Re: Why merging recent OpenBSD PF code is not easy (was Re: FOLLOW-UP)

2014-12-07 Thread Peter Maxwell
On 7 December 2014 at 23:09, Martin Hanson wrote: > > Given you appear to believe you are well acquainted with the problem, why > > not pull your finger out of your proverbial and sort it yourself? > > LOL, good one! > > Seems like you have missed the whole point, nobody can sort it out now! > I

Re: Why merging recent OpenBSD PF code is not easy (was Re: FOLLOW-UP)

2014-12-07 Thread Peter Maxwell
On 7 December 2014 at 15:52, Martin Hanson wrote: > > > Did anyone on FreeBSD bother to look at that first? > > Multi-threading!? > > So okay, now there's essentially another product on FreeBSD, its NOT PF any > longer! It's "old crap that should have been updated some six years ago" > with > new

Re: For better security: always "block all" or "block in all" is enough?

2010-07-29 Thread Peter Maxwell
On 30 July 2010 00:08, Chris Buechler wrote: > On Thu, Jul 29, 2010 at 5:09 PM, Peter Maxwell > wrote: > > > > An ISMS, is a company defined document so will likely have different > entries > > or even none at all for that matter depending on the company. In a >

Re: For better security: always "block all" or "block in all" is enough?

2010-07-29 Thread Peter Maxwell
On 29 July 2010 20:08, Greg Hennessy wrote: > > > > If, as you say, there are "Governance, Risk, and Compliance reasons", > > perhaps you'd like to specify one or two for each category? > > Start with an ISMS derived from 27k, add a soupcon of PCI DSS requirement > 10, Basel II, throw in SOX 404

Re: For better security: always "block all" or "block in all" is enough?

2010-07-29 Thread Peter Maxwell
; primary cause of a test failing. > > > > > Kind regards > > Greg > > > > From: allicient3...@gmail.com [allicient3...@gmail.com] On Behalf Of Peter > Maxwell [pe...@allicient.co.uk] > Sent: 29 July 2010 03:52 > To: Greg Hennessy > Cc: Spenst, Aleksej; fre

Re: For better security: always "block all" or "block in all" is enough?

2010-07-28 Thread Peter Maxwell
On 28 July 2010 20:39, Greg Hennessy wrote: > > > What disadvantages does it have in term of security in comparison with > > "block all"? In other words, how bad it is to have all outgoing ports > always > > opened and whether someone can use this to hack the sysem? > > > > It's the principle of

Re: can pf block a string ? or better, to limit it ?

2010-06-23 Thread Peter Maxwell
Hmmm, off the top of my head: I wonder if you could use Snort and have that do full packet inspection for you. Then you should be able to script an alert if the string is found and call pfctl to add the offending IP address to a table that blackholes it. Just a thought. Or if you want to do it "

Re: ping sendto: operation not permitted.

2010-04-16 Thread Peter Maxwell
Checking whether there is anything unexpected in the dmesg output and posting the output of pfctl -v -s a wouldn't hurt either. On 16 April 2010 14:57, jose ycogo wrote: > > > i think its best if you post your pf.conf > > cheers... > > > > > > From: Gaurav

Re: Fwd: Issues with pf and snmp

2010-04-15 Thread Peter Maxwell
On 16 April 2010 05:11, DAve wrote: > DAve wrote: > > Peter Maxwell wrote: > >> Can't see anything obvious but have you tried these things in the event > >> something strange is going on: > >> > >> - removing the scrub rule; > >> >

Fwd: Issues with pf and snmp

2010-04-09 Thread Peter Maxwell
Hit reply in haste and forgot to send to list... -- Forwarded message -- From: Peter Maxwell Date: 10 April 2010 01:16 Subject: Re: Issues with pf and snmp To: DAve On 9 April 2010 20:55, DAve wrote: > Peter Maxwell wrote: > > > > Hi DAve, > > &

Re: Issues with pf and snmp

2010-04-09 Thread Peter Maxwell
Hi DAve, This may be a daft question, but is the destination IP in your tcpdump of 10.0.241.41 (one of) the IP address(es) assigned to dc0? The next question isn't actually related to your problem; when you say "I've been working to enable pf on all our servers in preparation for moving them outs

Re: using pf to NAT with only one NIC

2010-02-05 Thread Peter Maxwell
Hi Maurice, Yes, you can do it without much difficulty and I've got my server setup in that manner: there's about twenty separate jails that can access the internet via specific NAT rules and incoming services handled via RDR rules. Note: you won't be able to ping from a jail, unless you want to

Re: Possible bug: pf ignores "reply-to" in block-rules

2010-01-29 Thread Peter Maxwell
Hi Kristian, This is quite late, so if my reply doesn't make and sense please ignore it ;-) Also, I'm not really answering your question, just suggesting an alternative. Instead of using reply-to, can the upstream device that is sending packets to the gif0 tunnel - or even pf if it works in thi

Re: freebsd 8

2010-01-08 Thread Peter Maxwell
2010/1/8 Olivier Thibault : > Le 08.01.2010 11:31, Peter Maxwell a écrit : >> >> 2010/1/8 Olivier Thibault : >> >>>> # keep stats of outging connections >>>> pass out keep state >>> >>> This rule allows everything out and next

Re: freebsd 8

2010-01-08 Thread Peter Maxwell
2010/1/8 Olivier Thibault : >> # keep stats of outging connections >> pass out keep state > > This rule allows everything out and next outgoing rules won't be checked as > this one first match. That's incorrect, pf does the opposite and uses the *last* match - at least that's what the documentati

Re: ftp problem

2010-01-06 Thread Peter Maxwell
2010/1/6 M. Keith Thompson : > I have a very screwy problem.  I have a pure-ftp server running pf on > FreeBSD 7.0.  For the most part the server works fine; users upload > and download multi-megabyte files daily.  However, I have one client > (HP-UX) that can not get files larger that 98K.  If I t

Re: External scripts with PF.

2009-12-21 Thread Peter Maxwell
2009/12/22 Gaurav Ghimire : > thinking if I could be informed via an email alert that  a new IP has > been added to the table abusive_ips.  It seems this would have been > possible if there was a possibility that I could trigger an external > script on the rule 3rd rule I have. And the external sc

Re: External scripts with PF.

2009-12-21 Thread Peter Maxwell
2009/12/21 Gaurav Ghimire : > Hi all, > > Are there any possibilities that I could run a script (bash, perl) when > any rule is matched. > > For example, I have some distinct rule and want to get an alert email > each time any connection threshold is crossed on it from a singe IP. Say > I want one

Re: External scripts with PF.

2009-12-21 Thread Peter Maxwell
2009/12/21 Tom Uffner : > Gaurav Ghimire wrote: >> >> Are there any possibilities that I could run a script (bash, perl) when >> any rule is matched. > > make sure the rule you want to trigger your script includes "log". > > have your script tail pflog, and watch for your trigger rule before > perf

Re: Lots of weird PF behavior on 7.2-STABLE

2009-12-15 Thread Peter Maxwell
2009/12/15 Linda Messerschmidt : > On Tue, Dec 15, 2009 at 11:08 AM, Peter Maxwell wrote: >> I'm pretty sure you can run tcpdump against a packet capture from the >> pflog interface on the pf box; that will include fields like >> block/pass and rule number for each p

Re: Lots of weird PF behavior on 7.2-STABLE

2009-12-15 Thread Peter Maxwell
Hi Linda, I'm pretty sure you can run tcpdump against a packet capture from the pflog interface on the pf box; that will include fields like block/pass and rule number for each packet filtered. That way you at least know what rule is dropping/passing your packets. And if my memory serves me righ

Re: something like bruteblock for pf?

2009-08-22 Thread Peter Maxwell
2009/8/23 Len Conrad : > > I'm looking for something like bruteblock that logwatches (smtp, ssh, ftp, > whatever) and inserts/removes TCP block rules into pf for x hours, so the > protocol daemons are involved. > Are you sure you really need this in the first place? Others may disagree, but th

Re: pf between two lans

2009-07-14 Thread Peter Maxwell
Comments inline... 2009/7/14 Aleksic Predrag : > On Tue, 14 Jul 2009 01:22:06 +0100 > Peter Maxwell wrote: > >  > Can you post the output of: pfctl -s r > > # pfctl -sr > scrub in all random-id fragment reassemble > block drop log (all) all > block drop in on sk0

Re: pf between two lans

2009-07-13 Thread Peter Maxwell
Hi Aleksic, On a cursory glance, your pf.conf looks ok. The tcpdump you supplied is showing both incoming and outgoing packets being blocked which is wierd - why would there be a return packet if the initial SYN didn't get through? Can you post the output of: pfctl -s r What happens if you try

Re: max-src-conn issue

2009-04-13 Thread Peter Maxwell
Hi Yuzhaninov, Interestingly enough, I checked the pf.conf man page for max-src-conn: "For stateful TCP connections, limits on established connections (connec- tions which have completed the TCP 3-way handshake) can also be enforced per source IP. max-src-conn Limits t

Re: [OT?] help w/ ip route to (cancel)

2009-01-17 Thread Peter Maxwell
Tommy, As I think you've discovered, you're probably after a NAT solution here rather than source/policy based routing. Best wishes, Peter 2009/1/17 Tommy Pham : > - Original Message > From: Tommy Pham > To: freebsd-pf@freebsd.org > Sent: Friday, January 16, 2009 8:39:36 PM > Subject:

Re: clientNatLookup: PF open failed: (13) Permission denied

2008-12-19 Thread Peter Maxwell
Hi Leslie, The message you're getting is usually associated with the rule base blocking an outbound connection - so check that you've opened all the outbound ports that squid needs in your pf.conf. Tip: you can use tcpdump to see what's going on, the openbsd pf pages at http://www.openbsd.org/faq

Re: kern/129060: [pf] [tun] pf doesn't forget the old tun IP

2008-11-22 Thread Peter Maxwell
I have only skim read the bug report, however in report it says "every second connection" which sounds like what happens when you have outgoing connections from an interface that has two IPs assigned (had got bitten with this when using IPSec over an interface that had two IPs assigned). Except th

Re: Blocking udp flood trafiic using pf, hints welcome

2008-11-09 Thread Peter Maxwell
Hi Elvir, I'd second the advice given further up the thread about getting your ISP to filter upstream - that's about the only really effective solution. Once UDP packets hit your firewall's external interface there's very little you can do about it. The only other advice I could offer is; i) Ma

pf not creating state on cloned local interface (with FreeBSD jail)

2008-09-09 Thread Peter Maxwell
Hi, Looking for anyone's help on this: I'm not sure if pf's behaviour is correct, if its a bug, if it is working correctly, or if I'm just trying to do something that really shouldn't be done. Anyway, my setup and issue is as follows: Kernel is GENERIC 7.0-STABLE #1, amd64 with IPSEC and ALTQ