From owner-freebsd-questions@FreeBSD.ORG Fri Jun 17 16:32:01 2005 Return-Path: X-Original-To: freebsd-questions@freebsd.org Delivered-To: freebsd-questions@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id AD92C16A41F for ; Fri, 17 Jun 2005 16:32:01 +0000 (GMT) (envelope-from dhutch9999@yahoo.com) Received: from web33108.mail.mud.yahoo.com (web33108.mail.mud.yahoo.com [68.142.206.89]) by mx1.FreeBSD.org (Postfix) with SMTP id 5985943D49 for ; Fri, 17 Jun 2005 16:32:01 +0000 (GMT) (envelope-from dhutch9999@yahoo.com) Received: (qmail 52511 invoked by uid 60001); 17 Jun 2005 16:32:00 -0000 DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=Message-ID:Received:Date:From:Subject:To:In-Reply-To:MIME-Version:Content-Type:Content-Transfer-Encoding; b=3bNrlBM/VStxvrpgqj7fVEkDsjaCjdyXfoxUrarZ2Z6aJNG0bRpqCgPo48xWGI5KVhERnxuekBI88aEajE5wcEsAapp1sW8ACk1xrGwF95+9qJIR/0C4RoZ6EdCkww0FhECItyftw2Io+IxLr6uzDBFzK/1BSmiB7/fPqwtnCAo= ; Message-ID: <20050617163200.52506.qmail@web33108.mail.mud.yahoo.com> Received: from [12.153.72.219] by web33108.mail.mud.yahoo.com via HTTP; Fri, 17 Jun 2005 09:32:00 PDT Date: Fri, 17 Jun 2005 09:32:00 -0700 (PDT) From: DH To: fbsd_user@a1poweruser.com, freebsd-questions@freebsd.org In-Reply-To: MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Transfer-Encoding: 8bit X-Content-Filtered-By: Mailman/MimeDel 2.1.5 Cc: Subject: RE: Vexing IPF problem X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 17 Jun 2005 16:32:01 -0000 Nuke & pave unfortunately is not a desireable option - there are a hair over 1k rules in the total rule set ( 99 % are address blocks of "evil doers" ). I'm observing the blocking behavior relative to addresses that are not specifically blocked. Looking at the log entries it looks as though the inbound ACK packet gets dropped after the ogoing connection request is made. Thank You for your rsvp. David Hutchens III Network Technician fbsd_user wrote: 1. Best thing is scrap your firewall rules and use the IPF rules listed in the firewall/ipfilter section of the official handbook. 2. There are a lot of spoof packets using port 80 on the public internet and that may be what you are seeing. -----Original Message----- From: owner-freebsd-questions@freebsd.org [mailto:owner-freebsd-questions@freebsd.org]On Behalf Of DH Sent: Friday, June 17, 2005 11:13 AM To: freebsd-questions@freebsd.org Subject: Vexing IPF problem I'm having a problem with IPF blocking packets that appear should be let through. I've sent quite a bit of time going through the Handbook, man pages, etc & I must be missing something so any help is greatly appriciated. uname -a freebsd 4.11-release #0 SMP kernel, dual PIII processor, 512 MB ECC RAM, SCSI HDs execerpt from rule set: Kernel compiled with "default allow" until I finish getting the ruleset rewritten. Rule #1 block in log from any to any pass in quick on lo0 pass out quick on lo0 block in log quick on fxp0 from any to any with ipopts block in log quick proto tcp from any to any with short ... pass in log first proto tcp from any to any port = 80 flags S keep state pass in log first proto tcp from any port = 80 to any flags S keep state pass out log first proto tcp from any to any port = 80 flags S keep state netstat -m = 129/576/16384 9% of mb_map in use Proxy Server - Squid 2.5.stable10 The behavior I'm seeing is out going connections to websites on port 80 are being passed but the in bound traffic is being blocked. The ipflog entries look like this: my ip = s theirs = d @0:390 p s.s.s.s,3601 -> d.d.d.d,80 PR tcp len 20 60 -S K-S OUT @0:1 b d.d.d.d,80 -> s.s.s.s,3601 PR tcp len 20 43 -AR IN Thanks in advance to those giving their time to lend a hand, I know you time is valuable. Please CC my address in your reply. David Hutchens III Network Technician --------------------------------- Yahoo! Sports Rekindle the Rivalries. Sign up for Fantasy Football _______________________________________________ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to "freebsd-questions-unsubscribe@freebsd.org" David Hutchens III Network Technician DRS Surveillance Support Systems - A division of DRS Technologies. --------------------------------- Yahoo! Sports Rekindle the Rivalries. Sign up for Fantasy Football