Date: Sat, 10 Feb 2007 16:15:12 +0100 From: Erik Norgaard <norgaard@locolomo.org> To: Tim T Bos <flyweight@casema.nl> Cc: freebsd-questions@freebsd.org Subject: Re: Big problems with PF on freeBSD 6.2 Message-ID: <45CDE180.9050304@locolomo.org> In-Reply-To: <45CDB1C3.1080508@casema.nl> References: <45CDB1C3.1080508@casema.nl>
next in thread | previous in thread | raw e-mail | index | archive | help
[-- Attachment #1 --] Tim T Bos wrote: > Hi Guys, > > I have a problem with PF. Normally when I load pf.ko it uses deny all > as default. > But if i compile it in the kernel or load it as a module both it won't work. > If a have only one rule "block all" or "block all on ext_if" I can still > go on the internet and if I portscan my computer i get most ports closed > and some by my isp filtered ports (137 139 and some onher MS ports). > > I tried a clean install of freebsd 6.2 with the latest stable source > ass well. you mean "as well" :) Do you use a GENERIC kernel? If you have a custom kernel or try to set special options for pf post those options. Also, post any boot options that toggle pf behaviour. The default behaviour of pf is "pass all", I don't remember if there is a boot option or similar to change this. But anyway, I think it is better to go with the default and set your desired default action explicitly as the first rule in your rule set. Try a GENERIC kernel and see if packets are blocked correctly by a "block log all" rule. In any case, you should add "log" to your rules for debugging, so you can see if ruleset is matched and where packets are blocked or passed. Cheers, Erik -- Ph: +34.666334818 web: http://www.locolomo.org [-- Attachment #2 --] 0 *H 010 + 0 *H 0p0XET+0 *H 0110 UDK10 U TDC10UTDC OCES CA0 061115083154Z 081115090154Z0u10 UDK1)0'U Ingen organisatorisk tilknytning1;0U Erik Nrgaard0#UPID:9802-2002-2-54436976931500 *H 0 WR&5ʄ8#S^fOパBrIsPBc! >r&8hl3?\.UGB\E3Q!1MrwP*02\|\&s{b'`1&1 00U0+U$0"20061115083154Z20081115090154Z07U .0*0& *P)00/+#http://www.certifikat.dk/repository0+00 TDC0For anvendelse af certifikatet glder OCES vilkr, CPS og OCES CP, der kan hentes fra www.certifikat.dk/repository. Bemrk, at TDC efter vilkrene har et begrnset ansvar ift. professionelle parter.0A+50301+0%http://ocsp.certifikat.dk/ocsp/status0 U0norgaard@locolomo.org0U}0{0KIGE0C10 UDK10 U TDC10UTDC OCES CA10UCRL15570,*(&http://crl.oces.certifikat.dk/oces.crl0U#0`Vd~'gPKs;0U~kG'f+Q{m&0 U0 0 *H}A 0 V7.10 *H OJ'|)%Ҋi`1 ^nE jJwKӼB65VSǶw`y$L=YXʷ/\E~,PW$AB\汎͙ 7%$ N-ށ"/Ww#ғkMA6S0dD~\w*z Pq`# 69;pS6 뛨3:9s_.'³Q$S0yAƶlqfLi0p0XET+0 *H 0110 UDK10 U TDC10UTDC OCES CA0 061115083154Z 081115090154Z0u10 UDK1)0'U Ingen organisatorisk tilknytning1;0U Erik Nrgaard0#UPID:9802-2002-2-54436976931500 *H 0 WR&5ʄ8#S^fOパBrIsPBc! >r&8hl3?\.UGB\E3Q!1MrwP*02\|\&s{b'`1&1 00U0+U$0"20061115083154Z20081115090154Z07U .0*0& *P)00/+#http://www.certifikat.dk/repository0+00 TDC0For anvendelse af certifikatet glder OCES vilkr, CPS og OCES CP, der kan hentes fra www.certifikat.dk/repository. Bemrk, at TDC efter vilkrene har et begrnset ansvar ift. professionelle parter.0A+50301+0%http://ocsp.certifikat.dk/ocsp/status0 U0norgaard@locolomo.org0U}0{0KIGE0C10 UDK10 U TDC10UTDC OCES CA10UCRL15570,*(&http://crl.oces.certifikat.dk/oces.crl0U#0`Vd~'gPKs;0U~kG'f+Q{m&0 U0 0 *H}A 0 V7.10 *H OJ'|)%Ҋi`1 ^nE jJwKӼB65VSǶw`y$L=YXʷ/\E~,PW$AB\汎͙ 7%$ N-ށ"/Ww#ғkMA6S0dD~\w*z Pq`# 69;pS6 뛨3:9s_.'³Q$S0yAƶlqfLi1*0&090110 UDK10 U TDC10UTDC OCES CAET+0 + G0 *H 1 *H 0 *H 1 070210151512Z0# *H 1ofO>X 0H +71;090110 UDK10 U TDC10UTDC OCES CAET+0J*H 1;90110 UDK10 U TDC10UTDC OCES CAET+0R *H 1E0C0 *H 0*H 0 *H @0+0 *H (0 *H k%TGլV⤧.|N~$>KpӌFo>p ;1QFh J*i1m6vH\O4k`=PbjRUkځ`o '
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?45CDE180.9050304>
