Hi, In a previous message (about a week ago?) I mentioned plans to replace a current firewall with a pf-based one. I gave a little outline of things I'd jot down on "paper". Well, this weekend, I spent some time putting the actual pf.conf together, and debugging some mistakes (oversights).
Anyway, I got it to a point where I felt confident to do a test run in production. I swapped out the production firewall box with the pf-based one. I've been monitoring the traffic to see any anomalies, or things that I may have missed. Kinda QA-ing if you will. One thing I did notice is that my ibook is spewing lots of crap, but this message isn't about that :) While monitoring pflog0 I noticed a blocked packet from one of my web-servers to 68.142.250.133. I didn't understand why that was. So I ran: # tcpdump -n -e -ttt -r /var/log/pflog host 68.142.250.133 tcpdump: WARNING: snaplen raised from 96 to 116 Apr 23 19:59:26.010917 rule 2/(match) block out on de2: 68.142.250.133.45648 > a.b.c.d.80: S 3164412190:3164412190(0) win 5840 <mss 1460,sackOK,timestamp 103193913[|tcp]> (DF) Apr 23 20:00:59.803910 rule 2/(match) block in on de1: a.b.c.d.80 > 68.142.250.133.45648: S 873225897:873225897(0) ack 3164412191 win 5792 <mss 1460,sackOK,timestamp 431195378[|tcp]> (DF) Here is my set-up from my earlier post: # /Internet/ # | # [DSL Router] # .1 | # | # __WIFI__ (de0) ___DMZ___ # +----+----+ .2 www1 # --X--(b)| PF |(de1)--- .3 www2 # (down) +----+----+ .4 dns1 # (de2) .5 mail1 # | # | # __LAN__ # .11 .12 .13 .14 What I'm confused about is why did the original packet from 68.142.250.133 try to out on de2 interface and not on de1 as it should have? pf-based box is running a 'cvs up -rOPENBSD_3_9 -dP' build. All my pf filtering are using pass with tag on entry interface, then using pass tagged on out-going interfaces. Blocking by default. I'm not using any rdr, no nat, etc. e.g., pass in on de0 from any to $web_server port www \ flags S/SA keep state tag NET2DMZ pass out quick on de1 all keep state tagged NET2DMZ Nothing is accepted on de0 destined for anything other than <dmz_grp>. Is there more info I can provide? What else should I look for? I obviously have ip forwarding enabled. All four interfaces are bridged together, though currently the wifi interface is disabled. Is this something I need to use route-to to "force" traffic to proper "internal" interface containing destination host address? Any thoughts on the matter are appreciated! --patrick Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com