01:22 fd0c
brw-r-  1 root  operator   16,   8 Mar  1 01:22 fd0i
crw---  1 root  wheel  16,   0 Mar  1 01:22 klog
crw-r-  1 root  kmem3,   1 Mar  1 01:22 kmem
crw-r-  1 root  kmem   76,   0 Mar  1 01:22 ksyms
crw-r-  1 root  kmem3,   0 Mar  1 01:22 mem
crw-rw  1 root  operator   18,   1 Mar  1 01:22 nrst0
brw-rw  1 root  operator   11,   1 Mar  1 01:22 nst0
crw-rw-rw-  1 root  wheel   3,   2 Mar  1 01:22 null
crw-r-  1 root  kmem   70,   0 Mar  1 01:22 openprom
crw-r-  1 root  operator   58,   0 Mar  1 01:22 rcd0a
crw-r-  1 root  operator   58,   2 Mar  1 01:22 rcd0c
brw-r-  1 root  operator5,   0 Mar  1 01:22 rd0a
brw-r-  1 root  operator5,   2 Mar  1 01:22 rd0c
crw-r-  1 root  operator   54,   0 Mar  1 01:22 rfd0a
crw-r-  1 root  operator   54,   1 Mar  1 01:22 rfd0b
crw-r-  1 root  operator   54,   2 Mar  1 01:22 rfd0c
crw-r-  1 root  operator   54,   8 Mar  1 01:22 rfd0i
crw-r-  1 root  operator   61,   0 Mar  1 01:22 rrd0a
crw-r-  1 root  operator   61,   2 Mar  1 01:22 rrd0c
crw-r-  1 root  operator   17,   0 Mar  1 01:22 rsd0a
crw-r-  1 root  operator   17,   1 Mar  1 01:22 rsd0b
crw-r-  1 root  operator   17,   2 Mar  1 01:22 rsd0c
crw-r-  1 root  operator   17,   3 Mar  1 01:22 rsd0d
crw-r-  1 root  operator   17,   4 Mar  1 01:22 rsd0e
crw-r-  1 root  operator   17,   5 Mar  1 01:22 rsd0f
crw-r-  1 root  operator   17,   6 Mar  1 01:22 rsd0g
crw-r-  1 root  operator   17,   7 Mar  1 01:22 rsd0h
crw-r-  1 root  operator   17,   8 Mar  1 01:22 rsd0i
crw-r-  1 root  operator   17,   9 Mar  1 01:22 rsd0j
crw-r-  1 root  operator   17,  10 Mar  1 01:22 rsd0k
crw-r-  1 root  operator   17,  11 Mar  1 01:22 rsd0l
crw-r-  1 root  operator   17,  12 Mar  1 01:22 rsd0m
crw-r-  1 root  operator   17,  13 Mar  1 01:22 rsd0n
crw-r-  1 root  operator   17,  14 Mar  1 01:22 rsd0o
crw-r-  1 root  operator   17,  15 Mar  1 01:22 rsd0p
crw-r-  1 root  operator   17,  16 Mar  1 01:22 rsd1a
crw-r-  1 root  operator   17,  17 Mar  1 01:22 rsd1b
crw-r-  1 root  operator   17,  18 Mar  1 01:22 rsd1c
crw-r-  1 root  operator   17,  19 Mar  1 01:22 rsd1d
crw-r-  1 root  operator   17,  20 Mar  1 01:22 rsd1e
crw-r-  1 root  operator   17,  21 Mar  1 01:22 rsd1f
crw-r-  1 root  operator   17,  22 Mar  1 01:22 rsd1g
crw-r-  1 root  operator   17,  23 Mar  1 01:22 rsd1h
crw-r-  1 root  operator   17,  24 Mar  1 01:22 rsd1i
crw-r-  1 root  operator   17,  25 Mar  1 01:22 rsd1j
crw-r-  1 root  operator   17,  26 Mar  1 01:22 rsd1k
crw-r-  1 root  operator   17,  27 Mar  1 01:22 rsd1l
crw-r-  1 root  operator   17,  28 Mar  1 01:22 rsd1m
crw-r-  1 root  operator   17,  29 Mar  1 01:22 rsd1n
crw-r-  1 root  operator   17,  30 Mar  1 01:22 rsd1o
crw-r-  1 root  operator   17,  31 Mar  1 01:22 rsd1p
crw-r-  1 root  operator   17,  32 Mar  1 01:22 rsd2a
crw-r-  1 root  operator   17,  33 Mar  1 01:22 rsd2b
crw-r-  1 root  operator   17,  34 Mar  1 01:22 rsd2c
crw-r-  1 root  operator   17,  35 Mar  1 01:22 rsd2d
crw-r-  1 root  operator   17,  36 Mar  1 01:22 rsd2e
crw-r-  1 root  operator   17,  37 Mar  1 01:22 rsd2f
crw-r-  1 root  operator   17,  38 Mar  1 01:22 rsd2g
crw-r-  1 root  operator   17,  39 Mar  1 01:22 rsd2h
crw-r-  1 root  operator   17,  40 Mar  1 01:22 rsd2i
crw-r-  1 root  operator   17,  41 Mar  1 01:22 rsd2j
crw-r-  1 root  operator   17,  42 Mar  1 01:22 rsd2k
crw-r-  1 root  operator   17,  43 Mar  1 01:22 rsd2l
crw-r-  1 root  operator   17,  44 Mar  1 01:22 rsd2m
crw-r-  1 root  op

Re: man pages conflict or clarification for mount_vnd, newfs and man 5 disklabel

2009-07-25 Thread Jason McIntyre
On Sun, Jul 26, 2009 at 04:44:45AM +1100, leon zadorin wrote:
> Man page for mount_vnd states:
> "
> The `c' partition of a vnd image should not be used.  When a superblock
>  becomes damaged, fsck_ffs(8) needs information contained in the disklabel
>  to determine the location of alternate superblocks.  This information is
>  not available when directly using the `c' partition, so checking the file
>  system image will fail.
> "
> 
> Also, the man page for newfs states:
> "
> Before running newfs or mount_mfs, the disk must be labeled using
>  disklabel(8).  newfs builds a file system on the specified special de-
>  vice, basing its defaults on the information in the disk label.
> "
> 
> But... the man 5 disklabel states:
> "
> Note that when a disk has no real BSD disklabel the kernel creates a de-
>  fault label so that the disk can be used.
> "
> 
> And indeed, it would appear (or may be my brain is getting sleepy)
> that, running newfs on a device (such as svnd0c or vnd0c) which has no
> disklabel installed explicitly does work ok...
> ... now --  if, as man page for mount_vnd states, fsck_ffs needs
> disklabel info when superblock is damaged -- why would it have any
> trouble getting the default label that kernel creates for the "disk"
> automatically as per man 5 disklabel quote above (the very same info,
> I presume that newfs uses when initializing the fs initially on an
> image with no explicit label)?
> 

again, i can't help much here.

but creating a disklabel for the first time might be different to using an
existing disklabel. so it could be, as the man page suggests, that the
alternate superblock info is gleaned after the disk is in use.

i dunno. anyone else?

jmc



Re: vnconfig vs swapctl for regular files

2009-07-25 Thread Jason McIntyre
On Sun, Jul 26, 2009 at 03:25:48AM +1100, leon zadorin wrote:
> 
> In other words what are the advantages to using vnconfig for swapping
> as opposed to just calling swapctl/swapon directly on a regular file?
> Moreover, fstab also takes regular file for swap partitions just fine
> and subsequent (implicit) call to swapon also appears to work just
> fine...
> 
> Does it have to do, may be, with earlier versions of swapctl not
> working with regular files... or some other historical differences in
> the early days?
> 

i don't have any answers here...

first off, swapctl is a bit ambiguous in referring to "swap devices and
files". i'm guessing the document was corrected when it was noted that
files could be used as well as devices for swap, but i could be off the
money.

then the vnd thing...maybe a relic from when swap was not encrypted by
default. again i'm not sure.

maybe someone can step in here and we can clear up the docs.
jmc



Re: English and Spanish keyboard at same time?

2009-07-25 Thread Daniel Gracia Garallar

Are you working with X, or shell only?

Dani

Chris Bennett escribis:

I do most of my work in English, but I also do a small amount in Spanish.
I have a Spanish keyboard, but when I tried hooking it up, didn't get 
what was on keys.


Is there any way to change this dynamically so that I can switch back 
and forth easily?


Chris Bennett




Re: ddclient man page ?

2009-07-25 Thread Ingo Schwarze
Hi Jean-Francois,

jean-francois wrote on Sat, Jul 25, 2009 at 10:11:40PM +0200:

> Am I allowed to assume that there is no security flaw within such
> little peace of software?

No, small software can have security flaws, too.

But in this particular case, what exactly do you fear?

 - You do not need to run ddclient as a privileged user.
   So, compromising your system is very improbable.
   If you want to be paranoid, you can create a _ddclient
   user having write access to no files except /var/db/ddclient
   and use that one to run the ddclient daemon.
 - Information disclosure?
   The whole point of ddclient is publishing your IP address,
   so that's certainly not sensitive data.  Any other sensitive data
   on your system should not be readable by random users, anyway.
 - Denial of service?
   Well, if your DynDNS provider chooses to, he can delete your
   account any time he wants, and then you won't be reachable via
   DNS any more.  So, in case ddclient fails to update your address,
   that's no worse than the risk you are running when using dynamic
   DNS in the first place.

So, dynamic DNS is not a concept you typically use for security-critical
applications, and i don't think ddclient needs to cause major headaches
security-wise, as long as you don't run it as root or some other
privileged user, which you really shouldn't be doing.

Yours,
  Ingo



Re: ddclient man page ?

2009-07-25 Thread jean-francois
Thanks for this answer.
Am I allowed to assume that there is no security flaw within such little
peace of software ?

Le samedi 25 juillet 2009 C  18:16 +0200, Ingo Schwarze a C)crit :
> Hi Jean-Francois,
> 
> > Is this wise to use ddclient according to one's experience,
> 
> Well, ddclient is rather low quality Perl code, but it does its job.
> 
> Actually, regarding a DynDNS client, the quality of the code is less
> important than the care it takes to avoid unnecessary updates, such
> that you don't get banned by your DynDNS provider for performing
> bogus updates and contributing to useless server load on their side.
> In that respect, ddclient is so good that it is the number one
> recommended client by dyndns.org.
> 
> > or which dyn dns client is recommended within openbsd if else ?
> 
> I don't think the choice of your DynDNS client needs to depend that
> much on the operating system you use.  On OpenBSD, ddclient runs well,
> and the port is up to date and maintained (by Joerg Zinke).
> So i would say, just go ahead and use it.
> 
> > I can't find details about ddclient such as a man page ?
> 
> No, last time i checked, there wasn't any manual page or other
> stand-alone documentation.
> 
> > Do we have to guess with the only ddclient.conf ?
> 
> Yes, the sample configuration file is meant to be self-documenting,
> and indeed, nearly everything you need to know is contained in there.
> In case you do want to know more, read the ddclient Perl script itself,
> it is very short.
> 
> Yours,
>   Ingo



Summer Sale on Personalized Drinkware!

2009-07-25 Thread BargainMugs.com
BargainMugs.com Summer Sales & Specials














CoffeeMugs |
GlassMugs |
Stemware|
Pubware|
CandyJars |
SpringWater |
SportsBottles |
TravelMugs |
PictureMugs

) 2009 Bargainmugs.com
PO Box 523 Cazenovia, NY13035
Call us at 1.866.632.2188
supp...@bargainmugs.com


To unsubscribe from BargainMugs.com Sales & Specials and
othermarketing-related communications from BargainMugs.com, reply with
"Remove"as the subject line.



Re: Unexpected port change inside STUN packet

2009-07-25 Thread Torbjørn H . Orskaug
I had this issue with my PS3 aswell. Adding a rule like

nat on $ext_if from $ps3 to any -> ($ext_if) static-port

solved the issue on my end, YMMV. Apparently the ps3 didn't like
it if pf altered the source port in its packets.



man pages conflict or clarification for mount_vnd, newfs and man 5 disklabel

2009-07-25 Thread leon zadorin
Man page for mount_vnd states:
"
The `c' partition of a vnd image should not be used.  When a superblock
 becomes damaged, fsck_ffs(8) needs information contained in the disklabel
 to determine the location of alternate superblocks.  This information is
 not available when directly using the `c' partition, so checking the file
 system image will fail.
"

Also, the man page for newfs states:
"
Before running newfs or mount_mfs, the disk must be labeled using
 disklabel(8).  newfs builds a file system on the specified special de-
 vice, basing its defaults on the information in the disk label.
"

But... the man 5 disklabel states:
"
Note that when a disk has no real BSD disklabel the kernel creates a de-
 fault label so that the disk can be used.
"

And indeed, it would appear (or may be my brain is getting sleepy)
that, running newfs on a device (such as svnd0c or vnd0c) which has no
disklabel installed explicitly does work ok...
... now --  if, as man page for mount_vnd states, fsck_ffs needs
disklabel info when superblock is damaged -- why would it have any
trouble getting the default label that kernel creates for the "disk"
automatically as per man 5 disklabel quote above (the very same info,
I presume that newfs uses when initializing the fs initially on an
image with no explicit label)?

For example, wrt alternate superblock issues during fskc, the man page
for newfs says:
"
 -S sector-size
 The size of a sector in bytes (almost never anything but
 512).  Changing this is useful only when using newfs to build
 a file system whose raw image will eventually be used on a
 different type of disk than the one on which it is initially
 created (for example on a write-once disk).  Note that chang-
 ing this from its default will make it impossible for fsck(8)
 to find the alternate superblocks if the standard superblock
 is lost.
"

Now, if the default disklabel (created by kernel, on the fly so to
speak) provides info for the sector size (which is used by newfs
during initializing, and by fsck when checking/restoring/fixing, the
fs) then why would it still be bad to use the "c" partition of
svnd/vnd?

Kind regards
Leon.



vnconfig vs swapctl for regular files

2009-07-25 Thread leon zadorin
Hi,

Man pages for vnconfig state that one of the useful things for "vnd"
devices (not svnd ones) is to make them be used for swap.

Given that vnconfig associates a vnd device with a regular file -- the
above comments reduce to allowing one to use regular file as a swap
space... only... why would one do all of this when swapctl/swapon
accept regular file as arg anyway?

In other words what are the advantages to using vnconfig for swapping
as opposed to just calling swapctl/swapon directly on a regular file?
Moreover, fstab also takes regular file for swap partitions just fine
and subsequent (implicit) call to swapon also appears to work just
fine...

Does it have to do, may be, with earlier versions of swapctl not
working with regular files... or some other historical differences in
the early days?

Also, if there is no distinct advantage of using vnconfig's vnd for
swap (vs swapctl)... what other uses are there for explicit '/dev/vnd'
(not 'svnd') devices?

Kind regards
Leon.



Unexpected port change inside STUN packet

2009-07-25 Thread John Blaze
Hi all, I've been using OpenBSD as a gateway for quite a while now and
recently I got a PS3, so I decided to connect it to the network.
Unfortunately, it kept complaining that I had a restrictive type of
NAT and that other people would not be able to connect to me. At
first, I thought it was some problem with my router, but when I
connected the PS3 directly to the router all connection tests were
successful, so I tried this very simple pf.conf:

#
ext_if = "rl0"
int_if = "rl1"
#
ps3 = "10.0.0.8"
#
nat on $ext_if from $int_if:network to any -> ($ext_if)
#
rdr on $ext_if proto udp from any to ($ext_if) port 1:65535 -> $ps3 port 1:65535
#
pass all
#

Even with that I was getting a restrictive type of NAT, so I decide to
capture the packets being sent and received by the PS3 when it was
doing the connection test both when connected directly to the router
and when connected to the OpenBSD box.
After comparing the packets I noticed something that could be the
cause of the connection error.
This is a packet when the connection is successful

No. TimeSourceDestination   Protocol Info
171 33.894835   198.107.158.129   192.168.1.3   STUN
  Message: Binding Response

Frame 171 (122 bytes on wire, 122 bytes captured)
Ethernet II, Src: D-Link_e1:b9:00 (00:1b:11:e1:b9:00), Dst:
SonyComp_96:61:25 (00:1f:a7:96:61:25)
Internet Protocol, Src: 198.107.158.129 (198.107.158.129), Dst:
192.168.1.3 (192.168.1.3)
User Datagram Protocol, Src Port: stun (3478), Dst Port: 50526 (50526)
Source port: stun (3478)
Destination port: 50526 (50526)
Length: 88
Checksum: 0xe9db [validation disabled]
[Good Checksum: False]
[Bad Checksum: False]
Simple Traversal of UDP Through NAT
[Request In: 170]
[Time: 0.140815000 seconds]
Message Type: Binding Response (0x0101)
Message Length: 0x003c
Message Transaction ID: BCEA76A6F4EAEE3ABFEA173E40579CBC
Attributes
Attribute: SOURCE-ADDRESS
Attribute: CHANGED-ADDRESS
Attribute: XOR_MAPPED_ADDRESS
Attribute Type: XOR_MAPPED_ADDRESS (0x8020)
Attribute Length: 8
Protocol Family: IPv4 (0x0001)
Port (XOR-d): 31156
[Port: 50526]
IP (XOR-d): 117.178.149.236 (117.178.149.236)
[IP: 201.88.227.74 (201.88.227.74)]
Attribute: MESSAGE-INTEGRITY
#

And this is a packet when the connection fails
#
No. TimeSourceDestination   Protocol Info
162 36.836648   198.107.157.137   10.0.0.8  STUN
  Message: Binding Response

Frame 162 (122 bytes on wire, 122 bytes captured)
Ethernet II, Src: CnetTech_67:99:f8 (00:08:a1:67:99:f8), Dst:
SonyComp_96:61:25 (00:1f:a7:96:61:25)
Internet Protocol, Src: 198.107.157.137 (198.107.157.137), Dst:
10.0.0.8 (10.0.0.8)
User Datagram Protocol, Src Port: stun (3478), Dst Port: 50516 (50516)
Source port: stun (3478)
Destination port: 50516 (50516)
Length: 88
Checksum: 0x6f8f [validation disabled]
[Good Checksum: False]
[Bad Checksum: False]
Simple Traversal of UDP Through NAT
[Request In: 161]
[Time: 0.133701000 seconds]
Message Type: Binding Response (0x0101)
Message Length: 0x003c
Message Transaction ID: 0FDF0B74DA2676EC4751BFB3AE4CBAC2
Attributes
Attribute: SOURCE-ADDRESS
Attribute: CHANGED-ADDRESS
Attribute: XOR_MAPPED_ADDRESS
Attribute Type: XOR_MAPPED_ADDRESS (0x8020)
Attribute Length: 8
Protocol Family: IPv4 (0x0001)
Port (XOR-d): 50030
[Port: 52401]
IP (XOR-d): 198.135.232.62 (198.135.232.62)
[IP: 201.88.227.74 (201.88.227.74)]
Attribute: MESSAGE-INTEGRITY
#

On the successful packet the port number inside the XOR_MAPPED_ADDRESS
attribute is the same as the Destination port of the packet, on the
failed connection those ports are different.
What could be the cause of this?
Any help is appreciated.

I have posted the full packets here:
Request (Successful): http://paste2.org/p/337420
Response (Successful): http://paste2.org/p/337422
Request (Failure): http://paste2.org/p/337424
Response (Failure): http://paste2.org/p/337426

Thanks in advance

-- 
Allegari nihil et allegatum non probare, paria sunt.



Re: ddclient man page ?

2009-07-25 Thread Ingo Schwarze
Hi Jean-Francois,

> Is this wise to use ddclient according to one's experience,

Well, ddclient is rather low quality Perl code, but it does its job.

Actually, regarding a DynDNS client, the quality of the code is less
important than the care it takes to avoid unnecessary updates, such
that you don't get banned by your DynDNS provider for performing
bogus updates and contributing to useless server load on their side.
In that respect, ddclient is so good that it is the number one
recommended client by dyndns.org.

> or which dyn dns client is recommended within openbsd if else ?

I don't think the choice of your DynDNS client needs to depend that
much on the operating system you use.  On OpenBSD, ddclient runs well,
and the port is up to date and maintained (by Joerg Zinke).
So i would say, just go ahead and use it.

> I can't find details about ddclient such as a man page ?

No, last time i checked, there wasn't any manual page or other
stand-alone documentation.

> Do we have to guess with the only ddclient.conf ?

Yes, the sample configuration file is meant to be self-documenting,
and indeed, nearly everything you need to know is contained in there.
In case you do want to know more, read the ddclient Perl script itself,
it is very short.

Yours,
  Ingo



ddclient man page ?

2009-07-25 Thread jean-francois
Hello,

Is this wise to use ddclient according to one's experience, or which dyn
dns client is recommended within openbsd if else ?

I can't find details about ddclient such as a man page ?

Do we have to guess with the only ddclient.conf ?

Thanks



Re: /bsd: pf: wire key attach failed on all: 89 in wire

2009-07-25 Thread Mathieu Sauve-Frankel
On Mon, Jul 20, 2009 at 10:51:24AM +0200, Holger Glaess wrote:
> hi
> first all for the answer at my last question.
> 
> now can someone explain me what kind of error this is ?
> 
> Jul 17 05:59:56 sun-fw1 /bsd: pf: wire key attach failed on all: 89 in
> wire: xxx.xx.xxx.xxx 224.0.0.5 1:0
> 
> 
> carp wroks well but i had the problem that the rules dosen't really work,
> first after an pfctl -Fall -f pf.conf  seem'm to be ok ( the error was
> also gone ).

Just out of curiosity, would it be possible for you to post the relevant
hostname.carp* and related hostname.if* files for the physical interfaces
that are associated to the carp interfaces ? 

I am curious to see if you are running into an issue I ran across a short
while ago. Also, dmesg output from the machines in question would be very
useful ?

-- 
Mathieu Sauve-Frankel