Hmm, to precise the last message after the the: pass out all There is only: block return out log quick on { $interco_polytech_v4 $interco_hec_v4 } inet from <nonwanv4> block return out log quick on { $interco_polytech_v6 $interco_hec_v6 } inet6 from <nonwanv6>
and no other out related rule. <nonwanv4> and <nonwanv6> contain my private IP adresses. And $interco_xxx are my physical WAN interconnections then those IP addresses mustn't be there. In my first problem this is an incoming HTTP connection, then a public IP to another public IP. -- Best regards, Loïc BLOT, UNIX systems, security and network engineer http://www.unix-experience.fr Le lundi 07 octobre 2013 à 22:30 +0200, Loïc BLOT a écrit : > Hmmm > I solved it by removing 'in' from pass in quick <...> > > But my PF are configured with the first default rule: pass out all and > there isn't any block out rule... Is this a normal situation ? > On another router (which also do NAT), i use only pass in and pass out > for NAT, and all PF is stateful. > Is there anything i miss ? > -- > Best regards, > Loc BLOT, > UNIX systems, security and network engineer > http://www.unix-experience.fr > > > > Le lundi 07 octobre 2013 21:51 +0200, Loc BLOT a crit : > > Hello, > > > > today i was configuring pfsync on a dual routers (BGP on WAN and CARP on > > LAN). Before i run in a stateless mode and it works like a charm. > > > > Now with pfsync state are synchronized but late, then client must launch > > 2 or 3 TCP connections and when it works it's very slow. > > I also have tried defer mode and increasing maxupd but no changes > > appear. I also add Is there anything more to do ? > > > > Because of BGP incoming request, and CARP regular configuration, traffic > > follows this path: > > > > WAN > Router 2 (BGP related) > HTTP server > Router 1 (CARP related) > > > WAN > > > > It seems all WAN incoming requests are blocked on Router 1 when HTTP > > server SYN/ACK the request, but they are allowed by Router 2 and pfsync > > is working very well. > > > > Here is a pflog on this router (it runs on a block in log all default > > rule) > > > > 21:16:28.564254 194.XX.XX.196.80 > 92.151.191.92.49189: S > > 1348056791:1348056791(0) ack 2684884151 win 65535 <mss 1452,nop,wscale > > 6,sackOK,eol> (DF) > > 21:16:28.569211 194.XX.XX.196.80 > 92.151.191.92.49190: S > > 274610014:274610014(0) ack 3399288798 win 65535 <mss 1452,nop,wscale > > 6,sackOK,eol> (DF) > > 21:16:28.417129 194.XX.XX.197.443 > 92.141.20.30.52927: S > > 3247839828:3247839828(0) ack 2174711713 win 65535 <mss 1452,nop,wscale > > 6,sackOK,timestamp 2749057892 407092137> (DF) > > 21:16:28.417784 194.XX.XX.197.443 > 92.141.20.30.52928: S > > 3719844564:3719844564(0) ack 524653966 win 65535 <mss 1452,nop,wscale > > 6,sackOK,timestamp 2971980508 407092137> (DF) > > 21:16:28.431525 194.XX.XX.196.443 > 46.193.1.103.61043: S > > 2792740841:2792740841(0) ack 3070150005 win 65535 <mss 1460,nop,wscale > > 6,sackOK,eol> (DF) > > > > Here is an extract of my PF rules: > > pass in quick inet proto tcp to <http_servers_v4> port { http https } > > pass in quick inet6 proto tcp to <http_servers_v6> port { http https } > > > > In stateless configuration this works, here is the working > > configuration: > > pass in quick inet proto tcp to <http_servers_v4> port { http https } no > > state > > pass in quick inet proto tcp from <http_servers_v4> port { http https } > > no state > > pass in quick inet6 proto tcp to <http_servers_v6> port { http https } > > no state > > pass in quick inet6 proto tcp from <http_servers_v6> port { http https } > > no state > > > > Here is a pfsync configuration example: > > up syncdev vlanXX5 syncpeer 10.XX.X.129 > > > > The latency between the two host is very light, because they are on the > > same switch, with a dedicated VLAN > > > > 64 bytes from 10.XX.XX.130: icmp_seq=2 ttl=255 time=0.146 ms > > > > For more informations, here is a little extract when i do a tcpdump on > > vlanXX5 (each host see the pfsync updated) > > > > 21:37:25.031271 10.117.1.129: PFSYNCv6 len 108 > > act UPD ST COMP count 1 > > ... > > (DF) > > 21:37:25.036625 10.117.1.130: PFSYNCv6 len 192 > > act UPD ST COMP count 2 > > ... > > (DF) [tos 0x10] > > 21:37:25.036753 10.117.1.129: PFSYNCv6 len 108 > > act UPD ST COMP count 1 > > ... > > (DF) > > 21:37:25.041298 10.117.1.129: PFSYNCv6 len 108 > > act UPD ST COMP count 1 > > ... > > (DF) > > 21:37:25.046578 10.117.1.130: PFSYNCv6 len 192 > > act UPD ST COMP count 2 > > ... > > (DF) [tos 0x10] > > 21:37:25.046706 10.117.1.129: PFSYNCv6 len 108 > > act UPD ST COMP count 1 > > ... > > (DF) > > 21:37:25.051269 10.117.1.129: PFSYNCv6 len 108 > > act UPD ST COMP count 1 > > ... > > (DF) > > 21:37:25.056562 10.117.1.130: PFSYNCv6 len 192 > > act UPD ST COMP count 2 > > ... > > > > Have you got ideas ? > > Thanks in advance > > > > -- > > Best regards, > > Loc BLOT, > > UNIX systems, security and network engineer > > http://www.unix-experience.fr > > > > [demime 1.01d removed an attachment of type application/pgp-signature which > had a name of signature.asc] > > [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]