Hi!

We are running a pretty nice commercial firewall which obviously is based on a stripped version of OpenBSD and pf ;) (yes I know... we are planning on switching to our own OpenBSD installation as soon as possibly, still in the learning process though).

Anyway we get alot of warnings about connections to a valid www server on the dmz like this: Jan 17 19:41:01 Denied incoming WAN 83.248.186.3 1162 192.168.78.6 80 TCP flags F, seq 0, size 0 ack 1 win 65535, no frags

and this:

Jan 17 19:39:26 Denied incoming WAN 85.112.166.15 11406 192.168.78.6 80 TCP flags R, seq 1305210837, size 0 ack 2803852444 win 0

With some detetctive work I think the firewall has the following pf.conf settings for allowing traffic to the www server (fake public ip address):

binat on $EXTIF inet from 192.168.78.6 to any -> 20.1.1.1
pass in quick on $EXTIF inet proto tcp from any to 192.178.78.6 port www flags S/SA modulate state

I think scrub are used on the ext inferface

So now to my question: is the above denied connections correct or should they be allowed to the www server, eg. using S/SAFR in the pass rule?

Thanks,

Johan

Reply via email to