Re: UDP weirdness

2008-05-07 Thread Jon Radel
ween UDP and TCP. The documentation I've looked at has been silent on whether the default pass rule is expected to establish state (for versions of PF recent enough), and I'm not quite curious enough to build a testbed right now. If anyone knows the answer to this one, please do share. :-) --Jon Radel smime.p7s Description: S/MIME Cryptographic Signature

Re: a few problems with pf

2008-05-14 Thread Jon Radel
tends to cut off the more energetic ones. --Jon Radel smime.p7s Description: S/MIME Cryptographic Signature

Re: Why this rule doesn't score a match?

2008-07-23 Thread Jon Radel
g no, or minimal, "pass in" rules. That way people can't send you random, possibly nasty, packets which you accept simply because they used a source port of 80. --Jon Radel smime.p7s Description: S/MIME Cryptographic Signature

Re: keeping state on outgoing connections fails (?)

2008-09-03 Thread Jon Radel
Guido van Rooij wrote: > On Wed, Sep 03, 2008 at 08:42:52AM -0400, Jon Radel wrote: >> Guido van Rooij wrote: >>> Setup: FreeBSD 6.3 system with 2 interfaces: ep0 and bge0. >>> >>> ep0: 1.2.3.4/24 >>> bge0: 10.0.0.1/24 >>> >>> rule

Re: keeping state on outgoing connections fails (?)

2008-09-03 Thread Jon Radel
urn SYN/ACK comes in via bge0 and passes because of the state entry. > > Then the packet should be sent out via ep0, but it is blocked, as pflogd > shows: And does the problem go away when you put a "keep state" at the end of line 1? --Jon Radel smime.p7s Description: S/MIME Cryptographic Signature

Re: keeping state on outgoing connections fails (?)

2008-09-03 Thread Jon Radel
Guido van Rooij wrote: > On Wed, Sep 03, 2008 at 09:25:12AM -0400, Jon Radel wrote: >>> I did test the folowing ruleset: >>> pass in quick on ep0 inet from 1.2.3.1 to 10.0.0.2 keep state >>> block drop out log quick on ep0 all >>> pass out quick on bge0

Re: keeping state on outgoing connections fails (?)

2008-09-03 Thread Jon Radel
Guido van Rooij wrote: > On Wed, Sep 03, 2008 at 10:13:08AM -0400, Jon Radel wrote: >>> And why is that so? This bascially rules out keep state on outgouing packets >>> on any router-type system. That seems like an unnecessary limitation. >> What? If you want state,

Re: keeping state on outgoing connections fails (?)

2008-09-03 Thread Jon Radel
ing > along the lines of: > > block drop all > > pass in on ep0 inet from 1.2.3.1 to 10.0.0.2 keep state flags S/SA > pass out on bge0 inet from 1.2.3.1 to 10.0.0.2 keep state flags S/SA > The OP didn't like that answer when I gave it to him. Maybe you've managed to provide a more felicitous wording. ;-) --Jon Radel smime.p7s Description: S/MIME Cryptographic Signature

Re: keeping state on outgoing connections fails (?)

2008-09-03 Thread Jon Radel
originally established by a packet outbound on bge0 might cross on either bge0 or bge1 traveling in the same direction with respect to the FreeBSD router with the configuration. In this case we're talking about packets that are traveling in one direction with respect to the router on bge0 and the other direction on ep0, so you'd need separate state entries no matter what you've done with if-bound. --Jon Radel smime.p7s Description: S/MIME Cryptographic Signature

Re: PF syntax error

2008-10-15 Thread Jon Radel
y to any port 22 flags S/SA \ > keep state(max-src-conn 15, max-src-conn-rate 5/3, overload > flush global) And here I thought "keep state" was the default in the pf shipped with FreeBSD 7.0.... Actually, it is, as is "flags S/SA" on TCP connections. Those defaults came in with the PF from OpenBSD 4.1, which is what is used in FreeBSD 7.0. --Jon Radel smime.p7s Description: S/MIME Cryptographic Signature

Re: PF syntax error

2008-10-15 Thread Jon Radel
he end of the first line has no space or tab character after it and is escaping the newline character? You're trying to split a single line into two, and that has to be done just so. --Jon Radel smime.p7s Description: S/MIME Cryptographic Signature

Re: basic rule request - allow_all/block_bad

2009-01-21 Thread Jon Radel
ner, feel free to rip that all out ;-) After you get that running, I'd suggest you start making things fancier with Miroslav's recommendation about using a table, putting in scrub with some of the less agressive options, protecting yourself from packets with spoofed addresses, etc.,

OT Spam technology was: Re: The "Military, Industrial Complex" is no more -- The Hidden Massive Racial Discrimination in America against Whites

2009-01-30 Thread Jon Radel
Ivan Petrushev wrote: > So there is not spam protection or whatever installed on the software > servicing the mail list? Abuse control? User registration approval? > > On Fri, Jan 30, 2009 at 8:46 AM, Jon Radel wrote: >> Ivan Petrushev wrote: >>> Excuse me, why such

Re: Question about numbers of connections

2009-05-13 Thread Jon Radel
. I've upgraded a bit by now but mainly just because rather than to solve any particular issue. Without knowing more about the traffic to be put across the machine, about the only real answer is: Try it and see what happens. -- --Jon Radel j...@radel.com smime.p7s Description: S/MIME Cryptographic Signature

Re: For better security: always "block all" or "block in all" is enough?

2010-07-28 Thread Jon Radel
to stage attacks on other machines. On the other hand, if the firewall is on the server in question, rather than being another piece of equipment, anybody who has root can rearrange your firewall for you -- --Jon Radel j...@radel.com

Re: update rules

2011-05-06 Thread Jon Radel
enBSD website, in particular something like http://openbsd.org/faq/pf/index.html and then ask follow-up questions on the appropriate OpenBSD mailing list. --Jon Radel j...@radel.com ___ freebsd-pf@freebsd.org mailing list http://lists.freebsd.org/ma

Re: WAN load balance with PF

2012-11-20 Thread Jon Radel
Yes, use a switch that handles vlans and make use of them. --Jon Radel j...@radel.com Sent from my iPad On Nov 20, 2012, at 2:15, Hooman Fazaeli wrote: > > With a topology like: > - ADSL 1 > LAN PF Box