pf route-to reply-to ipv6 link local address does not work

2021-10-05 Thread Pierre-Edouard
Running openbsd 6.9 stable here I am not able to use a pf rule using route-to/reply-to with an ipv6  linklocal address. example: pass out inet6 route-to fe80::abcd%em0 The syntax is valid and therefore is accepted but the "%em0" is striped out when config is pushed. The packe

Re: pf reply-to and dest mac address

2020-01-09 Thread openbsd
Hello, Managed to figure it out. Apparently one also need to specify the default gateway of the interface in question (vlan10 in this case). So this set works: table { 4.3.2.1 } pass in quick on vlan10 proto icmp reply-to (vlan10 ) Anyone has any idea why? From the generated rule it is

pf reply-to and dest mac address

2019-12-19 Thread openbsd
Hello, I am trying out the reply-to option in pf to force icmp echo replies back on the same interface (vlan10) where they came in. The problem I am seeing is that the destination mac address of the replies are set to ethernet next-hop of the default route (vlan11). Am I using this correctly

Re: pf.conf "reply-to" routing parameter seemingly not working?

2018-05-12 Thread Joseph Crivello
Apologies, correction: obsd3# pfctl -f /etc/pf.conf Should be: obsd2# pfctl -f /etc/pf.conf Joe On Sat, May 12, 2018 at 9:37 PM Joseph Crivello wrote: > I cannot get reply-to working with if-bound under any circumstances. It > works fine with floating, though. > Is this expected

Re: pf.conf "reply-to" routing parameter seemingly not working?

2018-05-12 Thread Joseph Crivello
I cannot get reply-to working with if-bound under any circumstances. It works fine with floating, though. Is this expected behavior? The (similar) route-to option works fine with if-bound rules, and I cannot find any documentation that states reply-to cannot be used with if-bound rules. Assuming

pf.conf "reply-to" routing parameter seemingly not working?

2018-05-09 Thread Joe Crivello
routing table entries that forward to router #2 on gif0. My objective is to configure an additional pass rule that would allow SSH traffic destined for router #1 to pass in and out on trunk0. The problem is that the aforementioned routes on gif0 cause packets sent in reply to incoming SSH traffic to

reply-to/dup-to/route-to hostdecl detailed explannation

2016-09-29 Thread sven falempin
would be usefull, route-to (tun0:peer)@tun0 feels 'legit' 1 pass in quick on vether2 from (vether2:network) to 10/8 rdr-to 10.1.2.3 2 pass in quick on vether2 from (vether2:network) to 10/8 rdr-to 10.1.2.3 reply-to 172.16.1.8@em5 3 pass in quick on vether2 from (vether2:network) to 1

Re: reply-to for blocked packets

2015-08-04 Thread Giancarlo Razzolini
y are the only solution, but it seems to be the easiest one to deploy, in your case. > if block rules with return do create a state, why do they not respect > the reply-to ? Now you got me. I would need to read the source to answer you, but I believe that reply-to ends up only working f

Re: reply-to for blocked packets

2015-08-04 Thread Kapetanakis Giannis
t a packet leaving a interface but it should be on the other, you force route-to rules (not reply-to) on them. Block rules with return do create states, but as soon as the packet is sent, they enter in TIME_WAIT status (as it should be). Do you really, really, need to return the packets? Perhaps in you

Re: reply-to for blocked packets

2015-08-03 Thread Giancarlo Razzolini
be on the other, you force route-to rules (not reply-to) on them. Block rules with return do create states, but as soon as the packet is sent, they enter in TIME_WAIT status (as it should be). Do you really, really, need to return the packets? Perhaps in your case you can benefit from routing

reply-to for blocked packets

2015-08-03 Thread Kapetanakis Giannis
on $vlan10_if from reply-to ($vlan10_if $vlan10_gw) @50: block return in quick log on $vlan20_if from reply-to ($vlan20_if $vlan20_gw) Default gw is on vlan10 interface. When I try to connect on second interface (vlan20) the returns are coming from first interface (vlan10). pflog: Aug 03 11

Re: pf / ping and reply-to

2014-04-01 Thread Kapetanakis Giannis
) flags S/SA keep state (no-sync) reply-to 10.1.101.1@vlan101 pass out log quick inet from any to 192.168.1.1 flags S/SA The actual rule is: pass in quick log on $mgmt_if from $admin to ($mgmt_if) keep state (no-sync) reply-to ($mgmt_if $mgmt_gw) On pf log I get Apr 01 18:24:03.077339 rule 0/(match

pf / ping and reply-to

2014-04-01 Thread Kapetanakis Giannis
Hi, I had the following rule in pf which served me well so far. After updating today to current (from 5.4 Jan) icmp replied from firewall stopped working. # pfctl -sr | head -2 pass in log quick on vlan101 inet from 192.168.1.1 to (vlan101) flags S/SA keep state (no-sync) reply-to

Re: Unexpected reply-to behavior.

2014-03-01 Thread Peter Bisroev
will it honor the reply-to filter option. To get that to work however, an interface that is a reply-to target must be processed by pf, and in my case, both interfaces which I have used as targets for default routes (vio0 and vio1) were skipped by pf (set skip on vio*). To figure this out it was

Unexpected reply-to behavior.

2014-02-28 Thread Peter Bisroev
Hi All, I have a question regarding ‘reply-to’ with pf.conf and its expected behavior. I have tested this on 5.2, 5.3, 5.4 and latest snapshot from 20140228. It could well be that I am doing something wrong but after reading pf.conf manpage, FAQs on openbsd.org and searching the mailing lists I

Pfsync states and reply-to

2013-10-15 Thread Dariusz Binkul
Hello, Does pfsync currently support failover of a pf established 'reply-to'/'route-to' states when Carp failover happens? I`ve noticed that states created with pf rules that contains 'reply-to'/'route-to', after switching to backup server are using defau

Block with reply-to

2013-09-27 Thread Dariusz Binkul
Fellow users, do I understand correctly that RST replies to packets blocked with pf cannot be arbitrarily routed? pf.conf(5) says that "(...) reply-to is useful only in rules that create state". Since 'block' and 'match' rules seem to (understandably) not cre

using macros with reply-to

2012-11-01 Thread Fernando Braga
Hi, I had this pf rules int_if = "trunk1" cosmo = 172.16.99.249 pass in on $int_if from to ! route-to $cosmo@$int_if However, when I issue a pfctl -sr, I get pass in on trunk1 inet from to ! flags S/SA route-to 172.16.99.249@$int_if Shouldn't this @$int_if be translated to trunk1 ? Is th

Re: OBSD51: using macros with reply-to

2012-11-01 Thread Fernando Braga
Hi Patrick, Thanks for your response. I've also been using this legacy format, but when I tried the new format, pfctl didn't complain, but didn't apply it. sperreault@ confirmed this is a known issue, and will be addressed in time. Thanks for you attention. On Thu, Nov 1, 2012 at 4:33 PM, Pat

Re: OBSD51: using macros with reply-to

2012-11-01 Thread Patrick Lamaiziere
Le Thu, 1 Nov 2012 13:28:18 -0200, Fernando Braga a écrit : Hello, > pass in on $int_if from to ! route-to > $cosmo@$int_if > > However, when I issue a pfctl -sr, I get > > pass in on trunk1 inet from to ! flags S/SA > route-to 172.16.99.249@$int_if > > Shouldn't this @$int_if be translat

Re: OBSD51: using macros with reply-to

2012-11-01 Thread Gleydson Soares
the syntax should be like this: pass in on $int_if from to ! route-to ($int_if $cosmo) On Thu, Nov 1, 2012 at 1:28 PM, Fernando Braga wrote: > Hi, > > I had this pf rules > > int_if = "trunk1" > cosmo = 172.16.99.249 > > pass in on $int_if from to ! route-to $cosmo@$int_if > > However, when I

OBSD51: using macros with reply-to

2012-11-01 Thread Fernando Braga
Hi, I had this pf rules int_if = "trunk1" cosmo = 172.16.99.249 pass in on $int_if from to ! route-to $cosmo@$int_if However, when I issue a pfctl -sr, I get pass in on trunk1 inet from to ! flags S/SA route-to 172.16.99.249@$int_if Shouldn't this @$int_if be translated to trunk1 ? Is th

Re: pf: multiple reply-to rules; could it be done more simple?

2012-08-03 Thread Vadim Zhukov
-- > ext_if0 = "tun0" > ext_if1 = "tun1" > ext_if2 = "tun2" > int_fw = # my internal firewall's address > ... > > pass in quick on $ext_if0 proto udp from any to any port 1194 \ > rdr-to $int_fw port 1

pf: multiple reply-to rules; could it be done more simple?

2012-08-03 Thread Dr.-Ing. Torsten Finke
from any to any port 1194 \ rdr-to $int_fw port 1194 reply-to ( $ext_if0 $ext_if0:peer ) pass in quick on $ext_if1 proto udp from any to any port 1194 \ rdr-to $int_fw port 1194 reply-to ( $ext_if1 $ext_if1:peer ) pass in quick on $ext_if2 proto udp from any to any port 1194 \ rdr-to $i

reply-to option for udp port 1194 ( for OpenVPN)

2012-02-02 Thread Indunil Jayasooriya
ass in quick log on $vpn pass out quick log on $vpn pass in log on $wan_if inet proto udp from any to $wan_if \ port 1194 reply-to ($wan_if $wan_gw) I need your advice to solve this issue? Anyway, if i set to with TCP like this pass in log on $wan_if inet proto tcp from any to $wan_if \

Re: "reply-to" rule and carp ?

2011-12-22 Thread Otto Moerbeek
t could > be done using "reply-to" pf keyword. > however, I'm not sure "reply-to" is runnung well with carp. Can anyone > proof such thing ? > > I did > > set skip on lo > > pass in to X.X.X.X reply-to (carp5 X.X.X.N) > pass in to Y.Y.

"reply-to" rule and carp ?

2011-12-22 Thread Илья Шипицин
hello! I'm running multihomed server (two servers in carp cluster). say carp5 is default route and carp2 is another ISP. I want to see outgoing packets in the interface they came in. I supposed, it could be done using "reply-to" pf keyword. however, I'm not sure "reply

How to use relayd with reply-to ?

2011-11-14 Thread Olivier Cochard-Labbé
Hi all, I want to set-up a service redirector with relayd and the reply-to feature of pf.conf, but I meet a problem: The reply-to pf rule is matched, but there is no modification of the return traffic (the firewall send the reply to the default gateway and not to the gateway forced in the reply-to

Re: reply-to/return-path mail/smtpd question

2010-04-20 Thread Jacek Masiulaniec
On Mon, Mar 22, 2010 at 06:05:37PM +0100, Didier Wiroth wrote: > Hello, > (I'm using current with smtpd.) > I'm sending mail reports to a mail address which is defined in the > alias file like this: > didier: dwir...@company.com > > My smtpd.conf is: > listen on lo0 > map "aliases" { source db "/e

reply-to/return-path mail/smtpd question

2010-03-22 Thread Didier Wiroth
Hello, (I'm using current with smtpd.) I'm sending mail reports to a mail address which is defined in the alias file like this: didier: dwir...@company.com My smtpd.conf is: listen on lo0 map "aliases" { source db "/etc/mail/aliases.db" } accept for local deliver to mbox accept for all relay via m

Re: pf reply-to not really working

2009-12-09 Thread Sunnz
Found a fix for it... reply-to ($www_if ($www_if)) Got to put brackets around $www_if now.

Re: pf reply-to not really working

2009-12-09 Thread Sunnz
"pppoe0" www_if = "pppoe1" set skip on {lo rl0} match out on $nat_if inet from nat-to ($nat_if:0) pass# to establish keep-state pass in log on $www_if \ inet proto {tcp udp} \ reply-to ($www_if $www_if) # By default, do not permit remote connections

Re: pf reply-to not really working

2009-12-09 Thread Jussi Peltola
Check that another pass rule later in the file is not overriding it. Maybe try with quick.

pf reply-to not really working

2009-12-08 Thread Sunnz
I have 2 pppoe connections pppoe0 and pppoe1. pppoe0 is my default gateway and people can access my http server via its IP address. But it is not working for pppoe1's IP address. I tried the following pf rule for pppoe1: pass in log on pppoe1 \ inet proto {tcp udp} \ rep

Re: route-to/reply-to broken?

2009-10-29 Thread Stuart Henderson
In case people reading this thread didn't notice the commits yet, this works again in -current (thanks jsg and claudio). Make sure you upgrade pfctl and kernel together.

Re: route-to/reply-to broken?

2009-10-09 Thread Vadim Zhukov
Hello, Stuart. On 8 October 2009 G. 15:03:13 Stuart Henderson wrote: > On 2009-09-25, Vadim Zhukov wrote: > > 2. Is it OK if I'll hack it to make possible even crazy rule like > > this: > > > > pass in on $if1 from $a to $b rdr-to $c \ > > ro

Re: route-to/reply-to broken?

2009-10-08 Thread Stuart Henderson
On 2009-09-25, Vadim Zhukov wrote: > 2. Is it OK if I'll hack it to make possible even crazy rule like this: > > pass in on $if1 from $a to $b rdr-to $c \ > route-to ($if3 $gt3) reply-to ($if2 $gt2) dup-to $if4 > > ... or it's not intended to be so, or it&

Re: route-to/reply-to broken?

2009-09-25 Thread Vadim Zhukov
On 25 September 2009 11:49:48 Henning Brauer wrote: > On 25 September 2009 08:34:03 Vadim Zhukov wrote: > > So as far as I can understand, pf_rule.rdr pool is used for > > route-to/reply-to/dup-to options. Now I have a few stupid questions: > > > > 1. Is it intended to

Re: route-to/reply-to broken?

2009-09-25 Thread Henning Brauer
* Vadim Zhukov [2009-09-25 06:36]: > Hello all, especially network hackers (you write cool code, BTW, thanks!) > > (Sending this email to another list as now it's more technical. I hope) > > Stupid me finally found the reasons for such route-to/reply-to behavior: >

Re: route-to/reply-to broken?

2009-09-24 Thread Vadim Zhukov
Hello all, especially network hackers (you write cool code, BTW, thanks!) (Sending this email to another list as now it's more technical. I hope) Stupid me finally found the reasons for such route-to/reply-to behavior: /usr/src/sbin/pfctl/parse.y (introduced in 1.563 and modified

Re: route-to/reply-to broken on amd64?

2009-09-18 Thread Michael
Hi, Am 11.09.2009 00:58, schrieb Laurent Ghigonis: > On Fri, 11 Sep 2009 02:23:54 +0400 > Vadim Zhukov wrote: >> Hello all. >> >> Can anyone ack that route-to/reply-to rules do not work on amd64? >> I have the following rule in pf.conf: >> >> pass in qu

Re: route-to/reply-to broken on amd64?

2009-09-10 Thread Laurent Ghigonis
On Fri, 11 Sep 2009 02:23:54 +0400 Vadim Zhukov wrote: > Hello all. > > Can anyone ack that route-to/reply-to rules do not work on amd64? > I have the following rule in pf.conf: > > pass in quick on $limit_if inet proto icmp icmp-type echoreq \ > reply-to ($limit_

route-to/reply-to broken on amd64?

2009-09-10 Thread Vadim Zhukov
Hello all. Can anyone ack that route-to/reply-to rules do not work on amd64? I have the following rule in pf.conf: pass in quick on $limit_if inet proto icmp icmp-type echoreq \ reply-to ($limit_if $limit_gw) It does not work (IPs replaced via corresponding macros by me), see tcpdump(8

Re: PF-Changes: reply-to

2009-09-06 Thread Insan Praja SW
Hi Henning and Misc@, On Sun, 06 Sep 2009 21:21:15 +0700, Henning Brauer wrote: * Insan Praja SW [2009-09-06 16:10]: Hi Misc@, I can't seem to use this syntax any more: pass in quick log on vlan101 reply-to {(vlan101 a.b.c.14)} inet proto icmp from to vlan101:0 keep state (s

Re: PF-Changes: reply-to

2009-09-06 Thread Henning Brauer
* Insan Praja SW [2009-09-06 16:10]: > Hi Misc@, > I can't seem to use this syntax any more: > > pass in quick log on vlan101 reply-to {(vlan101 a.b.c.14)} inet proto > icmp from to vlan101:0 keep state (sloppy source-track > global) flags any tag INTERNAL_IN &g

PF-Changes: reply-to

2009-09-06 Thread Insan Praja SW
Hi Misc@, I can't seem to use this syntax any more: pass in quick log on vlan101 reply-to {(vlan101 a.b.c.14)} inet proto icmp from to vlan101:0 keep state (sloppy source-track global) flags any tag INTERNAL_IN while this is working: pass in quick log on vlan101 reply-to {(vlan101

reply-to , route-to

2009-09-03 Thread dark knight neo
s form rdr pass on $ext_if proto tcp from xxx to port 443 -> 192.168.0.1 port 443 nat on $int_if from any to 192.168.0.1 -> ($int_if:0) how to create a rule with reply-to or route-to ? I Sniffed traffic on comp2 and the requisition is the external ip Exists one form without nat on int_if

reply-to

2009-09-01 Thread dark knight neo
rt 443 -> 192.168.0.1 port 443 nat on $int_if from any to 192.168.0.1 -> ($int_if:0) how to create a rule with reply-to ? Thanks in advanced

Re: reply-to header

2009-08-11 Thread Simon Morvan
Le 09/08/2009 20:55, Samuel Baldwin a C)crit : Would it be possible for this to be set when the list delivers mail? Most other mailing lists do and it's a bit of a lifesaver for those who are used to hitting "reply" to reply to the list. Doesn't your mail client fea

Re: reply-to header

2009-08-11 Thread Nick Holland
Samuel Baldwin wrote: > Would it be possible for this to be set when the list delivers mail? > Most other mailing lists do and it's a bit of a lifesaver for those > who are used to hitting "reply" to reply to the list. > life saver? You think it safer to reply to the l

pf, route-to/reply-to and synproxy

2009-08-10 Thread Tom
ppoe0 inet proto tcp from any to (pppoe0) port 25 -> 192.168.0.50 rdr on pppoe1 inet proto tcp from any to (pppoe1) port 25 -> 192.168.0.50 pass in on pppoe0 reply-to { pppoe0 0.0.0.1 ) proto tcp to 192.168.0.50 port 25 flags S/SA synproxy state pass in on pppoe1 reply-to { pppoe1 0.0.0.

reply-to header

2009-08-09 Thread Samuel Baldwin
Would it be possible for this to be set when the list delivers mail? Most other mailing lists do and it's a bit of a lifesaver for those who are used to hitting "reply" to reply to the list. -- Samuel Baldwin - logik.li

netiquette: please don't post to misc with a spamtrap as reply-to

2008-02-27 Thread Peter N. M. Hansteen
I find it somewhat astonishing, bordering on the incredible, that someone who claims to be knowledgeable about such things as spamd and a few related pieces of software would first post to this list with a reply-to address that the recipient mail server bounces as undeliverable, then later

Re: reply-to rule not working

2007-11-08 Thread RW
On Thu, 8 Nov 2007 20:40:00 -0500, Steven Surdock wrote: >> I assume you are running OpenVPN in UDP mode? ... > >Yes. But I also run a second OpenVPN process in TCP mode (port 443) to >get around a few (very few) places that still only allow 80/443. UDP >has less overhead and "feels" faster, but

Re: reply-to rule not working

2007-11-08 Thread Steven Surdock
Nick Golder wrote: > On 2007-11-07 14:29 -0500, Steven Surdock wrote: >> Nick Golder wrote stuff: ... > Is this a PF bug? [Shrug]. They way it _seemed_ to work (for me, when I implemented the system back on 3.8 or 3.9, YMMV) was that "route-to/reply-to" caused the packet

Re: reply-to rule not working

2007-11-08 Thread Nick Golder
On 2007-11-07 14:29 -0500, Steven Surdock wrote: > Nick Golder wrote: > > I am trying to serve out OpenVPN (port 1194 UDP) through > > multiple external > > I solved this problem by running OpenVPN on the loopback only and using > "rdr" and " > pass in o

Re: reply-to rule not working

2007-11-07 Thread Steven Surdock
Nick Golder wrote: > I am trying to serve out OpenVPN (port 1194 UDP) through > multiple external I solved this problem by running OpenVPN on the loopback only and using "rdr" and " pass in on $if reply-to...) on the incoming traffic. -Steve S.

reply-to rule not working

2007-11-07 Thread Nick Golder
I am trying to serve out OpenVPN (port 1194 UDP) through multiple external interfaces. It works fine for the external interface $ext_if1 which has a default route. When I try to serve port 1194 out on $ext_if2 using 'reply-to', tcpdump shows the packets arrive in on $ext_if2 but the r

Re: mutt + reply-to

2007-11-03 Thread Sean Darby
Hi, Thank you for correcting me. I did as you noted, placed those lines in openbsd-submit.mc (at the bottom). Here's the 'make' step, from /usr/share/sendmail/cf/, it had an error: $ sudo make openbsd-submit.cf rm -f openbsd-submit.cf ( cd /usr/share/sendmail/cf && /usr/bin/m4 /usr/share/sendma

Re: mutt + reply-to

2007-11-03 Thread Sean Darby
> I went ahead and made a backup of /etc/mail/submit.cf and copied it into > (replacing) /etc/mail/submit.cf. > > Correction: I copied the newly created openbsd-submit.cf into/replacing > /etc/mail/submit.cf.

Re: mutt + reply-to

2007-11-03 Thread Ingo Schwarze
Hi Sean, > I realize this isn't directly OpenBSD-related, though believe I came > across a message in misc a while back That was me (on ports@, not misc@). > that discussed including a reply-to field in mutt. Er, well, mutt is able to set the Reply-To: all right. It is trivial to

Re: mutt + reply-to

2007-11-03 Thread Stuart Henderson
On 2007/11/03 05:59, Sean Darby wrote: > 1. cd /etc/mail/ You are confused between /etc/mail (dir holding config files used by sendmail) and /usr/share/sendmail/cf (dir holding files used to *build* these config files). cd /usr/share/sendmail/cf copy submit.mc to openbsd-submit.mc and add these l

Re: mutt + reply-to

2007-11-03 Thread Sean Darby
Thank you! :^) So would I do this: 1. cd /etc/mail/ 2. cp submit.cf openbsd-submit.cf 3. ...add this to openbsd-submit.cf: define(`confCT_FILE', `-o MAIL_SETTINGS_DIR`'trusted-users')dnl FEATURE(`use_ct_file')dnl 4. make openbsd-submit.cf (while in /etc/mail/) 5. cp openbsd-submit.cf sendmail.c

Re: mutt + reply-to

2007-11-03 Thread Antoine Jacoutot
On Sat, 3 Nov 2007, Stuart Henderson wrote: type 'make openbsd-submit.cf' and copy the resulting file to /etc/mail/sendmail.cf Shouldn't it be /etc/mail/submit.cf -- Antoine

Re: mutt + reply-to

2007-11-03 Thread Stuart Henderson
On 2007/11/03 11:01, Antoine Jacoutot wrote: > On Sat, 3 Nov 2007, Stuart Henderson wrote: >> type 'make openbsd-submit.cf' and copy the resulting file to >> /etc/mail/sendmail.cf > > Shouldn't it be /etc/mail/submit.cf Yes, oops!

Re: mutt + reply-to

2007-11-03 Thread Stuart Henderson
On 2007/11/02 18:48, Sean Darby wrote: > Thank you very much for the info! I appreciate it a lot. > > I've now updated my /etc/mail/trusted-users file with my "[EMAIL PROTECTED]" > address (which is what I currently have in my "from:" field in my muttrc). > > Regarding the link you provided (on c

Re: mutt + reply-to

2007-11-02 Thread Okan Demirmen
On Fri 2007.11.02 at 18:53 -0500, Sean Darby wrote: > I'm still running OpenBSD 4.1, my mutt is at 1.4.2.2i (2006-07-14). > > Is there a way to get mutt 1.5.15+ while still on 4.1? well, not officially...it is in 4.2 however :) > What can I find out about that > smtp_url variable? (How to use it

Re: mutt + reply-to

2007-11-02 Thread Sean Darby
> er, no. > > /usr/share/sendmail/README: > names of users that will be ``trusted'', that is, able to > set their envelope from address using -f without generating > a warning message. > > In other words, you list your local Unix user in the file, not an email > address. > > DS > Okay. My lo

Re: mutt + reply-to

2007-11-02 Thread Darren Spruell
On Nov 2, 2007 4:48 PM, Sean Darby <[EMAIL PROTECTED]> wrote: > Hi Stuart, > > Thank you very much for the info! I appreciate it a lot. > > I've now updated my /etc/mail/trusted-users file with my "[EMAIL PROTECTED]" > address (which is what I currently have in my "from:" field in my muttrc). er,

Re: mutt + reply-to

2007-11-02 Thread Sean Darby
Hi Okan, Thank you for the info - very much appreciated. I'm still running OpenBSD 4.1, my mutt is at 1.4.2.2i (2006-07-14). Is there a way to get mutt 1.5.15+ while still on 4.1? (Hopefully without messing with any current emails/settings or 4.1settings.) I'm not a pro with computers but alwa

Re: mutt + reply-to

2007-11-02 Thread Sean Darby
Hi Stuart, Thank you very much for the info! I appreciate it a lot. I've now updated my /etc/mail/trusted-users file with my "[EMAIL PROTECTED]" address (which is what I currently have in my "from:" field in my muttrc). Regarding the link you provided (on cvs.openbsd.org...) How would I use tha

mutt + reply-to

2007-11-02 Thread Sean Darby
Hello, I realize this isn't directly OpenBSD-related, though believe I came across a message in misc a while back that discussed including a reply-to field in mutt. Lately I have been having difficulty getting my mutt mail to successfully deliver to several addresses. Google mail do

Re: mutt + reply-to

2007-11-02 Thread Okan Demirmen
On Fri 2007.11.02 at 22:50 +, Stuart Henderson wrote: > On 2007/11/02 17:38, Sean Darby wrote: > > > I checked the full headers and found: > > > X-Authentication-Warning: (myhostname): sean set > > > sender to (alternateaddress) using -f > > this can be fixed with something like > http://cvs.o

Re: mutt + reply-to

2007-11-02 Thread Stuart Henderson
On 2007/11/02 17:38, Sean Darby wrote: > > I checked the full headers and found: > > X-Authentication-Warning: (myhostname): sean set > > sender to (alternateaddress) using -f this can be fixed with something like http://cvs.openbsd.org/cgi-bin/query-pr-wrapper?full=yes&numbers=4951 (and add yours

mutt + reply-to

2007-11-02 Thread Sean Darby
> Hello, > > I realize this isn't directly OpenBSD-related, > though believe I came across a message in misc a > while back that discussed including a reply-to field > in mutt. > > Lately I have been having difficulty getting my mutt > mail to successfully delive

Re: pf route-to vs reply-to

2007-04-27 Thread Stuart Henderson
s in on $lan proto ... pass out on egress route-to ($wan1 $gw1) ... from $wan1:0 ... > Ok, now I want to redirect http traffic on $wan1 to an internal server, > is this the time to use reply-to??> Is this enough to make it work, or > are additional rules needed? yes, should be enoug

pf route-to vs reply-to

2007-04-27 Thread Johan Linner
Hi, I am trying to understand the differences between route-to and reply-to in pf. Have not found any good examples in man(pf.conf) or Google. 2 wan connections, I want the traffic from the internal lan ($lan) to go through the wan1 ($wan1) connection via NAT. Wan1 is not the default route

Re: reverse ftp-proxy and reply-to?

2007-03-17 Thread Raja Subramanian
On 3/17/07, Sebastian Reitenbach <[EMAIL PROTECTED]> wrote: I use ftp-proxy on my firewall as a reverse proxy for a host on the dmz. Please find Bill Marquette's ftp-proxy patch from pfSense CVS: http://cvstrac.pfsense.com/dirview?d=tools/pfPorts/pftpx-routeto I'm successfully using this in

Re: reverse ftp-proxy and reply-to?

2007-03-17 Thread Camiel Dobbelaar
On Sat, 17 Mar 2007, Sebastian Reitenbach wrote: > I use ftp-proxy on my firewall as a reverse proxy for a host on the dmz. The > incoming connections come in on one of the the external interfaces, which is > not the default gateway of the firewall. Therefore I use reply-to statements

reverse ftp-proxy and reply-to?

2007-03-17 Thread Sebastian Reitenbach
Hi list, I use ftp-proxy on my firewall as a reverse proxy for a host on the dmz. The incoming connections come in on one of the the external interfaces, which is not the default gateway of the firewall. Therefore I use reply-to statements on the pass in rules to make sure the answer packets are

problems with reply-to and carped firewall

2007-03-15 Thread Sebastian Reitenbach
connect to the external $cable_mail_ip, with the second reply-to rule, where I use ($cable_if $cable_gate) then the packets are going into the firewall, to the DMZ host. The DMZ host is answering, and the packets arrive again on the firewall, but then they disappear. I had a tcpdump running on all my

Re: problems with reply-to and carped firewall

2007-03-15 Thread Stuart Henderson
statement. The route-to ($cable_if > > $cable_gate) > > sends out my > > packets with the MAC address of the carp device, so this works well, as I > > expect. But when I > > try to connect to the external $cable_mail_ip, with the second reply-to > > rule, &

Re: problems with reply-to and carped firewall

2007-03-15 Thread Sebastian Reitenbach
nds out my > packets with the MAC address of the carp device, so this works well, as I > expect. But when I > try to connect to the external $cable_mail_ip, with the second reply-to rule, > where I use > ($cable_if $cable_gate) then the packets are going into the firewall, to the D

problems with reply-to and carped firewall

2007-03-15 Thread Sebastian Reitenbach
second reply-to rule, where I use ($cable_if $cable_gate) then the packets are going into the firewall, to the DMZ host. The DMZ host is answering, and the packets arrive again on the firewall, but then they disappear. I had a tcpdump running on all my interfaces, but they did not showed up