In an attempt to use relayd as an outbound http "proxy", which is just needed
to do URL filtering rather then content caching, I'm finding that the outbound
connections are being sourced from the IP of the external interface of the
firewall rather then the carp interface that the pf NAT rules are using for
other traffic. 

For example if the following IP scheme is used/pf rules are
in place:
ext_if="1.1.1.1"
carp_if="1.1.1.2" 
int_if="172.31.1.1"
match out on
$ext_if inet from $int_if:network to any nat-to 1.1.1.2 label "NAT [OUT] -
Desktop"
pass in log quick on $int_if proto tcp from $int_if:network to any
port http divert-to 127.0.0.1 port 8080

/etc/relayd.conf:
http protocol
httpfilter {
        return error
        label "URL filtered!"
       
request url filter "www.example.com/"
}

relay httpproxy {
        listen on
127.0.0.1 port 8080
        forward to destination
}

When the divert line in
/etc/pf.conf is commented out then the traffic on the WAN/external interface
is sourced from 1.1.1.2, however when the traffic is diverted to relayd then
the traffic is sourced from 1.1.1.1. Ideally I'd like the traffic to source
from the typical NAT interface, as when the carp interface is failed over to
the peer firewall those sessions in the state table are preserved. With squid
I found that this can be accomplished by using the tcp_outgoing_address
attribute to force the traffic to be sourced from a given address.

Any
help/advice would be appreciated.

Regards,
Matt

Reply via email to