Forgot to send to the list, twice!

If it's RTP, (http://en.wikipedia.org/wiki/Real-time_Transport_Protocol),
which some quick Googling indicates, your best bet may be to make a table
of sending hosts with a pass ... inet proto udp ... from <table> to ? port
>1024 rule.

<quote who="Hugo Osvaldo Barrera">
> On Thu, Apr 8, 2010 at 00:54, James Shupe <professio...@jamesshupe.com>
> wrote:
>> Use "log (all)" and tcpdump to figure out exactly what is being blocked.
>>
>> On 4/7/10 10:40 PM, Hugo Osvaldo Barrera wrote:
>>> I'm using OpenBSD 4.6 at home as an access point, firewall and home
>>> server (with pf).
>>> I've recently had some issues trying to use pidgin's [XMPP] video
>>> support on one of my client computers, yet, if I connect it directly
>>> to the internet it works fine; hence the problem is the firewall
>>> configuration (as one of the pidgin devs pointed out it might have
>>> been).
>>> I THINK UDP packets are being dropped, but I must really say, this
>>> problem is a bit above my level of understanding.
>>>
>>> I need to know how to make sure UDP packets don't get dropped on the
>>> way to my PC, but i'm not really sure how.
>>>
>>> I think a simple "pass in proto udp" is a bit extremist (though it
>>> would
> work).
>>> Any better suggestions?
>>>
>>> My current pf.conf file is:
>>>
>>> -----
>>> #       $OpenBSD: pf.conf,v 1.44 2009/06/10 15:29:34 sobrado Exp $
>>> #
>>> # See pf.conf(5) for syntax and examples; this sample ruleset uses
>>> # require-order to permit mixing of NAT/RDR and filter rules.
>>> # Remember to set net.inet.ip.forwarding=1 and/or
> net.inet6.ip6.forwarding=1
>>> # in /etc/sysctl.conf if packets are to be forwarded between
>>> interfaces.
>>>
>>> # Skip lo
>>> set skip on lo
>>>
>>> #############
>>> # Variables #
>>> #############
>>> extif = "re0"
>>> intif = "ral0"
>>> chaos = "172.16.1.7"
>>> mamaquina = "172.16.1.12"
>>>
>>> tcp_services="{ 22, 113, 80, 443 }"
>>>
>>> icmp_types = "echoreq"
>>> allproto = "{ tcp, udp, ipv6, icmp, esp, ipencap }"
>>> privnets = "{ 127.0.0.0/8, 192.168.0.0/16, 172.16.0.0/12, 10.0.0.0/8 }"
>>>
>>> table <intnet> { 172.16.0.1/16 }
>>>
>>> # Options
>>> set loginterface $extif
>>> match in all scrub (no-df)
>>>
>>> #######
>>> # NAT #
>>> #######
>>> nat on $extif from $intif:network -> ($extif)
>>> # TODO Maybe move this down to service ports? Check first.
>>> rdr pass log on $extif proto tcp from any to any port 1022 -> $chaos
>>> port
> 22
>>>
>>> block in
>>> pass out keep state
>>>
>>> antispoof quick for { lo $intif }
>>>
>>> block drop in on $extif from $privnets to any
>>> block drop in on $extif from any to $privnets
>>>
>>> #################
>>> # SERVICE PORTS #
>>> #################
>>>
>>> # Open ports for local servicesAbro puerto de servicios locales
>>> pass in on $extif inet proto tcp from any to ($extif) port
>>> $tcp_services flags S/SA keep state
>>>
>>> ### OTHER PORTS AND OPENINGS
>>> pass in on $extif from any to 172.16.1.7
>>> pass in on $extif from any to 172.16.2.4
>>>
>>> pass in on $extif proto {tcp, udp} from any to any port 53
>>>
>>> # ICMP Traffic
>>> pass in inet proto icmp all icmp-type $icmp_types keep state
>>>
>>> # LAN - everything is allow in/out
>>> pass in quick on $intif
>>> pass out quick on $intif
>>>
>>>
>>> ### Block remote connections to the X Server
>>> block in on ! lo0 proto tcp to port 6000:6010
>>> -----
>>>
>>> Thanks for your time guys!
>>>
>>> --
>>> Hugo Osvaldo Barrera
>>>
>>>
>>>
>>
>>
>>
>
> As I had supposed; pf is blocking the UDP packages:
>
> Apr 08 01:31:58.241781 rule 1/(match) block in on re0:
> <the-other-IP>.59789 > <my-ip>.50688: udp 56
> Apr 08 01:31:58.363252 rule 1/(match) block in on re0:
> <the-other-IP>.59792 > <my-ip>.52166: udp 56
> Apr 08 01:31:58.363991 rule 1/(match) block in on re0:
> <the-other-IP>.59793 > <my-ip>.50688: udp 56
>
> There are several more dozen lines like this one.
> However, each one uses a different port, so how can I solve the
> problem?  I don't even see a predicting which ports I'd need to open
> (they ARE random).
>
>
>
>


-- 
Thank you,
James M. Shupe
GPG: 9C5C4417

Reply via email to