The problem/limitation is probably from local port binding of the client:123 
which is used for both connections.

I see other clients that use high ports for ntp queries that create multiple 
states without any problem.

all udp 127.0.0.1:123 (remote_ntp1:123) <- y.y.y.y:54401       SINGLE:MULTIPLE
all udp 127.0.0.1:123 (remote_ntp2:123) <- y.y.y.y:52525       SINGLE:MULTIPLE

:(

G

On 15/09/2022 11:12, Kapetanakis Giannis wrote:
> Hi,
>
> I'm trying to enforce a local ntpd server (which is also our external 
> firewall/router) for all connections and I have a very strange problem.
> Only one (dst) IP is allowed to create a state. After state expires a new dst 
> IP can be used.
>
> fw# pfctl -sr -R 154
> pass in log quick on $int_if inet proto udp from x.x.x.x to any port = 123 
> rdr-to 127.0.0.1
>
> client-x-x-x-x# ntpdate 1.2.3.4
> 15 Sep 10:34:15 ntpdate[620]: adjust time server 1.2.3.4 offset -0.000096 sec
>
> On fw (ntpd server) I see:
>
> 10:34:09.366370 x.x.x.x.123 > 1.2.3.4.123: v4 alarm client strat 0 poll 3 
> prec -6 (DF)
> 10:34:09.366460 1.2.3.4.123 > x.x.x.x.123: v4 server strat 4 poll 3 prec -29 
> [tos 0x10]
> 10:34:11.366247 x.x.x.x.123 > 1.2.3.4.123: v4 alarm client strat 0 poll 3 
> prec -6 (DF)
> 10:34:11.366281 1.2.3.4.123 > x.x.x.x.123: v4 server strat 4 poll 3 prec -29 
> [tos 0x10]
> 10:34:13.366275 x.x.x.x.123 > 1.2.3.4.123: v4 alarm client strat 0 poll 3 
> prec -6 (DF)
> 10:34:13.366324 1.2.3.4.123 > x.x.x.x.123: v4 server strat 4 poll 3 prec -29 
> [tos 0x10]
>
> Sep 15 10:34:09.366383 rule 154/(match) pass in on int_if: x.x.x.x.123 > 
> 1.2.3.4.123: v4 alarm client strat 0 poll 3 prec -6 (DF)
>
> # pfctl -ss -vv -R 154
>
> all udp 127.0.0.1:123 (1.2.3.4:123) <- x.x.x.x:123       MULTIPLE:MULTIPLE
>    age 00:00:19, expires in 00:00:47, 4:4 pkts, 304:304 bytes, rule 154
>    id: 628ba534a943cb3c creatorid: 00000001
>
> Subsequent ntp queries to same IP 1.2.3.4 work fine. Same state is used. pkts 
> advance, expire time resets to 60 seconds
>
> However if I try a different dst IP from the same client it does not work 
> until state to 1.2.3.4 above expires.
>
> I see the incoming packet on the internal interface but I see no reply going 
> back to client (as before with 1.2.3.4).
>
> 10:34:26.812675 x.x.x.x.123 > 2.3.4.5.123: v4 alarm client strat 0 poll 3 
> prec -6 (DF)
> 10:34:28.812571 x.x.x.x.123 > 2.3.4.5.123: v4 alarm client strat 0 poll 3 
> prec -6 (DF)
> 10:34:30.812587 x.x.x.x.123 > 2.3.4.5.123: v4 alarm client strat 0 poll 3 
> prec -6 (DF)
> 10:34:32.812554 x.x.x.x.123 > 2.3.4.5.123: v4 alarm client strat 0 poll 3 
> prec -6 (DF)
>
> I also see the pf log (4 times now and not 1 as before)
> Sep 15 10:34:26.812688 rule 154/(match) pass in on int_if: x.x.x.x.123 > 
> 2.3.4.5.123: v4 alarm client strat 0 poll 3 prec -6 (DF)
> Sep 15 10:34:28.812583 rule 154/(match) pass in on int_if: x.x.x.x.123 > 
> 2.3.4.5.123: v4 alarm client strat 0 poll 3 prec -6 (DF)
> Sep 15 10:34:30.812598 rule 154/(match) pass in on int_if: x.x.x.x.123 > 
> 2.3.4.5.123: v4 alarm client strat 0 poll 3 prec -6 (DF)
> Sep 15 10:34:32.812566 rule 154/(match) pass in on int_if: x.x.x.x.123 > 
> 2.3.4.5.123: v4 alarm client strat 0 poll 3 prec -6 (DF)
>
> No new state is created. pfctl -ss -R 154 only lists the one state of 1.2.3.4
>
> After state expiration, a different IP can be used and works.
>
> Initial pf rule included keep state (max-src-states 10, source-track rule)
> which also behaves the same. 10 src-IP connections are allowed and then no 
> more until one is expired.
> However, again, if another destination IP is used I see no replies (bellow 
> the src limit of 10).
>
> system is 7.1 amd64 which syspatches.
>
> ntpd only lists servers, constraints and
> listen on 127.0.0.1
> listen on ::1
>
> ideas?
>
> G
>
>
>
>

Reply via email to