On Fri, May 21, 2010 at 4:37 AM, <lheck...@users.sourceforge.net> wrote: > I've used the same pf.conf for years with only minimal changes, but 4.7 > broke it, and I can't seem to fix it. >
Reconsider the PF documentation. There have been some changes to the syntax in 4.7. > The OBSD machine is a firwall between a cable modem and a private IP LAN. > Previously, I used these rules to allow ssh access from specific Internet > hosts to a machine in the LAN: > > rdr on $ext_if proto tcp from $work_hosts to any port ssh -> $ssh_host > pass in quick on $ext_if proto tcp \ > from $work_hosts to $ssh_host port ssh flags S/SA modulate state > > In 4.7, I changed this to > > match in on $ext_if proto tcp from $work_hosts to any port ssh rdr-to $ssh_host > pass in quick on $ext_if proto tcp \ > from $work_hosts to $ssh_host port ssh flags S/SA modulate state > > What happens now when I try to connect to $ssh_host from the Internet is quite > weird: > - no blocked packets are logged > - on the firewall's LAN-side interface, a tcpdump shows the ssh connection > being forwarded to $ssh_host > - on $ssh_host, tcpdump shows the incoming ssh connection > - sshd on $ssh_host does not "pick up" > > I can ssh from the firewall to $ssh_host just fine; I haven't tested ssh > from Internet to firewall (with suitable pass rule). What am I missing? > I guess that some packet information isn't being rewritten correctly or > completely. > > > > --------------------------------------------------------------- > This message and any attachments may contain Cypress (or its > subsidiaries) confidential information. If it has been received > in error, please advise the sender and immediately delete this > message. > ---------------------------------------------------------------