From owner-freebsd-pf@FreeBSD.ORG Sat May 10 22:04:15 2014 Return-Path: Delivered-To: freebsd-pf@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 975B9DD7 for ; Sat, 10 May 2014 22:04:15 +0000 (UTC) Received: from zoom.lafn.org (zoom.lafn.org [108.92.93.123]) by mx1.freebsd.org (Postfix) with ESMTP id 71D0FECD for ; Sat, 10 May 2014 22:04:14 +0000 (UTC) Received: from [10.0.1.3] (static-71-177-216-148.lsanca.fios.verizon.net [71.177.216.148]) (authenticated bits=0) by zoom.lafn.org (8.14.7/8.14.7) with ESMTP id s4ALYI96034489 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO) for ; Sat, 10 May 2014 14:34:19 -0700 (PDT) (envelope-from bc979@lafn.org) From: Doug Hardie Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: quoted-printable Subject: Unexpected pf behavior Message-Id: <7782AB7B-59BC-4A31-95FA-3EDF408AA507@lafn.org> Date: Sat, 10 May 2014 14:34:18 -0700 To: freebsd-pf@freebsd.org Mime-Version: 1.0 (Mac OS X Mail 6.6 \(1510\)) X-Mailer: Apple Mail (2.1510) X-Virus-Scanned: clamav-milter 0.98 at zoom.lafn.org X-Virus-Status: Clean X-BeenThere: freebsd-pf@freebsd.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: "Technical discussion and general questions about packet filter \(pf\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 10 May 2014 22:04:15 -0000 I have a pf rule (FreeBSD 9.2) that uses a table to block access from = specific networks. This morning I found the following situation: 12 attempts from an address in one of the blocked network to access the = server. All were blocked and marked as such with the proper rule number = in pflog. 10 succeeding connections that were passed through to the port. These = were logged by the process listening on that port. There were no changes to the rules, reboots, etc. during that time. = This all transpired in about 10 minutes. A dump of the table shows the = proper address range. I am not logging the pass throughs so only the = original 12 blocks are in the logs. I have never seen anything like = this in the past. Is there some way I can test a specific IP address = and have pf tell me what it would do if it received a packet from that = address?