Date: Wed, 05 Mar 2008 14:28:10 +0000 From: Matthew Seaman <m.seaman@infracaninophile.co.uk> To: Dennis Melentyev <dennis.melentyev@gmail.com> Cc: =?UTF-8?B?0JLQu9Cw0LTQuNGB0LvQsNCyINCd0LXQtNC+0YHQtdC60LjQvQ==?= <mr.vladis@gmail.com>, stable@freebsd.org Subject: Re: Could Not open some sites from Windows Vista and Server 2008 when using FreeBSD as gw Message-ID: <47CEADFA.8090502@infracaninophile.co.uk> In-Reply-To: <b84edfa10803050608i3d647fcv2ede7737dbea54c5@mail.gmail.com> References: <fedd0b9d0803050049t7849a199y339f707033bb4aec@mail.gmail.com> <b84edfa10803050244t1e26264atc65e80ef09cd3572@mail.gmail.com> <fedd0b9d0803050429p5d1365b9x4527fe8b1019c666@mail.gmail.com> <b84edfa10803050608i3d647fcv2ede7737dbea54c5@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
-----BEGIN PGP SIGNED MESSAGE-----
Hash: RIPEMD160
Dennis Melentyev wrote:
> Hi!
>
> Well, I'm not a PF professional, and you have rather advanced setup.
> So, someone with good PF experience is needed here.
>
> 2008/3/5, Владислав Недосекин <mr.vladis@gmail.com>:
>> Hi, i understand that there is too little facts to analyze, but maybe some
>> one have the same problem and also i can provide you information.
>> TCP dump 192.168.200.11 - ip of PC with vista
>> # tcpdump | grep 192.168.200.11
>> tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
>> listening on ste0, link-type EN10MB (Ethernet), capture size 96 bytes
>> ^C^C^C^C3 packets captured
>> 433 packets received by filter
>> 0 packets dropped by kernel
>> # tcpdump | grep 192.168.200.111
>> tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
>> listening on ste0, link-type EN10MB (Ethernet), capture size 96 bytes
> ...
>> 13:51:47.676471 arp who-has 192.168.200.200 (00:1d:60:ce:74:e8 (oui
>> Unknown)) tell 192.168.200.111
>
> What's that?
> ...
>
>
>> PF.CONF
>>
> ...
>
>> # Block Policy
>> block in log all
>> block in log quick from no-route to any
>> block in log quick on $ext_if from <rfc1918>
>> block return-icmp out log quick on $ext_if to <rfc1918>
>> antispoof quick for $int_if
>> antispoof quick for $ext_if
>> block out from 192.168.0.146 to any
>
> Does log shows anything interesting? I mean dropped packets.
>
> What about SQUID's log? Some special auth? Client's insisting on
> HTTP/1.1? Some glitches with transparent proxying (if I get it right
> from your PF config)?
>
>> i've tried
>> sysctl net.inet.tcp.rfc1323=0
>> but it does't help.
>>
>> And about ip6 it is disabled, but in enabled state it does't help.
>
> Dropped by PF?
>
A very good trick when debugging pf rulesets is to make sure that any
block rules also log the blocked packets -- in this case that should
include the antispoofing rules "antispoof log quick for { $int_if $extif }"
Then you can use tcpdump on the firewall against the pflog0 pseudo interface
to see what traffic is being blocked as it happens:
# tcpdump -vv -i pflog0
Cheers,
Matthew
- --
Dr Matthew J Seaman MA, D.Phil. Flat 3
7 Priory Courtyard
PGP: http://www.infracaninophile.co.uk/pgpkey Ramsgate
Kent, CT11 9PW, UK
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.4 (FreeBSD)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFHzq363jDkPpsZ+VYRAzBuAJ4/Cy9GA+m8iDv1jeYPeCM/xOFOvQCfc6XB
yOqR3qTYmijkFA9fVygqH80=
=apq8
-----END PGP SIGNATURE-----
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?47CEADFA.8090502>
