Re: pf behaviour with tcp ports 439 and

2009-09-11 Thread Jon Hart
My guess is that you meant 139/TCP instead of 439/TCP, in which case this is pretty much on par for many residential ISPs and their blocking of typical problematic ports. My suggestion? Re-run shields-up (for what its worth) and run a capture on $ext_if with an appropriate filter and I'd bet you

Re: Still dealing with pf performance issues

2007-10-25 Thread Jon Hart
As you and others have stated, the 4.2 upgrade will probably help. What does 'pfctl -vsi' say? Anything different? If I were in your shoes, I'd do exactly what you are doing -- the 4.2 upgrade and search for NICs with better interrupt handling. In a previous life when I was doing a lot more pf

Re: global timeout setting ignored

2006-11-28 Thread Jon Hart
On Wed, Nov 29, 2006 at 12:05:10AM +0100, Axel Rau wrote: Hi all, in my production pf.conf (113 rules) I have set timeout { tcp.finwait 1} . But pfctl -s timeouts shows tcp.finwait 45s (the default). In a simple pf.conf this works as expected. What

Re: RST packets not being natted or unmapped through rdr

2006-04-02 Thread Jon Hart
On Sat, Apr 01, 2006 at 05:01:11AM -0600, Travis H. wrote: Aside: What combinations of TCP flags does scrub filter out? From my understanding and a re-reading of pf.conf(5), scrub does no filtering of TCP at all unless you use the 'reassemble tcp' option. Even when it is on, the man page does

Re: scrub blocking SF, but not logging

2006-02-27 Thread Jon Hart
On Sat, Feb 25, 2006 at 10:07:42AM +0100, Camiel Dobbelaar wrote: On Fri, 24 Feb 2006, Jon Hart wrote: scrub all no-df random-id fragment reassemble Any ideas why this is not logged, or is this operator error? I don't think it's very well known, but you can set 'log' on the scrub

scrub blocking SF, but not logging

2006-02-24 Thread Jon Hart
I've got a fairly simple test ruleset: WAN_IF=em0 LAN_IF=em1 set block-policy return set state-policy if-bound set require-order yes set debug urgent set loginterface $WAN_IF set skip on lo0 scrub all no-df random-id fragment reassemble

Re: carp

2005-12-08 Thread Jon Hart
On Thu, Dec 08, 2005 at 11:32:39PM +, ed wrote: Hello, Has anyone written scripts to ensure that preempt fail over fails over all the carp interfaces to backup upon one becoming backup, I have found often that a single interface will become backup leaving the remaining interfaces as

pps or other unknown upper bound?

2005-11-17 Thread Jon Hart
Hello, This may be a pf issue, this may be an OpenBSD issue or this may be a client issue, so let me apologize in advance. The setup is fairly simply -- a debian machine hanging off of each of two interfaces on an OpenBSD -current box from 11/8 running pf. Nothing particularly complex about

Re: carp + no ip address on iface (only master can receive acks)

2005-11-17 Thread Jon Hart
On Thu, Nov 17, 2005 at 10:02:46PM +1100, Alex Strawman wrote: Traffic shouldn't even be getting OUT on the backup in this situation. i agree - there is no correct solution without using an ip addr for each real interface. would be nice to for example use an external ntp server to sync

Re: pf and Microsoft Exchange IMAPS

2005-11-17 Thread Jon Hart
On Wed, Nov 16, 2005 at 04:34:24PM +0100, Raphael GRUNDRICH wrote: Hello, I'm trying to redirected outside traffic to internal Exchange Server using IMAPS protocol : rdr on $ext_if proto tcp from any to any port 993 - 192.168.1.1 pass in quick on $ext_if \ proto tcp \

Re: pps or other unknown upper bound?

2005-11-17 Thread Jon Hart
On Thu, Nov 17, 2005 at 04:03:25AM -0600, Kevin wrote: On 11/16/05, Jon Hart [EMAIL PROTECTED] wrote: pass in on $CLIENT_IF inet proto tcp from $CLIENT_NET to $SERVER_NET \ port 12345 flags S/SA modulate state I know it's a stupid question, but have you tried the same ruleset

Re: pps or other unknown upper bound?

2005-11-17 Thread Jon Hart
On Thu, Nov 17, 2005 at 12:34:53PM -0600, Kevin wrote: I think this is a key point -- the client is removing the quad from TIME-WAIT and sees it as eligible for reuse, meanwhile the firewall and/or the server still has this closed session state table entry in a *WAIT state. Yes. The client's

Re: pps or other unknown upper bound?

2005-11-17 Thread Jon Hart
On Thu, Nov 17, 2005 at 09:54:02PM +0100, Daniel Hartmeier wrote: You can check if it's pf blocking them by running pfctl -si, see if the 'state-mismatch' counter (or any other, actually) is increasing with each SYN. Ah, i see. There are quite a few in there. When I said logging initialy, I

Re: pps or other unknown upper bound?

2005-11-17 Thread Jon Hart
On Fri, Nov 18, 2005 at 12:49:48AM +0100, Daniel Hartmeier wrote: On Thu, Nov 17, 2005 at 04:52:40PM -0500, Jon Hart wrote: Bingo. There are entries in the logs when this condition happens but it is not entirely clear what the problem aside from the fact that it is a BAD STATE: Nov

Re: Is a 'PF default to block' setting outside pf.conf a desirable feature?

2005-11-09 Thread Jon Hart
On Wed, Nov 09, 2005 at 09:57:08AM +0100, Peter N. M. Hansteen wrote: Over in the comp.unix.bsd.freebsd.misc news group, there's a discussion about what happens when PF loads, specifically a perceived 'window of opportunity' for an attacker in the interval between PF getting enabled and the

Re: Problems with stalling sessions

2005-11-08 Thread Jon Hart
On Tue, Nov 08, 2005 at 01:39:21AM +0100, Per-Olov Sjöholm wrote: Hi I have a redundant firewall with CARP. 3.6 STABLE plus all patches from CVS for stable (updated last week). The firewalls have 7 nic ports each. External, internal, pfsync and 4 dmz interfaces. The servers are firewalls,

Re: no scrub reassemble tcp from foo to bar

2005-10-25 Thread Jon Hart
On Thu, Oct 20, 2005 at 08:24:32AM -0400, Jon Hart wrote: On Wed, Oct 19, 2005 at 07:51:13PM -0600, jared r r spiegel wrote: On Tue, Oct 18, 2005 at 11:50:41AM -0400, Jon Hart wrote: What I'd like is to disable scrub's tcp reassembly on per host/port/protol basis, something along

Re: no scrub reassemble tcp from foo to bar

2005-10-20 Thread Jon Hart
On Wed, Oct 19, 2005 at 07:51:13PM -0600, jared r r spiegel wrote: On Tue, Oct 18, 2005 at 11:50:41AM -0400, Jon Hart wrote: What I'd like is to disable scrub's tcp reassembly on per host/port/protol basis, something along the lines of: scrub all no-df random-id fragment reassemble

Re: Loading Files...

2005-10-20 Thread Jon Hart
On Thu, Oct 20, 2005 at 09:52:28AM -0500, Travis H. wrote: Does packet filter allow you to load external files? More specifically, could one place macro definitions in a separate file, but hook them up to pf.conf so as you reload the pf.conf file you get your macros? Thank you!

no scrub reassemble tcp from foo to bar

2005-10-18 Thread Jon Hart
I've got a situation here where a particular vendor's IP stack doesn't seem to be totally RFC compliant. The right solution is to get their stack fixed but that takes time. The problem is that when I turn on scrub's reassemble tcp option, i.e.: scrub all no-df random-id fragment reassemble

Re: Loading Files...

2005-10-18 Thread Jon Hart
On Sat, Oct 08, 2005 at 02:22:55PM -0700, ADub wrote: Dear bit.listserv.openbsd-pf, Does packet filter allow you to load external files? More specifically, could one place macro definitions in a separate file, but hook them up to pf.conf so as you reload the pf.conf file you get your

Re: control the number of pps

2005-10-18 Thread Jon Hart
On Wed, Oct 12, 2005 at 04:12:52PM -0200, Lucas wrote: List, i want to control the number of packets per second a client can send thru an interface. For example, i want to limit the IP 10.1.1.1 to send a max of just 10 packets per second. Is it possible to achieve this with pf or maybe

Re: optimizing pf firewall

2005-10-07 Thread Jon Hart
On Thu, Oct 06, 2005 at 03:48:17PM -0400, Dave wrote: pf.conf # pf.conf # for use on gateway box # Required order: options, normalization, queueing, translation, filtering. # Macros and tables may be defined and used anywhere. # Note that translation rules are first match while filter

scrub in and out, IP fragmentation and mismatched MTUs

2005-09-23 Thread Jon Hart
Greetings, This was mostly my fault but I saw some behavior in pf that I could not explain. This is with 2 OpenBSD 3.8 -snapshots from about 8/23 and a number of linux clients hanging off 4 different subnets on the firewalls. The application in question is JBoss. By default, it will wait until

Re: benefits of 'set state-policy if-bound'

2005-09-12 Thread Jon Hart
On Mon, Sep 12, 2005 at 09:24:23AM +0200, Cedric Berger wrote: snip and because pfctl -ss will show the interface, which is very helpful. Indeed. The more information I have to help debug any potential issues, the better. Whether or not these are true or complete is open to debate...

Re: altq priq Anomaly?

2005-06-23 Thread Jon Hart
On Thu, Jun 23, 2005 at 07:39:41AM -0400, Melameth, Daniel D. wrote: The TCP ACKs are not the issue. The issue is I never get more than half of what I set the bandwidth value to. I've never been able to get exactly the bandwidth I specified in my pf.conf altq rules. In trying to figure out

Re: PF State driving me nuts

2005-06-22 Thread Jon Hart
On Tue, Jun 21, 2005 at 09:16:16PM -0400, Jaime Vargas wrote: Hi all, I have a very simple setup. One soekris that is acting as firewall and router between two private networks. The rules are quite simple, and are suppose to only let the traffic for a few ports to past form the DMZ to the

Re: keep state is not keeping state - for one rule

2005-05-04 Thread Jon Hart
On Wed, May 04, 2005 at 04:00:20PM +0200, Henning Brauer wrote: * Jon Hart [EMAIL PROTECTED] [2005-05-04 14:35]: but you should definitely be specifying which combination of TCP flags can create the initial state here. Try flags S/SA as a start. no, this is bad advice and certainly

Re: simple configuration

2005-05-02 Thread Jon Hart
On Sun, May 01, 2005 at 07:32:35PM -0500, Brian John wrote: ext_if=vr0 altq on $ext_if cbq bandwidth 2Mb queue { web , p2p , ssh } queue web bandwidth 40% priority 6 cbq(borrow) queue ssh bandwidth 40% priority 6 cbq(borrow) queue p2p bandwidth 20% cbq(borrow default) #pass in on $ext_if

Re: Pfctl for non-root users

2005-04-11 Thread Jon Hart
On Mon, Apr 11, 2005 at 06:21:30AM -0400, Jason Dixon wrote: # su - hatchet $ pfctl -vsr pfctl: /dev/pf: Permission denied $ whoami hatchet $ groups hatchet wheel I think this is distinctly different than running pfctl via sudo as you had originally mentioned. In the example above, you

rdr on firewall initiated connections

2005-03-15 Thread Jon Hart
Greetings, In trying to diagnose a problem with ftp-proxy, I stumbled upon something with pf's rdr that I cannot explain. Assume a simple firewall ruleset. I had the following rdr line: rdr pass on $ext_if proto tcp from any to any \ port 21 - 127.0.0.1 port 2121 That line, along with