Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 2 Nov 2003 12:04:24 +1030
From:      "Rob" <listone@deathbeforedecaf.net>
To:        "Chris" <bsdnewbie@coolarrow.com>, <freebsd-questions@freebsd.org>
Subject:   Re: IPFW strange events
Message-ID:  <012d01c3a0e1$73216500$a4b826cb@goo>
References:  <200311011055320938.07E914B9@tcslea.org>

next in thread | previous in thread | raw e-mail | index | archive | help
Not a direct answer, but you should generally put

    add allow all from any to any via lo0

near the start of a rules list. Some things may break if you block
loopback conections.

----- Original Message -----
From: "Chris" <bsdnewbie@coolarrow.com>
Subject: IPFW strange events



Hello,

This is occurring on a 4.8-RELEASE server using IPFW2...


I have numerous rules that block bogus networks... one of which is:

ipfw add 0104 deny log ip from 96.0.0.0/3 to any


And I know it's working because using "ipfw list" I get:

00104 deny log ip from 96.0.0.0/3 to any


Whenever that rule is active, it's blocking packets - "ipfw show":

00104         21       1148 deny log ip from 96.0.0.0/3 to any

BUT....

Various services stop working... so I look at /var/log/security and see
NUMEROUS entries such as this:

Nov  1 10:30:00 server /kernel: ipfw: 104 Deny TCP 127.0.0.1:1051
127.0.0.1:80 out via lo0

Now I don't see anything in the rule about the localhost address, yet
that's what it's blocking. But a little bit ahead of that rule, I do
have this one:

ipfw add 082 divert natd all from any to any via fxp0

Would it help to put all the bogus network deny rules ahead of the
divert rule?

Stumped,
Chris


_______________________________________________
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to
"freebsd-questions-unsubscribe@freebsd.org"



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?012d01c3a0e1$73216500$a4b826cb>