my rules only allow tcp out (host1 -> host2) connections:
allow tcp from me to any out setup keep-state
(me should denote host1)

But the nmap goes from host2 -> host1 which should be blocked by the firewall

5.) nmap -PN -n -p ... --source-port 1234 --scanflags ack host
(i've made a mistake it should mean host1 instead of only host)

Thus it seems to be the old dynamic rule.

jerry

Am 16.10.2008 um 04:05 schrieb Roman Kurakin:

[EMAIL PROTECTED] wrote:
Hello together,

i have a strange phenomenon with dynamic rules. I am using Mac OS X 10..5.5 and have disabled keepalive-messages for dynamic rules:

net.inet.ip.fw.dyn_keepalive: 0

ruleset host1
...
check-state
allow tcp from me to any out setup keep-state
...

1.) host2: nc -k -l -p 1234
2.) host1: nc host2 1234
3.) dynamic rule with 300s gets created
4.) dynamic rule expired after 300s (ipfw -d show: rule is gone (it shows with flag -e))
5.) nmap -PN -n -p ... --source-port 1234 --scanflags ack host

After 5) that expired rule appeared again with 300s timeout and the firewall is again opened.

I would expect that an expired rule could not be reanimated. The reactivation of expired rules seems to stop if after tcp fin from both hosts are detected. Thus if the tcp disconnection was not successfull there are some zombie rules which could be reanimated?!?

IMHO if the connection starts from over again it is a new connection. It is not the old one
reanimated.

rik
(also with keepalive you could reproduce it: tcp rst -> then there is no keepalive message and the dynamic rule expires but can be reanimated with 5))

Jerry





_______________________________________________
[email protected] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ipfw
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to