On Mon, Mar 07, 2011 at 01:36:31PM +0100, Henrik Engmark wrote:

> I tried that, with no success.
> Also compiled 5.51 from source with the same result.
> I get this:
> 
> sendto in send_ip_packet_sd: sendto(4, packet, 60, 0, ya.da.ya.da,
> 16) => No route to host
> Offending packet: TCP ya.da.ya.da:59268 > ya.da.ya.da:80  ttl=55
> id=27672 iplen=60  seq=3496514045 win=128 <wscale 10,nop,mss
> 265,timestamp 4294967295 0,sackOK>
> 
> I went on to clean up like nobodys business, ie
> 
> # pfctl -s rules
> pass all no state
> pass all user = 0 no state (i know)
> 
> Still doesn't work.
Try playing with allow-opts (at your own risk, of course).

        -Otto


> 
> Just to be sure I tried disabling pf, and ofcourse that does the trick.
> But as I said, thats not an option for me.
> 
> Any more suggestions? Is pf configurable on a lower level outside
> the ruleset?
> 
> >>Is there a way, good or bad, to relax pf enough to let nmap do its
> >>OS detection?
> >>I am on 4.8.
> >
> >You can always disable pf (pfctl -d). I'd also expect any sensible
> >configuration without "scrub" or (implicit) "keep state" to work,
> >but I
> >didn't check that.
> >
> >E.g. you could try
> >
> >set skip on lo0
> >pass
> >block in on ! lo0 proto tcp to port 6000:6010
> >pass user root no state
> >pass icmp no state
> >
> >             Joachim

Reply via email to