Date: Fri, 8 Nov 2013 09:08:25 -0500 From: Jason Hellenthal <jhellenthal@dataix.net> To: claudiu vasadi <claudiu.vasadi@gmail.com> Cc: "freebsd-pf@freebsd.org" <freebsd-pf@freebsd.org> Subject: Re: FreeBSD 9.1-STABLE - pf rule being ignored Message-ID: <6BF6F30B-F937-4C59-819A-770489B90343@dataix.net> In-Reply-To: <C55476A9-F352-4615-9DFB-8705D583DCC1@dataix.net> References: <CAM-i3ihX43UxmrM-ThOP=nK2qr=jMpzab-zB7o_x--C2eDWUKg@mail.gmail.com> <C55476A9-F352-4615-9DFB-8705D583DCC1@dataix.net>
next in thread | previous in thread | raw e-mail | index | archive | help
[-- Attachment #1 --] Should say too . . . don't forget to either skip on lo0 or pass on lo0 > On Nov 8, 2013, at 9:05, Jason Hellenthal <jhellenthal@dataix.net> wrote: > > Curious if your line breaks are correct ? Your block and pass rule appear to be on the same line. > > This should do it . . . > > block in all > block return in quick from !$internal_ip to $external_ip > pass out all keep state > > > But if you already have a block all rul there is no need for the second as your already blocking all traffic so I might suggest this not mowing your topology. > > I also would not suggest "return" for non internal traffic except for specific targeted services that it might affect. > . . . > :BEGIN > > spoof on lo0 > spoof on $ext_if > > block all > pass out quick from $me > pass in quick from $int to $me > > :END > > And that should accomplish what you are trying to do IIUC. > > You can use pftop to verify packets on hit rules. > >> On Nov 8, 2013, at 8:41, claudiu vasadi <claudiu.vasadi@gmail.com> wrote: >> >> Hi all, >> >> I have a 9.1-STABLE r251615 acting as a firewall. >> >> The rules: >> block in all pass out all keep state [...] block return from !$internal_ip >> to $external_ip >> >> >> >> What I want is to block all the network except $internal to from accessing >> $external_ip. For some reason, the above rule simply does not work. >> However, the below does work and block everyone except $internal_ip: >> >> block return from $internal_net/24 to $external_ip pass from $internal_ip >> to $external_ip >> >> >> Why is this? I remember reading the docs for OpenBSD 4.5 and I guess it >> should work like in the first example. >> >> PS: Yes, I can see the rule with pfctl -sr and it does translate properly. >> >> -- >> Best regards, >> Claudiu Vasadi >> _______________________________________________ >> freebsd-pf@freebsd.org mailing list >> http://lists.freebsd.org/mailman/listinfo/freebsd-pf >> To unsubscribe, send any mail to "freebsd-pf-unsubscribe@freebsd.org" [-- Attachment #2 --] 0 *H 010 + 0 *H 90000 *H 010 UIL10U StartCom Ltd.1+0)U"Secure Digital Certificate Signing1806U/StartCom Class 1 Primary Intermediate Client CA0 130518085048Z 140519220947Z0H10Ujhellenthal@dataix.net1%0# *H jhellenthal@dataix.net0"0 *H 0 '`TmfkܨJ5u+c'Upb`zv)&ȸXZ*VN6JvLoVoh}g pQDŽKf/tZA˳("4Ԅ˻'d2h|IBl'^v^;'e8S99ۿVm|k8_UQtC"5l!kjZ]އQGn\Bh!FTsD%pV^Eӑd¨x"9 г"f 00 U0 0U0U%0++0UڔfmVʢ$䟓0U#0Sr풜\|~5NԸQ0!U0jhellenthal@dataix.net0LU C0?0;+70*0.+"http://www.startssl.com/policy.pdf0+00' StartCom Certification Authority0This certificate was issued according to the Class 1 Validation requirements of the StartCom CA policy, reliance only for the intended purpose in compliance of the relying party obligations.06U/0-0+)'%http://crl.startssl.com/crtu1-crl.crl0+009+0-http://ocsp.startssl.com/sub/class1/client/ca0B+06http://aia.startssl.com/certs/sub.class1.client.ca.crt0#U0http://www.startssl.com/0 *H {0Ӹ,52W{Ey8b[{7 _+P"n["-,@ŽpJ-W$ݍjWA-6z( RdIZ.KzXє[K6}{s+v.Qh0PͅKhTw 0I73lz*Kv4Kkگ63;p1:ױ@)]ok>:W%XwC1þL/o8~#oP0400 *H 0}10 UIL10U StartCom Ltd.1+0)U"Secure Digital Certificate Signing1)0'U StartCom Certification Authority0 071024210155Z 171024210155Z010 UIL10U StartCom Ltd.1+0)U"Secure Digital Certificate Signing1806U/StartCom Class 1 Primary Intermediate Client CA0"0 *H 0 -).2AUGo#G B|NDRpM-B=o-we5JQpa>O.#._<V [~**pz~3WG .ᘟMlr[<Ce6fqO"uxfWN#uicgkv$Lb%y`_{`xK'GN 00U00U0USr풜\|~5NԸQ0U#0N@[i04hCA0f+Z0X0'+0http://ocsp.startssl.com/ca0-+0!http://www.startssl.com/sfsca.crt0[UT0R0'%#!http://www.startssl.com/sfsca.crl0'%#!http://crl.startssl.com/sfsca.crl0U y0w0u+70f0.+"http://www.startssl.com/policy.pdf04+(http://www.startssl.com/intermediate.pdf0 *H }x,\c^#wMq}>UK/^yX֏y frMIŲB61ymQҨݬZ0&
