Add more -v's
--
Jason Hellenthal
JJH48-ARIN
On Jul 5, 2015, at 10:40, Mike wrote:
10.1-RELEASE-p12 FreeBSD 10.1-RELEASE-p12 #0 r284495
I have a question about the stats in pfctl. The man page for pfctl has
the following example:
# pfctl -t test -vTshow
129.128.5.191
Cl
Can FreeBSD's tcpdump show this
information?
I see a similar question from 2008, but no response.
https://lists.freebsd.org/pipermail/freebsd-pf/2008-April/004307.html
Joseph
- --
Jason Hellenthal
Mobile: +1 (616) 953-0176
jhellent...@dataix.net
JJH48-ARIN
-BEGIN PGP
Interesting I'll see if I can plug away with this and produce something similar
to that using your rules once I can get past this kernel problem I have . . .
;-) definately a point release
--
Jason Hellenthal
Voice: 95.30.17.6/616
JJH48-ARIN
> On Jan 27, 2014, at 22:26, Robert
e states dropping by changing the optimization to
conservative.
--
Jason Hellenthal
Voice: 95.30.17.6/616
JJH48-ARIN
> On Jan 27, 2014, at 14:20, Gleb Smirnoff wrote:
>
> Robert,
>
> On Sun, Jan 26, 2014 at 06:19:34PM -0500, Robert Simmons wrote:
> R> Over the course
Curious if your line breaks are correct ? Your block and pass rule appear to be
on the same line.
This should do it . . .
block in all
block return in quick from !$internal_ip to $external_ip
pass out all keep state
But if you already have a block all rul there is no need for the second as yo
Should say too . . . don't forget to either skip on lo0 or pass on lo0
> On Nov 8, 2013, at 9:05, Jason Hellenthal wrote:
>
> Curious if your line breaks are correct ? Your block and pass rule appear to
> be on the same line.
>
> This should do it . . .
>
> b
Remove scrub on the interface. This is only an assumption that you have it in
your rules file not appearing here ? But ice noticed a similar behavior before
with windows 7.
Not sure if this might help either but turn off rxcsum and txcsum on lo0
--
Jason Hellenthal
Inbox: jhellent
Are you using /etc/crontab ?
--
Jason Hellenthal
Inbox: jhellent...@dataix.net
Voice: +1 (616) 953-0176
JJH48-ARIN
On Jul 27, 2013, at 12:08, Yeris Antonio Madrigal Castro
wrote:
>
> Hi
>
> I am using freebsd 9.1 R, and i am trying to make the pf firewall to log
>
Google !
--
Jason Hellenthal
Inbox: jhellent...@dataix.net
Voice: +1 (616) 953-0176
JJH48-ARIN
On Jul 14, 2013, at 10:29, "mholb...@mail.wvu.edu"
wrote:
> Is there no spam filtering setup for this list?
>
> - Reply message -
> From: kirstenjon...@gmai
I'd say it would probably be a cheaper solution to just code the l2 filtering
into pf but would be more of a benefit to you and everyone else to do it on
HEAD if its not already there. I believe HEAD uses pf4.5.
--
Jason Hellenthal
IS&T Services Professional
Inbox: jhellent...@d
s
own l2 filtering but nothing like pf.
Good luck & best packeting,
--
Jason Hellenthal
IS&T Services Professional
Inbox: jhellent...@dataix.net
JJH48-ARIN
On May 9, 2013, at 11:54, Christophe wrote:
> Hi,
>
> Nomad Esst wrote,
>> I want filter packets based on the
Wow I can't believe I skipped over that option.
pass quick proto igmp allow-opts
Did it perfectly
Thank you Florian
--
Jason Hellenthal
JJH48-ARIN
-(2^(N-1))
On May 4, 2013, at 9:44, Florian Smeets wrote:
> On 04.05.13 09:36, Jason Hellenthal wrote:
>> Hey Everyo
anks & Top posting is eminent...
--
Jason Hellenthal
JJH48-ARIN
-(2^(N-1))
___
freebsd-pf@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-pf
To unsubscribe, send any mail to "freebsd-pf-unsubscr...@freebsd.org"
Correct me if I'm wrong but 4.5
--
Jason Hellenthal
JJH48-ARIN
- (2^(N-1))
On Mar 13, 2013, at 14:06, Russell Sutherland wrote:
> Which version (OpenBSD numbering) of pf is found in FreeBSD 9.1?
>
> --
> Russell Sutherland
> email: r...@quist.ca
>
Have you attempted to...
ifconfig lo0 -txcsum -rxcsum
And see if that solves your problem. I've had to do this numerous times with pf
on 8.1 -> 8.3
Check syntax of flags though its been a while since I looked at that issue.
--
Jason Hellenthal
JJH48-ARIN
- (2^(N-1))
On Feb
All of the methods listed in more recent messages are just fine of
methods to *somewhat* handle the DDoS on the hosts being attacked.
- *But* -
The only way you are going to take care of this is going to you're
provider at the next level and asking them for assistance. Most of the
addresses you
Press 5 -or- 6 after firing up pftop and see which rule is counting
upward that is accepting this traffic.
On Sun, Jul 01, 2012 at 06:34:18PM +, Marcin Wisnicki wrote:
> I'm trying to kill all connections to/from certain host after reloading
> ruleset to force it to go through new ruleset bu
On Tue, Jun 19, 2012 at 07:24:59AM -0400, Jason Hellenthal wrote:
>
>
> On Tue, Jun 19, 2012 at 07:54:50AM +0200, Nejc Škoberne wrote:
> > Hi,
> >
> > I want to do (stateful) source port translation (restriction actually)
> > on my outgoing packets, but no
On Tue, Jun 19, 2012 at 07:54:50AM +0200, Nejc Škoberne wrote:
> Hi,
>
> I want to do (stateful) source port translation (restriction actually)
> on my outgoing packets, but no source address translation. And I want to
> do it for IPv6.
>
> So if there is a TCP packet like this:
>
> SRC ADDR
Did you ever post your ruleset and example tables ? I don't think pf
changed that much between 8.2-RELEASE to 8.3 as it stands now in the
aspects that would effect this outcome.
I am on 8.3-STABLE and the configuration of rules sounds similiar to
yours but I am not exhibiting any problems. Rule o
On Wed, Feb 15, 2012 at 10:11:55AM +0100, Damien Fleuriot wrote:
> On 2/15/12 2:22 AM, Doug Sampson wrote:
> > I got bitten by PF when upgrading from 8.2 to 9.0. It refused to allow
> > any incoming mail. I'm using spamd in conjunction with pf. I use a
> > combination of natting along with redire
Bjoern,
On Sun, May 08, 2011 at 09:52:58PM +, Bjoern A. Zeeb wrote:
> On May 8, 2011, at 7:45 PM, Jason Hellenthal wrote:
>
> >
> > Oguz,
> >
> > On Sun, May 08, 2011 at 08:39:05PM +0300, Oguz Yilmaz wrote:
> >> Hi,
> >>
> >> I
45/head/
And there are various other messages on the lists that you are welcome to
search for if interested.
Good Luck.
--
Regards, (jhell)
Jason Hellenthal
pgpfKu4HWLXVC.pgp
Description: PGP signature
since everything that can be done from the
jail can also be done from the master host.
--
Regards, (jhell)
Jason Hellenthal
pgpADFRiELGNi.pgp
Description: PGP signature
roblem approximately 3 days to start is unknown. It's
>the only change we've made to the system (truly/honestly), and it was a
>change to pf.conf.
>
>If anyone has advice (or has seen the above problem), or is interested
>in debugging it -- as I said, I have a vmcore -- I'm happy to assist in
>any way I can. I would hate for someone else to get bit by this, and
>really am hoping its something that has been fixed between February and
>now.
>
That's quite the deduction there. I've noticed recently that you were also
experimenting with the new NFS server recompiling kernel etc etc. Seeing
as weird things can happen with DNS, NFS and mountpoint's, is this the same
machine that you were doing that on ?
If so can you check to see how many requests for NFS operations were done
to/from that box ? as well the names that would be being resolved and if
that machine can resolve them ?
Also I would believe your using tables in your pf.conf, if so do any of
those tables contain a FQDN that cannot be resolved from that machine ?
I think you probably see what I am getting at here as it could be some
sort of concurrent recursive DNS failure that can only be seen from the
machine caused by possibly the new NFS backend or a change in one of the
tables that pf would use.
--
Regards, (jhell)
Jason Hellenthal
pgpYYZTugPZCJ.pgp
Description: PGP signature
25 matches
Mail list logo