From owner-freebsd-questions@freebsd.org Tue May 4 04:40:16 2021 Return-Path: Delivered-To: freebsd-questions@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id D2080625CB9 for ; Tue, 4 May 2021 04:40:16 +0000 (UTC) (envelope-from bc979@lafn.org) Received: from mail.sermon-archive.info (sermon-archive.info [47.181.130.121]) by mx1.freebsd.org (Postfix) with ESMTP id 4FZ6b40HgPz4bmZ for ; Tue, 4 May 2021 04:40:15 +0000 (UTC) (envelope-from bc979@lafn.org) Received: from smtpclient.apple (mini [10.0.1.251]) by mail.sermon-archive.info (Postfix) with ESMTPSA id 4FZ6Zx42XJz2fjSs; Mon, 3 May 2021 21:40:09 -0700 (PDT) From: Doug Hardie Message-Id: Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.80.0.2.43\)) Subject: Re: PF with IPv6 Date: Mon, 3 May 2021 21:40:09 -0700 In-Reply-To: <1440325D-2743-4B04-8C20-D86FBC51A322@gromit.dlib.vt.edu> Cc: Doug Hardie , FreeBSD Questions To: Paul Mather References: <90DCF979-C3AE-4775-BE39-DB3F455F7D4E@gromit.dlib.vt.edu> <1440325D-2743-4B04-8C20-D86FBC51A322@gromit.dlib.vt.edu> X-Mailer: Apple Mail (2.3654.80.0.2.43) X-Virus-Scanned: clamav-milter 0.103.1 at mail X-Virus-Status: Clean X-Rspamd-Queue-Id: 4FZ6b40HgPz4bmZ X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of bc979@lafn.org designates 47.181.130.121 as permitted sender) smtp.mailfrom=bc979@lafn.org X-Spamd-Result: default: False [-2.38 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; MV_CASE(0.50)[]; R_SPF_ALLOW(-0.20)[+mx]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; DMARC_NA(0.00)[lafn.org: no valid DMARC record]; RBL_DBL_DONT_QUERY_IPS(0.00)[47.181.130.121:from]; SPAMHAUS_ZRD(0.00)[47.181.130.121:from:127.0.2.255]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_SHORT(-0.68)[-0.675]; RCVD_NO_TLS_LAST(0.10)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; ASN(0.00)[asn:5650, ipnet:47.181.128.0/18, country:US]; RCVD_COUNT_TWO(0.00)[2]; MAILMAN_DEST(0.00)[freebsd-questions] Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.34 X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 04 May 2021 04:40:16 -0000 > On 3 May 2021, at 06:43, Paul Mather wrote: >=20 > On May 2, 2021, at 8:40 PM, Doug Hardie > wrote: >=20 >> On 1 May 2021, at 07:37, Paul Mather > wrote: >>>=20 >>> On Fri, 30 Apr 2021 21:20:48 -0700, Doug Hardie > wrote: >>>=20 >>>> Message: 3 >>>> Date: Fri, 30 Apr 2021 21:20:48 -0700 >>>> From: Doug Hardie > >>>> To: FreeBSD Questions > >>>> Subject: PF with IPv6 >>>> Message-ID: = <2CD4806C-F1A4-4DDE-8C2F-2B0A08EA2A18@sermon-archive.info = > >>>> Content-Type: text/plain; charset=3Dus-ascii >>>>=20 >>>> FreeBSD 13-RELEASE. I have a small test network setup and tried to = block all IPv6 except those addressed to a specific address. = /etc/pf.conf contained: >>>>=20 >>>> ext_if =3D "bge0" >>>> LAN3 =3D "2001:1000:0:3000::/64" >>>> pass in quick log on $ext_if proto ipv6 from $LAN3 to $LAN3 >>>> block in log on $ext_if proto ipv6 from any to any >>>>=20 >>>> Nothing got blocked. pftop showed all zeros for both rules. I = then added at the end: >>>>=20 >>>> pass in quick log on $ext_if proto icmp6 from $LAN3 to $LAN3 >>>> block in log on $ext_if proto icmp6 from any to any >>>>=20 >>>> A lot of stuff got blocked. The log shows many entries like: >>>>=20 >>>> 15:59:41.597632 rule 3/0(match): block in on bge0: (hlim 1, = next-header Options (0) payload length: 32) fe80::120c:6bff:fe5d:4404 > = ff02::1: HBH (rtalert: 0x0000) (pad1)(pad1) ICMP6, multicast listener = query >>>> 0x0000: 6000 0000 0020 0001 fe80 0000 0000 0000 = `............... >>>> 0x0010: 120c 6bff fe5d 4404 ff02 0000 0000 0000 = ..k..]D......... >>>> 0x0020: 0000 0000 0000 0001 3a00 0502 0000 0000 = ........:....... >>>> 0x0030: 8200 98aa .... >>>>=20 >>>> Rule 3 is the block for ICMP6, but those are clearly IP6 packets = that should have been blocked by rule 1. Is there a problem with IPv6 = and pf? >>>=20 >>>=20 >>> It's not clear to me precisely what you are trying to achieve. The = "proto" keyword in PF rules refers to protocols in /etc/protocols. Your = rules appear to be targeting the specific case of filtering IPv6 = encapsulated in IPv4. I don't believe that is what you intend. >>>=20 >>> The more standard way in PF to block IPv6 vs IPv4 traffic is to use = "inet" (IPv4) or "inet6" (IPv6) to target IPv4 or IPv6 packets. >>>=20 >>> Note, the last rule you added that you say did start blocking things = is more typical of rules to block ICMP6. Because you omit "inet" or = "inet6" on the rule it will be applied to both IPv4 and IPv6 packets. = But, the "proto icmp6" part is specifically targeting ICMP6. >>>=20 >>> So, to summarise, use "inet" and "inet6" to select IPv4 and IPv6 and = "proto" to select the protocol you want to target (e.g., "tcp", "udp", = "icmp", "icmp6", etc.). E.g., "pass in log quick on $ext_if inet6 from = ..." to allow all IPv6 for the rule, or ""pass in log quick on $ext_if = inet6 proto tcp from ..." to allow only IPv6 TCP traffic, etc. >>=20 >> First, it appeared to me that since ipv6 is listed in /etc/protocols, = that it could be used as a protocol. However, after reading the man = page again, I see where it wants family, not protocol. With that change = it does work. >=20 >=20 > The "ipv6" protocol in /etc/protocols (protocol 41) is an IPv6 = transition protocol more commonly known as "6in4". It is used by sites = that have only IPv4 connectivity to tunnel IPv6 traffic using IPv4 = packets. The Hurricane Electric TunnelBroker uses 6in4 via protocol 41, = and is a well-known way of getting IPv6 connectivity when your ISP = doesn't provide native IPv6. >=20 > As you observe, the "ipv6" tunnelling protocol is not the same as the = IPv6 address family (AF_INET6). >=20 > Glad you got it sorted out and working, though. Thanks for the clarification. The protocols entry is: ipv6 41 IPV6 # ipv6 That is quite misleading. Somewhere it ought to indicate that it's a = 6in4 protocol, not just ipv5. -- Doug