Re: PF rule - am I being stupid ?

2018-09-05 Thread Bob Smith


> I think it is caused by the packets blocked having the RST flag set -- a
> consequence of specifying "flags S/SA" in rule @39. Check out man
> pf.conf. Look for section about "flags a/b | any" (line 317 here).

The S/SA wasn't set explicitly my me, its the default.

Out of interest, would this possibly be a PF behaviour change somewhere between 
6.1 and 6.3 ? I'm trying to troubleshoot a VoIP phone that has stopped 
functioning, and the only change has been an upgrade to 6.3.



Re: Equipment for OBSD based firewall

2018-09-05 Thread Bob Smith
I am a big fan of Decisio (https://www.deciso.com/product-catalog/)

Yes, it comes out of the box with "another BSD" preloaded, but you can easily 
take care of that in a few minutes courtesy of a USB console and a USB key with 
Mr de Raadt's opus magnum on it. ;-)




‐‐‐ Original Message ‐‐‐
On September 4, 2018 12:17 AM, Bogdan Kulbida  wrote:

> Ladies and gentlemen,
>
> I need to build a pf OBSD firewall for a small office. What minimally
> feasible equipment would you recommend in order to achieve this goal?
>
> Thank you!
>
> ---
>
> Best regards,
> Bogdan Kulbida
> Founder and CEO, Konstankino LLC http://konstankino.com
> +1.802.793.8295




PF rule - am I being stupid ?

2018-09-05 Thread Bob Smith
Hi,

I'm banging my head against a brick wall here trying to figure out why PF (on 
OpenBSD 6.3) is allowing some packets but blocking others ?

Here's the tcpdump:
Sep 05 18:07:45.084191 rule 39/(match) pass in on vlan108: 192.0.2.150.49156 > 
198.51.100.158.20001: udp 47
Sep 05 18:07:45.084220 rule 39/(match) pass out on em2: 192.0.2.150.49156 > 
198.51.100.158.20001: udp 47
Sep 05 18:08:01.136633 rule 39/(match) pass in on vlan108: 192.0.2.150.49157 > 
198.51.100.158.69: 47 RRQ "MainIp5340e.bin"
Sep 05 18:08:01.136661 rule 39/(match) pass out on em2: 192.0.2.150.49157 > 
198.51.100.158.69: 47 RRQ "MainIp5340e.bin"
Sep 05 18:08:25.607885 rule 11/(match) block in on vlan108: 192.0.2.150.6998 > 
198.51.100.158.6801: R 16764161:16764161(0) ack 209207857 win 4224 [tos 0x60]
Sep 05 18:08:27.919688 rule 11/(match) block in on vlan108: 192.0.2.150.6978 > 
198.51.100.158.6802: R 17473283:17473283(0) ack 3296254713 win 4224 [tos 0x60]
Sep 05 18:08:32.594889 rule 11/(match) block in on vlan108: 192.0.2.150.6930 > 
198.51.100.158.6800: R 18671363:18671363(0) ack 3527351279 win 4224 [tos 0x60]

Here are the rules concerned:
@11 block drop log all
@39 pass log quick inet from 192.0.2.150 to 198.51.100.158 flags S/SA



Re: OpenBGPD as route server - correct filter syntax ?

2018-08-30 Thread Bob Smith


Thanks for your reply.

>
> If you are configuring a route server, you don't want "route-collector yes".
> Or if you want a route collector, it won't advertise any route so your 
> concerns
> are null.


Interesting point. My understanding was that a route server did not make any 
best-path decisions and merely relayed what it was told ? That was my thinking 
behind "route-collector yes".

> This is not needed. Code says (rde_update.c L292) :
>
> if (peer == prefp)
> /* Do not send routes back to sender */
> return (0);
>

That's good news !




OpenBGPD as route server - correct filter syntax ?

2018-08-30 Thread Bob Smith
Hi,

I'm trying to figure out the most suitable config params transform OpenBGPD 
into a route server.

So far I have :
route-collector yes
transparent-as yes

But my concern is more in the area of suitable filters to prevent loops.

I'm thinking I need something along the lines of :

allow to any peer-as != neighbor-as

But any variation of the above that I try always ends up with a "bgpd -n -f" 
throwing a syntax error.

Ideas most welcome !

Thanks

Bob



browser security

2005-12-14 Thread Bob Smith
vmware recently released a program which kind of
chroot jails the browser.
http://www.vmware.com/vmtn/vm/browserapp.html

im not a programmer myself, but i was wondering
if perhaps using a similar technique we could lock
down the browsers in openbsd?

seems to me that would increase security greatly
for us who surf the web on openbsd boxes? or
am i mistaking?



Re: browser security

2005-12-14 Thread Bob Smith
thanks for the explanation.

so it would be less work to try to chroot a browser then to make a
virtual machine? perhaps its even a better way of isolating?

i googled around a bit and found some threads about people trying to
chroot their browsers, but i couldnt find any successful story. is it
practically doable?

looking at other troublesome programs; they come chooted by default on
openbsd. is there any effort being made by others than vmware to
isolate browsers?

seems to me like it would be a step in the right direction?

On 12/14/05, J. C. Roberts [EMAIL PROTECTED] wrote:
 On Wed, 14 Dec 2005 05:41:30 -0800, Bob Smith [EMAIL PROTECTED] wrote:

 vmware recently released a program which kind of
 chroot jails the browser.
 http://www.vmware.com/vmtn/vm/browserapp.html
 
 im not a programmer myself, but i was wondering
 if perhaps using a similar technique we could lock
 down the browsers in openbsd?
 
 seems to me that would increase security greatly
 for us who surf the web on openbsd boxes? or
 am i mistaking?

 You need to understand the tech being used a bit better. There's a big
 difference between a chroot/jail and a virtual machine. They both try to
 isolate an application from interacting with the rest of the system but
 the way the two go about it is vastly different.

 Obviously, isolation is a good thing but you need to understand that
 writing a complete virtual machine in C that works on all supported
 OpenBSD architectures is a *MASSIVE* amount of work.

 Even VMware supports only one architecture for their player (x86-32)
 and only two possible host operating systems on that architecture (linux
 and ms-windows).

 You may also want to realize that no attempted isolation is perfect.
 There are ways for attackers to break out of jails/chroots and similar
 is true for virtual machines. By using such methods you've only added a
 _layer_ of security which only stops _some_ (possibly many) attackers.
 It's not completely bullet proof (nothing is) but it does help.

 Kind Regards,
 JCR



Re: browser security - restricted user

2005-12-14 Thread Bob Smith
 Just a thought: sudo -u $some_restricted_user $your_preffered_browser  ?

good that you brought this up; i been wondering about this too.

does it help? if so how come there isnt a default non-privileged user
created for, say, firefox when the pkg is installed? like there is for
bitlbee (_bitlbee) or tcpdump (_tcpdump)?