Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 8 Aug 2005 16:54:25 +0200
From:      Daniel Hartmeier <daniel@benzedrine.cx>
To:        Sergey Lapin <slapinid@gmail.com>
Cc:        freebsd-pf@freebsd.org
Subject:   Re: Fwd: pf problems
Message-ID:  <20050808145425.GI11104@insomnia.benzedrine.cx>
In-Reply-To: <48239d3905080807182fef6a5b@mail.gmail.com>
References:  <48239d390508040958265ce62@mail.gmail.com> <48239d3905080504297b3ebc89@mail.gmail.com> <200508060411.05482.max@love2party.net> <48239d390508080452270c8d10@mail.gmail.com> <42F7502C.4070003@tirloni.org> <48239d3905080807182fef6a5b@mail.gmail.com>

index | next in thread | previous in thread | raw e-mail

On Mon, Aug 08, 2005 at 06:18:28PM +0400, Sergey Lapin wrote:

> It does not help. Actually, it looks like pf does not have control
> over outgoing packets produced by pf itself. I can not neither block
> nor reroute these packets. I checked this very easily - I created a
> rule
> 
> block out log quick from SOME_OUTSIDE_HOST/32 to any
> block out log quick from any to SOME_OUTSIDE_HOST/32
> 
> and made it very first rules of the firewall. Needless to say, when I
> tried to telnet to router port 9999 from SOME_OUTSIDE_HOST, tcpdump on
> the pflog0 device got incoming SYN but did not show RST. From the
> other hand, tcpdump on the default gateway interface shown outgoing
> RST. Again, from this I conclude that pf-generated packets (RST/ICMP)
> are not subject for ruleset processing.

No, they are not.

You can try a 6.0 RC containing a newer version of pf which sends TCP
RSTs (generated by 'return-rst') back out through the interface the
blocked packet came in through.

Alterantively, use multiple filtering devices, one in front of each
uplink.

Daniel


home | help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20050808145425.GI11104>