The next step might be a tcpdump on the external interface
to watch the traffic and see that it's not doing something
suprising on some other port or something.

On 11/16/2005 10:20:01 AM, Raphael GRUNDRICH wrote:

Errata :
pass in quick on $ext_if \
         proto tcp \
         from any to 192.168.1.1 port imaps flags S/SA synproxy state

I have seen applications running under Windows 2000 that violate the
2MSL TCP rule, reusing the source ip/port destination ip/port quad too
quickly.  OpenBSD blocks this traffic as it sees it as a hijacking
attempt.  I worked around it by not using state. (*Ick*)
Not using state might be something to try.

Karl <[EMAIL PROTECTED]>
Free Software:  "You don't pay back, you pay forward."
                 -- Robert A. Heinlein

Reply via email to