On 10 May 2014, at 15:14, Brandon Vincent <brandon.vinc...@asu.edu> wrote:

> Doug,
> 
> As long as you are on the same LAN/broadcast domain, it would be pretty easy 
> to use a program like Nmap with the "-S, --source-ip" parameter to spoof the 
> source IP.
> 
> Would you mind sharing the rule that caused this problem?
> 
> Brandon Vincent
> 
> 
> On Sat, May 10, 2014 at 2:34 PM, Doug Hardie <bc...@lafn.org> wrote:
> I have a pf rule (FreeBSD 9.2) that uses a table to block access from 
> specific networks.  This morning I found the following situation:
> 
> 12 attempts from an address in one of the blocked network to access the 
> server.  All were blocked and marked as such with the proper rule number in 
> pflog.
> 
> 10 succeeding connections that were passed through to the port.  These were 
> logged by the process listening on that port.
> 
> There were no changes to the rules, reboots, etc. during that time.  This all 
> transpired in about 10 minutes.  A dump of the table shows the proper address 
> range.  I am not logging the pass throughs so only the original 12 blocks are 
> in the logs.  I have never seen anything like this in the past.  Is there 
> some way I can test a specific IP address and have pf tell me what it would 
> do if it received a packet from that address?
> 

nmap does a good test.  Took awhile to figure out how to make it spoof properly 
though.  Unfortunately I can't make pf fail.  It blocks everything I send from 
that range.  I guess I'll just have to monitor this a lot closer.
_______________________________________________
freebsd-pf@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-pf
To unsubscribe, send any mail to "freebsd-pf-unsubscr...@freebsd.org"

Reply via email to