pfsync after reboot does not synchronize

2006-06-05 Thread David DeSimone
h? The two cluster members have a direct cross-cable between them. My PF policy has these settings: set skip on pfsync0 pass quick on fxp0 proto pfsync # $pfsync_syncdev -- David DeSimone == Network Admin == [EMAIL PROTECTED] "It took me fifteen years to discover that I h

Re: pfsync after reboot does not synchronize

2006-06-05 Thread David DeSimone
lied. Note that the "set skip" is on the pfsync0 pseudo interface, while the "pass quick" is on the actual fxp0 interface. Is there a protocol other than pfsync that should be permitted on that interface? I didn't expect I'd see

Status of sasyncd for IPSEC?

2007-04-05 Thread David DeSimone
ine that racoon(8) would have to take on that role, and I am curious if any work has been done to facilitate this. If there is any further work needed, I would like to look into completing it, but I don't want to start from scratch unless I have to. Please let me know what info is available.

Re: Scrub problem

2007-04-14 Thread David DeSimone
dst mac, and 2 bytes for ethertype ipv4. 1500 + 6 + 6 + 2 = 1514. > pf silently (no log entries) drops last packets, because they never > reach the client: Maybe PF does not log the packets via pflog0 interface, but does it log anything via dmesg? Did you try setting a higher debug level via

Re: Packet Path Through PF (onec for each interface?)

2007-05-16 Thread David DeSimone
qualifier, you would need rules matching the inbound and outbound packets. I think you would find, if you go ahead and tried the above, that the second rule never sees any matches, because the first rule handles them and builds state which causes the second rule to never be used. - -- David DeSi

Re: Packet Path Through PF (onec for each interface?)

2007-05-16 Thread David DeSimone
e evaluation. It will perform this state evaluation TWICE, once for ingress, again for egress. - -- David DeSimone == Network Admin == [EMAIL PROTECTED] "It took me fifteen years to discover that I had no talent for writing, but I couldn't give it up because by that time I was too f

Re: fbsd 6.2 pf starts -- but not on boot

2007-06-05 Thread David DeSimone
quick on gpx0 all pass in on asdfiawe934 from 1.2.3.4 to 4.3.2.1 PF did not complain one bit about these nonsensical interface names, and "pfctl -sr" verifies that they do indeed remain in force, even though they have no chance of matching anything. - -- David DeSimone == Network Ad

Re: fbsd 6.2 pf starts -- but not on boot

2007-06-05 Thread David DeSimone
interface can affect whether a ruleset will load. However, the use of dynamic IP syntax (which seems a "best practice" in my mind, anyway) seems to avoid this condition nicely, among the other benefits it provides. - -- David DeSimone == Network Admin == [EMAIL PROTECTED] "I

Re: pf version 3.7 on freebsd

2007-06-15 Thread David DeSimone
o y.y.y.y port zz \ tag REDIRECT -> w.w.w.w pass in log quick on $EXT_IF all tagged REDIRECT - -- David DeSimone == Network Admin == [EMAIL PROTECTED] "It took me fifteen years to discover that I had no talent for writing, but I couldn't give it up becaus

Re: PF & altq benzedrine.cz prioritizing ACK packets

2007-07-02 Thread David DeSimone
the queue assignment for each packet, as described. - -- David DeSimone == Network Admin == [EMAIL PROTECTED] "It took me fifteen years to discover that I had no talent for writing, but I couldn't give it up because by that time I was too famous. -- Robert Benchley -

Re: Issue with PF on FreeBSD 6.2.5?

2007-07-05 Thread David DeSimone
all of the state entries from host1 to host2: # pfctl -k -k - -- David DeSimone == Network Admin == [EMAIL PROTECTED] "It took me fifteen years to discover that I had no talent for writing, but I couldn't give it up because by that time I was too famous. -- Robert

Re: Issue with PF on FreeBSD 6.2.5?

2007-07-05 Thread David DeSimone
not removed? - -- David DeSimone == Network Admin == [EMAIL PROTECTED] "It took me fifteen years to discover that I had no talent for writing, but I couldn't give it up because by that time I was too famous. -- Robert Benchley -BEGIN PGP SIGNATURE- Version: G

Re: Issue with PF on FreeBSD 6.2.5?

2007-07-05 Thread David DeSimone
e and destination IP's to be removed. There is probably a good way to integrate this into your scripts so that you don't have to perform the state removal manually; it can be done by the same script that is removing anchors from PF policy and such. - -- David DeSimone == Network Admin

Re: pf and proxy arp

2007-07-19 Thread David DeSimone
It should not be a problem that both firewalls respond to any arp request since they are serving the same information. - -- David DeSimone == Network Admin == [EMAIL PROTECTED] "It took me fifteen years to discover that I had no talent for writing, but I couldn't give it up becau

Re: Single IP failover without carpdev

2007-07-20 Thread David DeSimone
quot;carpdev" to assign a virtual public IP, but it seems that is not possible with FreeBSD. If I am wrong, I hope that someone will correct my understanding. - -- David DeSimone == Network Admin == [EMAIL PROTECTED] "It took me fifteen years to discover that I had no talent for wri

Re: Using PF + ALTQ in FreeBSD 6.2

2007-08-12 Thread David DeSimone
r can do to prevent hosts on the internet from sending traffic too fast. Once you have received the packets, it is too late to limit their arrival rate. - -- David DeSimone == Network Admin == [EMAIL PROTECTED] "It took me fifteen years to discover that I had no talent for writing, bu

Re: filtering local traffic on nat gateway

2007-09-26 Thread David DeSimone
ource IP of !($ext_if), so it will end up matching ALL traffic. - -- David DeSimone == Network Admin == [EMAIL PROTECTED] "It took me fifteen years to discover that I had no talent for writing, but I couldn't give it up because by that time I was too famous. -- Robert Bench

Re: NAT problem

2007-10-18 Thread David DeSimone
the destination port. Use "rdr" command instead of "nat". The documentation talks around and around this without actually saying it, but it is as simple as this: "nat" modifies the source IP / port. "rdr" modifies the destination IP / port. - -- David

Re: How to prevent FS overflow due to excessive logging?

2007-11-14 Thread David DeSimone
he first packet that gets dropped, which reduces logging considerably. However, you will not be alerted to the fact that millions of packets are being sent, in this scenario, so you would have to detect that via other means. - -- David DeSimone == Network Admin == [EMAIL PROTECTED] "This email mess

Re: use of ! in nat broken ?

2008-01-02 Thread David DeSimone
t on $ext_if from $server1 to any no nat on $ext_if from $server2 to any nat on $ext_if from $internal204 to any -> $officepublicIP and hopefully does what you want. - -- David DeSimone == Network Admin == [EMAIL PROTECTED] "This email message is intended for the us

Re: Forwarding another host

2008-01-09 Thread David DeSimone
must do this, the only way that comes to mind would be using a proxy of some sort, opening a secondary connection to the external host on behalf of the client. - -- David DeSimone == Network Admin == [EMAIL PROTECTED] "This email message is intended for the use of the person to whom it has

Re: Forwarding another host

2008-01-10 Thread David DeSimone
ou should more accurately diagram the current network layout and your desired layout so that we can tell you whether it will work. - -- David DeSimone == Network Admin == [EMAIL PROTECTED] "This email message is intended for the use of the person to whom it has been sent, and may contain inform

Re: Forwarding another host

2008-01-10 Thread David DeSimone
s to me it would be easier to get the PIX firewall to send traffic to HOSTB instead of HOSTA. If that device is outside your control, probably the easiest thing for you to do is set up a generic proxy, like "redir" or similar, to copy traffic over secondary connection to HOSTB. -

Re: Forwarding another host

2008-01-11 Thread David DeSimone
rections. I realize this is a FreeBSD mailng list, but you should go for the simplest solution, because complex solutions tend to fail in complex ways. - -- David DeSimone == Network Admin == [EMAIL PROTECTED] "This email message is intended for the use of the person to whom it has b

Re: pf how-to: Single public IP --> many private NAT'd HTTPS servers

2008-01-21 Thread David DeSimone
ser wanted to talk to, so it does not know which certificate should be sent. This is the reason why every SSL site must have its own unique (public) IP address. - -- David DeSimone == Network Admin == [EMAIL PROTECTED] "This email message is intended for the use of the person to whom it has

Re: pf how-to: Single public IP --> many private NAT'd HTTPS servers

2008-01-21 Thread David DeSimone
https://subversion.example.com:445/ You can have PF forward the correct port to the correct server. This allows the servers to be more independent of one another. - -- David DeSimone == Network Admin == [EMAIL PROTECTED] "This email message is intended for the use of the person to whom it

Re: How does /dev/pf get created?

2008-01-28 Thread David DeSimone
n order to make changes to it. That is just bizarre! - -- David DeSimone == Network Admin == [EMAIL PROTECTED] "This email message is intended for the use of the person to whom it has been sent, and may contain information that is confidential or legally protected. If you are not the intende

Re: Bacula File/Storage Connection Woes using PF

2008-03-28 Thread David DeSimone
> state too, though I don't know if FreeBSD pf supports that (OpenBSD > > pf does). Of course PF supports this, but "state" on a "stateless" connection is maintained purely with timers. When the timers expire, the state expires. - -- David DeSimone == Network Adm

Re: PF and State Table

2008-04-02 Thread David DeSimone
7;t understand this question. I think the question is asking for details on how PF state is stored in memory. I found a very nice struct pf_state in /usr/include/net/pfvar.h. - -- David DeSimone == Network Admin == [EMAIL PROTECTED] "This email message is intended for the use of the per

Re: a buildworld yeilds tcpdump oddness

2008-05-01 Thread David DeSimone
you capture a longer packet. With recent changes to PF, the default capture size (68 bytes as seen above) is insufficient. Try adding "-s128" to capture more of the packets and you should see an improvement. - -- David DeSimone == Network Admin == [EMAIL PROTECTED] "This email messag

Re: nat pass and state

2008-05-21 Thread David DeSimone
7;t match the rule (yet). You have to allow the connection in on $int_if first, then when it routes out $ext_if it will match the nat rule and set up state. - -- David DeSimone == Network Admin == [EMAIL PROTECTED] "This email message is intended for the use of the person to whom it has been sent,

Re: NAT problem with pppoe

2008-05-21 Thread David DeSimone
uot;pfctl -k" command to kill state entries that have to do with the IP that is being removed. - -- David DeSimone == Network Admin == [EMAIL PROTECTED] "This email message is intended for the use of the person to whom it has been sent, and may contain information that is confidenti

Re: PF occasionally "losing" packets

2008-05-28 Thread David DeSimone
is by running tcpdump on both the internal and external interface, and comparing traffic. - -- David DeSimone == Network Admin == [EMAIL PROTECTED] "This email message is intended for the use of the person to whom it has been sent, and may contain information that is confidential or legally prote

Re: New pf install on Freebsd7 seem to be a slow starter.

2008-07-09 Thread David DeSimone
atively, put these hostnames (and IP's) in your /etc/hosts file. - -- David DeSimone == Network Admin == [EMAIL PROTECTED] "This email message is intended for the use of the person to whom it has been sent, and may contain information that is confidential or legally protected.

Re: need help with keep state and shaping

2008-08-01 Thread David DeSimone
wn, you will want "floating." Otherwise, choose "if-bound" for security reasons. - -- David DeSimone == Network Admin == [EMAIL PROTECTED] "This email message is intended for the use of the person to whom it has been sent, and may contain information that is confidential

Re: syn flood, tcpdump readings

2008-08-07 Thread David DeSimone
; 1793916928:1793916928(0) win 16384 Since you went to the trouble of obscuring the source IP, I presume that the source IP is your IP. So, these look like responses, i.e. outbound traffic, not inbound, since they are sourced from your IP. You can use tcpdump's -e flag to be sure who is se

Re: pf and mxge

2008-08-29 Thread David DeSimone
is why PF in FreeBSD 7.0 add the "flags S/SA" and "keep state" options by default. Since this is the default, it is surprising to me that you would see this type of behavior, but it gives you something to look into. - -- David DeSimone == Network Admin == [EMAIL PROTECTED]

Re: bidirectional NAT in PF?

2008-09-06 Thread David DeSimone
the above, it appears that this may be possible because PF processes the rulebase twice for forwarded traffic; once on input, and again on output. If the inbound packet matched a "rdr" rule, and the outbound matched a "nat" rule, this would accomplish bidirectional NAT? Interesti

Re: bidirectional NAT in PF?

2008-09-06 Thread David DeSimone
(the source IP). In PF, you can use "nat" to translate the source IP, and "redir" to change the dest IP, but what if you want to change both? There is no direct way to do this, so I am wondering if two different rules could be matched at different times during the packet's

Re: FreeBSD 7.1-PRERELEASE Trouble

2008-09-08 Thread David DeSimone
3034 3811 4089 59b3 c322 > 0x0010: c30e 3215 0935 0035 0023 0314 8c1d 0100 > 0x0020: 0001 0565 6d69 6c73 0363 > 0x0030: 6f6d 0100 01 Even if PF causes the packet to be dropped, it will still show up on your inbound interface. You cannot

Re: FreeBSD 7.1-PRERELEASE Trouble

2008-09-09 Thread David DeSimone
ite direction to block replies, at least temporarily just to stop these state entries from being recreated. - -- David DeSimone == Network Admin == [EMAIL PROTECTED] "I don't like spinach, and I'm glad I don't, because if I liked it I'd eat it, and I just h

Re: pf not creating state on cloned local interface (with FreeBSD jail)

2008-09-10 Thread David DeSimone
this list (and experienced it myself) that "modulate state" does not work. But I don't really know why it doesn't work, and what behavior you should expect if you attempt to use it. I would suggest you try "keep state" instead, before proceeding further. - -- David

Re: Blocking udp flood trafiic using pf, hints welcome

2008-11-09 Thread David DeSimone
ay of yours) are clean and not doing anything they shouldn't be. It's easy to say that you did not set up anything bad on your systems, but can you really say with certainty that no one has broken into your systems and installed something you don't know about? -- David DeSimone

Re: Blocking udp flood trafiic using pf, hints welcome

2008-11-09 Thread David DeSimone
Eric Williams <[EMAIL PROTECTED]> wrote: > > David DeSimone wrote: > > You may want to consider adding "keep state" to your "block log" rules. > > Doesn't seem to work, it just gives "keep state on block rules doesn't > make sense&q

Re: duplicate nat rules listed by pfctl

2009-03-11 Thread David DeSimone
92.168.0.0/24 Also, don't you think you should put the "no nat" rule before the "nat" rules? -- David DeSimone == Network Admin == f...@verio.net "I don't like spinach, and I'm glad I don't, because if I liked it I'd eat it, and I just hate it.

Re: Can pfsync be used over router or WAN?

2009-05-08 Thread David DeSimone
rovide routing for a firewalled connection. A device far across a WAN doesn't seem like it would be able to provide redundant service. But that's up to your design, I suppose. Syncing across a LAN could make sense, but you will want to take steps to secure the traffic. -- David

Re: Connmark target

2009-06-08 Thread David DeSimone
gging considered part of the "state" that is kept in the state table? -- David DeSimone == Network Admin == f...@verio.net "I don't like spinach, and I'm glad I don't, because if I liked it I'd eat it, and I just hate it." -- Clarence Darrow This email

Re: sending mail with attachments always fails (FreeBSD/pf)

2009-11-21 Thread David DeSimone
wing it to update its TCP window tracking. As a result, short TCP sessions, such as those that fit within the default TCP window, can work okay, but longer sessions that go beyond that window will stall out and fail. -- David DeSimone == Network Admin == f...@verio.net "I don't like spina

Re: sending mail with attachments always fails (FreeBSD/pf)

2009-11-23 Thread David DeSimone
ivate. The public interface connects only to your router, while the private interface connects to all your firewall clients. This forces the firewall to be the only path to and from the network, giving enhanced security. -- David DeSimone == Network Admin == f...@verio.net "I don't like

Re: pf vs. afp

2009-12-26 Thread David DeSimone
es to block (quick) port 548 (part of $bad_ports), so your rules that occur later cannot allow that port. -- David DeSimone == Network Admin == f...@verio.net "I don't like spinach, and I'm glad I don't, because if I liked it I'd eat it, and I just hate it." -- Cl

Re: ftp problem

2010-01-08 Thread David DeSimone
t ftp-data > to $ext_IP port > 1 keep state Are you sure you don't mean: pass out quick on $ext_if inet proto tcp from $ext_IP port ftp-data \ to any port > 1 keep state -- David DeSimone == Network Admin == f...@verio.net "I don't like spinach,

Re: How make the route-to working ?

2010-02-05 Thread David DeSimone
Stefan wrote: > > Pf doesn't seem to be able to route packets on the outbound interface. > Therefore you have to always put the route-to statements on "pass in > on..." rules. What you'd want to use for received traffic is "pass in" rules that m

Re: pf: nat works, ip blocking and logging do not

2010-02-13 Thread David DeSimone
ill never be checked, because they match the previously built state. In order to prevent communications with these hosts, you must also add "block out [quick]" rules which prevent you from initiating the connection to them and thus building state entries. -- David DeSimone == Net

Re: Subject: pf: pass in quick to port 25 still getting blocks

2010-07-09 Thread David DeSimone
y for some reason? You may want to add "log" to the early pass rule, and then you can compare the timestamp between when the initial SYN arrived for a connection, and the later block occurred for a packet in the middle of the connection. -- David DeSimone == Network Admin == f...@v

Re: For better security: always "block all" or "block in all" is enough?

2010-07-28 Thread David DeSimone
h > "block all"? In other words, how bad it is to have all outgoing ports > always opened and whether someone can use this to hack the sysem? > > Thanks a lot for any tips!! > Aleksej. -- David DeSimone == Network Admin == f...@verio.net "I don't like spinac

Re: Routing return NAT traffic based on interface

2012-11-19 Thread David DeSimone
hat packet marking be used to mark packets arriving via $int_if, and then apply NAT to the packets that flow to $ext_if: nat on $ext_if tagged NAT -> $ext_if pass in on $int_if tag NAT pass out on $ext_if Untested configuration idea, of course. :) -- David DeSimone == Network

Re: skipto keyword in pf

2013-05-01 Thread David DeSimone
Another one, is it possible to filter in/out coming traffic according > to the source/destination MAC address separately? As far as I'm aware, PF is a layer-3 only filter, and has no ability to filter on MAC. -- David DeSimone == Network Admin == f...@verio.net "I don't like

Re: skipto keyword in pf

2013-05-08 Thread David DeSimone
g PF rulesets, you should choose to either always use quick, or never use quick, else you may end up easily confusing yourself. -- David DeSimone == Network Admin == f...@verio.net "I don't like spinach, and I'm glad I don't, because if I liked it I'd eat it, and

Re: Anchor evaluation

2013-05-17 Thread David DeSimone
anchor case > doesn't. Am I doing something wrong here? The "anchor" directive tells PF to only evaluate filter rules from the anchor. I would assume you also need "nat-anchor" and "rdr-anchor" directives to force all of the anchor rules to be evaluated: nat-

RE: Getting tables to work in PF

2014-11-03 Thread David DeSimone
The message " pfctl: DIOCSETSTATUSIF" indicates that pfctl is bombing out before it actually loads the rules into the kernel. It's a rather unhelpful message, since it does not point out the source of the problem, though. A little web searching turned up that most likely your pf.conf references

RE: Getting tables to work in PF

2014-11-03 Thread David DeSimone
Also I should have looked further to see this line: set loginterface egress# Can't remember what this does I think that statement needs a real interface name, which "egress" probably isn't. -Original Message- From: David DeSimone Sent: Monday, November 03, 20

RE: Creating span interface using 'dup-to' option

2015-10-12 Thread David DeSimone
The man page makes it clear that "dup-to" acts just like "route-to", except that the original packet still routes the way it would have. The implication being that "dup-to" needs to determine where to route the new packet. This means that the more useful form of this is likely to be: pass