On Fri, Nov 21, 2008 at 2:11 AM, Stuart Henderson <[EMAIL PROTECTED]> wrote:
> On 2008-11-21, Joe S <[EMAIL PROTECTED]> wrote:
>> How do I create a rule to ignore the flags S/SA
>
> Read pf.conf(5) about flags.
>
>

Thanks. I read everything but that man page.

I added "flags any" to my "pass out" rule and my packets are no longer
blocked by rule 0.

# pfctl -s rules
block return log all
block return in quick inet6 all
pass quick proto icmp all keep state allow-opts
pass out quick all flags any keep state allow-opts
pass in log on fxp0 proto tcp from any to (fxp0) port = ssh flags S/SA
keep state
pass in on fxp0 proto tcp from any to (fxp0) port = www flags S/SA keep state
pass quick on vlan0 all flags S/SA keep state allow-opts
pass quick on vlan1 all flags S/SA keep state allow-opts

However, I'm still getting these messages:

# nmap -sS -T5 -sV -p- 2.2.2.2

Starting Nmap 4.76 ( http://nmap.org ) at 2008-11-21 09:44 PST
sendto in send_ip_packet: sendto(4, packet, 44, 0, 2.2.2.2, 16) => No
route to host
Offending packet: TCP 1.1.1.1:33717 > 2.2.2.2:38202 S ttl=57 id=19537
iplen=44  seq=3871189649 win=2048 <mss 1460>
Sleeping 15 seconds then retrying

Why would it say no route to host? I can reach that system just fine.

(By the way, those are not the real IPs)

Reply via email to