I've seen similar things happen on SSH, that were due to a combination of "scrub"ing and states expiring. Turning off scrub rules on SSH specifically cured the scenario for me but I don't see an indication of whether or not you are using that.
You could also verify the states dropping by changing the optimization to conservative. -- Jason Hellenthal Voice: 95.30.17.6/616 JJH48-ARIN > On Jan 27, 2014, at 14:20, Gleb Smirnoff <gleb...@freebsd.org> wrote: > > Robert, > > On Sun, Jan 26, 2014 at 06:19:34PM -0500, Robert Simmons wrote: > R> Over the course of a few hours there are a handful of SSH packets that > R> are being blocked both in and out. This does not seem to affect the > R> SSH session, and all the blocked packets have certain flags set [FP.], > R> [R.], [P.], [.], [F.]. The following is my ruleset abbreviated to the > R> rules that apply to this problem: > R> > R> ext_if = "en0" > R> allowed = "{ 192.168.1.10 }" > R> std_tcp_in = "{ ssh }" > R> block in log > R> block out log (user) > R> pass in quick on $ext_if proto tcp from $allowed to ($ext_if) port > R> $std_tcp_in keep state > R> > R> Why are those packets being blocked? > > Do I understand you correct that the ssh sessions work well, but you > see blocked packets in the pflog? > > -- > Totus tuus, Glebius. > _______________________________________________ > freebsd-pf@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-pf > To unsubscribe, send any mail to "freebsd-pf-unsubscr...@freebsd.org"
smime.p7s
Description: S/MIME cryptographic signature