Date: Sun, 26 Nov 2000 13:43:03 -0800 From: Doug Barton <DougB@FreeBSD.org> To: cjclark@alum.mit.edu Cc: Nuno Teixeira <nuno.teixeira@pt-quorum.com>, freebsd-security@FreeBSD.org Subject: Re: NATD: failed to write packet back (Permission denied) Message-ID: <3A2183E7.6039C582@FreeBSD.org> References: <001701c057c4$1e1ac010$0200a8c0@n2> <20001126110756.C34151@149.211.6.64.reflexcom.com> <000b01c057dd$f9423ab0$0200a8c0@n2> <20001126113720.A70192@149.211.6.64.reflexcom.com>
next in thread | previous in thread | raw e-mail | index | archive | help
"Crist J . Clark" wrote: > > On Sun, Nov 26, 2000 at 07:20:41PM -0000, Nuno Teixeira wrote: > > Hi, > > > > I think not. Can you tell me how to add this rule to my ruleset? > > The two rules needed to get UNIX-style traceroutes to work are, > > Sfwcmd add allow udp from any to any 33434-33474 out via ${oif} When I do a traceroute from a freebsd machine outside my firewall to the firewall machine, I see this: ipfw: 1200 Deny UDP <outside machine>:38575 <firewall>:33468 in via ep0 ipfw: 1200 Deny UDP <outside machine>:38597 <firewall>:33477 in via ep0 ipfw: 1200 Deny UDP <outside machine>:38597 <firewall>:33478 in via ep0 ipfw: 1200 Deny UDP <outside machine>:38597 <firewall>:33479 in via ep0 Which supports what I've been told that unix traceroute uses udp packets. It sounds like in order to allow traceroutes through the firewall you have to open up a pretty big hole for udp... Doug -- So what I want to know is, where does the RED brick road go? Do YOU Yahoo!? To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3A2183E7.6039C582>