Hello, I'm trying to understand why there's no PF state for a outgoing rule dedicated to dnscrypt-proxy (668) daemon.
pf.conf says 'user' option needs effective ID... # ps -axo uid,ruid,gid,rgid,pid,args | grep dnscrypt 688 688 688 688 16665 /usr/local/sbin/dnscrypt-proxy -d --local-address=127.0.0.1:5331 --user=_dnscrypt-proxy # pfctl -sr block drop out log quick on egress from ! (egress:0) to any anchor "test-out" all pass out log quick on egress inet proto udp from any to 208.67.220.220 port = 443 user = 688 pass out log quick on egress inet proto tcp from any to 208.67.220.220 port = 443 user = 688 flags S/SA pass out log quick on egress inet proto icmp all icmp-type echoreq block drop in log quick from no-route to any block drop in log quick from urpf-failed to any block drop out log quick all block drop in log quick on egress inet from any to 255.255.255.255 anchor "test-in" all pass in log quick on egress inet proto icmp from any to (egress:0) icmp-type echoreq code 0 pass in log quick on egress inet proto tcp from any to (egress:0) port = 22 flags S/SA block drop in log quick all Now when dnscrypt-proxy tries to make a connection it is blocked. Interestingly there's even no logged outgoing connection, but just blocked return. # tcpdump -i pflog0 -n -e -ttt -vv tcpdump: WARNING: snaplen raised from 116 to 160 tcpdump: listening on pflog0, link-type PFLOG Jan 26 00:41:00.884036 rule 7/(match) [uid 0, pid 23524] block out on iwn0: [uid 0, pid 16665] 192.168.1.100.10976 > 208.67.220.220.443: udp 512 (ttl 64, id 9876, len 540, bad cksum 208! differs by e108) (from anchor) # pfctl -ss all tcp 192.168.1.100:16505 -> 66.7.199.108:22 ESTABLISHED:ESTABLISHED Well it works if I add dnscrypt-proxy rule for root but why? jirib