From owner-freebsd-pf@FreeBSD.ORG Mon Jan 27 19:20:52 2014 Return-Path: Delivered-To: freebsd-pf@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 33102EC4 for ; Mon, 27 Jan 2014 19:20:52 +0000 (UTC) Received: from cell.glebius.int.ru (glebius.int.ru [81.19.69.10]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id B1509184E for ; Mon, 27 Jan 2014 19:20:50 +0000 (UTC) Received: from cell.glebius.int.ru (localhost [127.0.0.1]) by cell.glebius.int.ru (8.14.7/8.14.7) with ESMTP id s0RJKmuE015315 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Mon, 27 Jan 2014 23:20:48 +0400 (MSK) (envelope-from glebius@FreeBSD.org) Received: (from glebius@localhost) by cell.glebius.int.ru (8.14.7/8.14.7/Submit) id s0RJKm4g015314; Mon, 27 Jan 2014 23:20:48 +0400 (MSK) (envelope-from glebius@FreeBSD.org) X-Authentication-Warning: cell.glebius.int.ru: glebius set sender to glebius@FreeBSD.org using -f Date: Mon, 27 Jan 2014 23:20:48 +0400 From: Gleb Smirnoff To: Robert Simmons Subject: Re: PF in FreeBSD 10.0 Blocking Some SSH Message-ID: <20140127192048.GS66160@FreeBSD.org> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.22 (2013-10-16) Cc: freebsd-pf@freebsd.org X-BeenThere: freebsd-pf@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: "Technical discussion and general questions about packet filter \(pf\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 27 Jan 2014 19:20:52 -0000 Robert, On Sun, Jan 26, 2014 at 06:19:34PM -0500, Robert Simmons wrote: R> Over the course of a few hours there are a handful of SSH packets that R> are being blocked both in and out. This does not seem to affect the R> SSH session, and all the blocked packets have certain flags set [FP.], R> [R.], [P.], [.], [F.]. The following is my ruleset abbreviated to the R> rules that apply to this problem: R> R> ext_if = "en0" R> allowed = "{ 192.168.1.10 }" R> std_tcp_in = "{ ssh }" R> block in log R> block out log (user) R> pass in quick on $ext_if proto tcp from $allowed to ($ext_if) port R> $std_tcp_in keep state R> R> Why are those packets being blocked? Do I understand you correct that the ssh sessions work well, but you see blocked packets in the pflog? -- Totus tuus, Glebius.