From owner-freebsd-security@freebsd.org Tue Jun 30 08:52:32 2015 Return-Path: Delivered-To: freebsd-security@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 71A839901A1 for ; Tue, 30 Jun 2015 08:52:32 +0000 (UTC) (envelope-from kalin@el.net) Received: from mail-ig0-f169.google.com (mail-ig0-f169.google.com [209.85.213.169]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 481AF14C1 for ; Tue, 30 Jun 2015 08:52:31 +0000 (UTC) (envelope-from kalin@el.net) Received: by igblr2 with SMTP id lr2so7778943igb.0 for ; Tue, 30 Jun 2015 01:52:25 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:date:message-id:subject:from:to :content-type; bh=J9c1jVVrE6Le/8lEEE46Xw0KC/PabC+IYdC4MHcfWl4=; b=ftLh6v5b7963vtYYhveLWXj3kCNC0dxzId7S9zKGN90Egmhe9+g5ct5gPpoT78b+2V QnUg9+OhX5lmGk61uuc9Hc09YaOTmT454smghQH/jsmZe1b/UOdIsaVj/XEBDMPLId8L J5S6hDWKaxR7ALK8VrBKLCIMm0RWV14PFleLqk43x1HCPSnhZ321tofO6V5ItIhtsAzh t9Ah58DnfyWNGa0F5GbStTrJlGd+bh0YRcOjLHCc6B82qv2Mu78/9BCTkG/H3KezvID+ uCHzdSSTAXC/v8oGkxAiCrbQc+trA7N0gbuarHouO7zxqVCvypc+UVzi0EN2SwGMb5jE NoCw== X-Gm-Message-State: ALoCoQkSRNoBhFdFdhcUSR9otJOZF9EzLvdn97f0N5386o2DfGwcnTbkFl/oNHxurZixpiRwfnzX MIME-Version: 1.0 X-Received: by 10.50.102.68 with SMTP id fm4mr22446207igb.25.1435654003310; Tue, 30 Jun 2015 01:46:43 -0700 (PDT) Received: by 10.36.44.203 with HTTP; Tue, 30 Jun 2015 01:46:43 -0700 (PDT) Date: Tue, 30 Jun 2015 04:46:43 -0400 Message-ID: Subject: pf From: el kalin To: freebsd-security@freebsd.org Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.20 X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 30 Jun 2015 08:52:32 -0000 what exactly needs to happened in pf.conf so a range of ips gets blocked?! in this case he range in is not blocked. i tried putting the block right after the table declaration also=E2=80=A6 nothing spectacular happened.. any help would be appreciated=E2=80=A6 thanks=E2=80=A6 here is my ruleset: table { 46.19.139.0/24 } tcp_in =3D "{ domain, www, https }" udp =3D "{ domain, ntp, snmp }" ping =3D "echoreq" set skip on lo scrub in antispoof for bge0 inet block in all pass out all keep state ### for tracroutes pass out inet proto udp from any to any port 33433 >< 33626 keep state pass proto udp to any port $udp ##icmp pass inet proto icmp all icmp-type $ping keep state ## passing in ##pass in inet proto tcp to any port $tcp_in keep state pass in inet proto tcp to any port $tcp_in flags S/SAF synproxy state pass proto tcp to any port ssh block in on bge0 from { } to any