> Hi all, > > I've been running pf+obspamd on FBSD 6.2-RELEASE. > > I appear to be blocking some addresses that appear in my > spamd-mywhite file > and I don't understand why that would be the case here. I'm > guessing I've > screwed up my pf.conf file. > > Here's my config file: > > # pfctl -vvnf /etc/pf.conf > ext_if = "rl0" > int_if = "xl0" > internal_net = "192.168.1.1/24" > external_addr = "216.70.250.4" > vpn_net = "10.8.0.0/24" > NoRouteIPs = "{ 127.0.0.0/8 192.168.0.0/16 172.16.0.0/12 10.0.0.0/8 }" > webserver1 = "192.168.1.4" > set skip on { lo0 } > set skip on { gif0 } > @0 scrub in all fragment reassemble > @1 nat on rl0 inet from 192.168.1.0/24 to any -> (rl0) round-robin > @2 nat on rl0 inet from 10.8.0.0/24 to any -> (rl0) round-robin > @3 rdr on rl0 inet proto tcp from any to 216.70.250.4 port = http -> > 192.168.1.4 port 80 > table <spamd> persist > table <spamd-white> persist > table <spamd-mywhite> persist file > "/usr/local/etc/spamd/spamd-mywhite" > table <spamd-alloweddomains> persist file > "/usr/local/etc/spamd/spamd.alloweddomains" > @4 rdr pass inet proto tcp from <spamd-white:0> to > 216.70.250.4 port = smtp > -> 127.0.0.1 port 25 > @5 rdr pass inet proto tcp from <spamd:0> to 216.70.250.4 > port = smtp -> > 127.0.0.1 port 8025 > @6 rdr pass inet proto tcp from ! <spamd-mywhite:0> to > 216.70.250.4 port = > smtp -> 127.0.0.1 port 8025 > @7 pass in log inet proto tcp from any to 216.70.250.4 port = > smtp flags > S/SA synproxy state > @8 pass out log inet proto tcp from 216.70.250.4 to any port > = smtp flags > S/SA synproxy state > @9 pass in log inet proto tcp from 192.168.1.0/24 to > 192.168.1.25 port = > smtp flags S/SA synproxy state > @10 block drop in log all > @11 pass in log quick on xl0 inet proto tcp from any to > 192.168.1.25 port = > ssh flags S/SA synproxy state > @12 block drop in log quick on rl0 inet from 127.0.0.0/8 to any > @13 block drop in log quick on rl0 inet from 192.168.0.0/16 to any > @14 block drop in log quick on rl0 inet from 172.16.0.0/12 to any > @15 block drop in log quick on rl0 inet from 10.0.0.0/8 to any > @16 block drop out log quick on rl0 inet from any to 127.0.0.0/8 > @17 block drop out log quick on rl0 inet from any to 192.168.0.0/16 > @18 block drop out log quick on rl0 inet from any to 172.16.0.0/12 > @19 block drop out log quick on rl0 inet from any to 10.0.0.0/8 > @20 block drop in log quick on ! xl0 inet from 192.168.1.0/24 to any > @21 block drop in log quick inet from 192.168.1.25 to any > @22 pass in on xl0 inet from 192.168.1.0/24 to any > @23 pass out log on xl0 inet from any to 192.168.1.0/24 > @24 pass out log quick on xl0 inet from any to 10.8.0.0/24 > @25 pass out on rl0 proto tcp all flags S/SA modulate state > @26 pass out on rl0 proto udp all keep state > @27 pass out on rl0 proto icmp all keep state > @28 pass in on rl0 inet proto tcp from any to 192.168.1.4 > port = http flags > S/SA synproxy state > @29 pass in on xl0 inet proto tcp from any to 192.168.1.25 > port = ssh keep > state > > /var/log/pflog0 shows the following: > > 141748 rule 3/0(match): block in on rl0: 205.188.159.7.50805 > > 216.70.250.4.25: S 1250664467:1250664467(0) win 32768 <mss 1460,wscale > 0,nop> > 2. 049208 rule 3/0(match): block in on rl0: 205.188.159.7.50805 > > 216.70.250.4.25: S 1250664467:1250664467(0) win 32768 <mss 1460,wscale > 0,nop> > 3. 068169 rule 3/0(match): block in on rl0: 205.188.159.7.50805 > > 216.70.250.4.25: S 1250664467:1250664467(0) win 32768 <mss 1460,wscale > 0,nop> > 5. 594277 rule 3/0(match): block in on rl0: 205.188.139.137.61419 > > 216.70.250.4.25: S 2510359871:2510359871(0) win 24820 > <nop,nop,sackOK,mss > 1460> > 525916 rule 3/0(match): block in on rl0: 205.188.159.7.50805 > > 216.70.250.4.25: S 1250664467:1250664467(0) win 32768 <mss 1460,wscale > 0,nop> > > # pfctl -t spamd-mywhite -T show | grep 205.188. > No ALTQ support in kernel > ALTQ related functions disabled > 205.188.139.0/24 > 205.188.144.0/24 > 205.188.156.0/23 > 205.188.157.0/24 > 205.188.159.0/24 > > Thus 205.188.159.7 shouldn't be blocked. > > # spamdb | grep 205\.188\. > WHITE|205.188.249.132|||1187218293|1187220082|1190330485|13|0 > WHITE|205.188.249.67|||1187823652|1187824708|1190935126|12|0 > WHITE|66.179.205.188|||1186759482|1186761981|1189872409|9|0 > # > > spamdb doesn't show any entries for 205.188.159.7. > > These entries are for AOL mail. I've received complaints from > AOL users of > mail bouncing back to them. > > What am I doing wrong? Are CIDR records accepted by > pf+obspamd? I can't > trace the block back to the proper rules- i.e. rule 3/0 as > shown in pflog0 > matches up with which rule in pf.conf? > > Any suggestions are appreciated! > > ~Doug
Hi, I'm resending this as I have not received any replies. Can someone help me out here? Oh, and I'm running obspamd 4.1.1. ~Doug _______________________________________________ freebsd-pf@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-pf To unsubscribe, send any mail to "[EMAIL PROTECTED]"