From owner-freebsd-hackers@FreeBSD.ORG Mon Dec 22 22:09:29 2014 Return-Path: Delivered-To: hackers@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 9C6B34A0 for ; Mon, 22 Dec 2014 22:09:29 +0000 (UTC) Received: from vps1.elischer.org (vps1.elischer.org [204.109.63.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "vps1.elischer.org", Issuer "CA Cert Signing Authority" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 6E46B3647 for ; Mon, 22 Dec 2014 22:09:28 +0000 (UTC) Received: from Julian-MBP3.local (ppp121-45-252-117.lns20.per2.internode.on.net [121.45.252.117]) (authenticated bits=0) by vps1.elischer.org (8.14.9/8.14.9) with ESMTP id sBMM9I4r037684 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NO); Mon, 22 Dec 2014 14:09:21 -0800 (PST) (envelope-from julian@freebsd.org) Message-ID: <54989688.9050601@freebsd.org> Date: Tue, 23 Dec 2014 06:09:12 +0800 From: Julian Elischer User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:31.0) Gecko/20100101 Thunderbird/31.3.0 MIME-Version: 1.0 To: krad , Stephen Hocking Subject: Re: Fun with PF & redirection References: In-Reply-To: Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit Cc: hackers@freebsd.org X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 22 Dec 2014 22:09:29 -0000 On 12/22/14 8:48 PM, krad wrote: > should that be 5044:65334 rather than 65334:5044? > also make sure you are not filtering ports 5044-65334 and that the $spoof_port > isnt filtered > > On 21 December 2014 at 20:40, Stephen Hocking > wrote: > >> Hi all, >> >> I'm using PF on a 10.1 box, and am trying to redirect a range of ports to a >> single port, with a rule like this: >> >> rdr on $ext_if proto tcp from any to any port 65334:5044 -> $spoof_host >> port $spoof_port >> >> spoof_host has been set to 127.0.0.1. >> >> This does not seem to work. Any ideas? use ipfw? fwd 127.0.0.1:$spoof_port tcp from any to me 5044-65334 >> >> Stephen >> _______________________________________________ >> freebsd-hackers@freebsd.org mailing list >> http://lists.freebsd.org/mailman/listinfo/freebsd-hackers >> To unsubscribe, send any mail to "freebsd-hackers-unsubscribe@freebsd.org" >> > _______________________________________________ > freebsd-hackers@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-hackers > To unsubscribe, send any mail to "freebsd-hackers-unsubscribe@freebsd.org" > >