From owner-freebsd-pf@FreeBSD.ORG Wed Feb 12 19:25:03 2014 Return-Path: Delivered-To: freebsd-pf@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 6D107A81 for ; Wed, 12 Feb 2014 19:25:03 +0000 (UTC) Received: from cell.glebius.int.ru (glebius.int.ru [81.19.69.10]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id E620114D6 for ; Wed, 12 Feb 2014 19:25:01 +0000 (UTC) Received: from cell.glebius.int.ru (localhost [127.0.0.1]) by cell.glebius.int.ru (8.14.8/8.14.8) with ESMTP id s1CJP0Yc027384 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Wed, 12 Feb 2014 23:25:00 +0400 (MSK) (envelope-from glebius@FreeBSD.org) Received: (from glebius@localhost) by cell.glebius.int.ru (8.14.8/8.14.8/Submit) id s1CJP0T9027383; Wed, 12 Feb 2014 23:25:00 +0400 (MSK) (envelope-from glebius@FreeBSD.org) X-Authentication-Warning: cell.glebius.int.ru: glebius set sender to glebius@FreeBSD.org using -f Date: Wed, 12 Feb 2014 23:24:59 +0400 From: Gleb Smirnoff To: Robert Simmons Subject: Re: PF in FreeBSD 10.0 Blocking Some SSH Message-ID: <20140212192459.GD26785@FreeBSD.org> References: <20140127192048.GS66160@FreeBSD.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.22 (2013-10-16) Cc: freebsd-pf@freebsd.org X-BeenThere: freebsd-pf@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: "Technical discussion and general questions about packet filter \(pf\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 12 Feb 2014 19:25:03 -0000 On Mon, Jan 27, 2014 at 10:22:30PM -0500, Robert Simmons wrote: R> > On Sun, Jan 26, 2014 at 06:19:34PM -0500, Robert Simmons wrote: R> > R> Over the course of a few hours there are a handful of SSH packets that R> > R> are being blocked both in and out. This does not seem to affect the R> > R> SSH session, and all the blocked packets have certain flags set [FP.], R> > R> [R.], [P.], [.], [F.]. The following is my ruleset abbreviated to the R> > R> rules that apply to this problem: R> > R> R> > R> ext_if = "en0" R> > R> allowed = "{ 192.168.1.10 }" R> > R> std_tcp_in = "{ ssh }" R> > R> block in log R> > R> block out log (user) R> > R> pass in quick on $ext_if proto tcp from $allowed to ($ext_if) port R> > R> $std_tcp_in keep state R> > R> R> > R> Why are those packets being blocked? R> > R> > Do I understand you correct that the ssh sessions work well, but you R> > see blocked packets in the pflog? R> R> Yes, this is correct. I have not seen this in the logs since R> yesterday, so it may have been a network issue. That could be stray retransmits of data that already been received and acknowledged. pf keeps track of sequence numbers in tcp connections flowing through it. -- Totus tuus, Glebius.