Date: Sun, 2 Nov 2003 12:04:24 +1030 From: "Rob" <listone@deathbeforedecaf.net> To: "Chris" <bsdnewbie@coolarrow.com>, <freebsd-questions@freebsd.org> Subject: Re: IPFW strange events Message-ID: <012d01c3a0e1$73216500$a4b826cb@goo> References: <200311011055320938.07E914B9@tcslea.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Not a direct answer, but you should generally put
    add allow all from any to any via lo0
near the start of a rules list. Some things may break if you block
loopback conections.
----- Original Message -----
From: "Chris" <bsdnewbie@coolarrow.com>
Subject: IPFW strange events
Hello,
This is occurring on a 4.8-RELEASE server using IPFW2...
I have numerous rules that block bogus networks... one of which is:
ipfw add 0104 deny log ip from 96.0.0.0/3 to any
And I know it's working because using "ipfw list" I get:
00104 deny log ip from 96.0.0.0/3 to any
Whenever that rule is active, it's blocking packets - "ipfw show":
00104         21       1148 deny log ip from 96.0.0.0/3 to any
BUT....
Various services stop working... so I look at /var/log/security and see
NUMEROUS entries such as this:
Nov  1 10:30:00 server /kernel: ipfw: 104 Deny TCP 127.0.0.1:1051
127.0.0.1:80 out via lo0
Now I don't see anything in the rule about the localhost address, yet
that's what it's blocking. But a little bit ahead of that rule, I do
have this one:
ipfw add 082 divert natd all from any to any via fxp0
Would it help to put all the bogus network deny rules ahead of the
divert rule?
Stumped,
Chris
_______________________________________________
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to
"freebsd-questions-unsubscribe@freebsd.org"
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?012d01c3a0e1$73216500$a4b826cb>
