Hi misc@,

I finaly had some time to rearrange my network, and split it into 3
parts: LAN, DMZ, WAN.

Basicly, the LAN (172.20) may not access the DMZ (172.16), but host
172.20.1.10 can. the DMZ may not access the LAN, and both can go to the
WAN.

But for some reason, when I create state from 172.20.1.10 to 172.16.x.x;
the packet comming back gets blocked which should not happen because the
state would be checked first and the state really is created?!

I tried setting 'set state-policy floating' explicit, but no advance.
Someone who knows what the problem is here? I had a ruleset with a bunch
of 'quick' rules before instead of this, but had the same problem.

tcpdump on pflog:
18:12:16.483526 rule 12/(match) pass in on sis2: 172.20.1.10.57132 >
172.16.0.5.ssh: [|tcp]
18:12:16.483960 rule 21/(match) block in on sis1: 172.16.0.5.ssh >
172.20.1.10.57132: [|tcp]


grep on state:
# pfctl -s state|grep 172.16.0.5
all tcp 172.16.0.5:22 <- 172.20.1.10:57132       CLOSED:SYN_SENT


kernel:
OpenBSD 3.8 (GENERIC) #138: Sat Sep 10 15:41:37 MDT 2005
    [EMAIL PROTECTED]:/usr/src/sys/arch/i386/compile/GENERIC

rules:
scrub in all no-df fragment reassemble
scrub out all no-df random-id fragment reassemble
block drop in log all
block drop log inet6 all
block drop in log quick on sis0 from any to (sis0:broadcast)
block drop in log quick on sis0 from <intruders> to any
pass log quick on lo0 inet from 127.0.0.0/8 to any
pass log quick on lo0 inet6 from ::1 to any
pass in log on sis2 inet proto tcp from 172.20.0.0/16 to any modulate state
pass in log on sis2 inet proto udp from 172.20.0.0/16 to any keep state
pass in log on sis2 inet proto icmp from 172.20.0.0/16 to any keep state
block drop in log on sis2 inet proto tcp from any to 172.16.0.0/16
block drop in log on sis2 inet proto udp from any to 172.16.0.0/16
block drop in log on sis2 inet proto icmp from any to 172.16.0.0/16
pass in log on sis2 inet proto tcp from 172.20.1.10 to 172.16.0.0/16 keep
state
pass in log on sis2 inet proto udp from 172.20.1.10 to 172.16.0.0/16 keep
state
pass in log on sis2 inet proto icmp from 172.20.1.10 to 172.16.0.0/16 keep
state
pass out log on sis2 inet proto tcp from 172.20.0.1 to 172.20.0.0/16 keep
state
pass out log on sis2 inet proto udp from 172.20.0.1 to 172.20.0.0/16 keep
state
pass out log on sis2 inet proto icmp from 172.20.0.1 to 172.20.0.0/16 keep
state
pass in log on sis1 inet proto tcp from 172.16.0.0/16 to any modulate state
pass in log on sis1 inet proto udp from 172.16.0.0/16 to any keep state
pass in log on sis1 inet proto icmp from 172.16.0.0/16 to any keep state
block drop in log on sis1 inet proto tcp from any to 172.20.0.0/16
block drop in log on sis1 inet proto udp from any to 172.20.0.0/16
block drop in log on sis1 inet proto icmp from any to 172.20.0.0/16
pass out log on sis1 inet proto tcp from 172.16.0.1 to 172.16.0.0/16 keep
state
pass out log on sis1 inet proto udp from 172.16.0.1 to 172.16.0.0/16 keep
state
pass out log on sis1 inet proto icmp from 172.16.0.1 to 172.16.0.0/16 keep
state
[sis0 rules snipped]

Kind regards,
Jimmy Scott

--
The Four Horsemen of the Apocalypse: Death, Famine, War, and SNMP

[demime 1.01d removed an attachment of type application/pgp-signature]

Reply via email to