On 08/02/15 13:37, Mike Belopuhov wrote:
> On 2 August 2015 at 15:28, RD Thrush <[email protected]> wrote:
>> On 08/01/15 19:31, Jonathan Gray wrote:
>>> On Sat, Aug 01, 2015 at 08:46:00PM +0200, Mike Belopuhov wrote:
>>>> [... snip ...]
>>>> You're slightly overanalyzing here: panic has caught the unhandled
>>>> case, but it's not needed per se.
>>>>
>>>
>>> The code directly after the panic assumes rpool is set.
>>> Something is clearly wrong in the pf code if this triggers.
>>>
>>> Without a pf.conf it is hard to guess as to why this triggers...
>>
>> I've attached a partially sanitized concatenation of pf rules, ifconfig,
>> netstat -nr, cat /etc/hostname.$if. Please let me know what more info would
>> be helpful.
>>
>> FWIW, this firewall has been operating successfully with snaps for many
>> years. The pf configuration is not tuned as it is somewhat a testbed with
>> an accumulation of various failed/successful experiments. Also, the urtwn
>> interface has been removed for at least the past month so treat the
>> associated rules accordingly.
>>
>
> most likely it's triggered by the reply-to statement. you may try the
> attached
> diff to see which rule the state belongs to. since you're using
> anchors, figuring
> out rule numbers will not be easy but you may try to see if one of those give
> you something reasonable:
>
> pfctl -a '*' -vvsr
> pfctl -a 'ext1' -vvsr
> pfctl -a 'ext2' -vvsr
Thanks, "panic: no appropriate pool for 23/23" is the new result. Since the
main pf has less than 23 rules and only one of the anchors has an active
interface, I assume it's rule 23 from the ext1 anchor. I've attached the pfctl
results from above as well as a short gdb session w/ the crash dump.
panic: no appropriate pool for 23/23
Stopped at Debugger+0x7: leave
RUN AT LEAST 'trace' AND 'ps' AND INCLUDE OUTPUT WHEN REPORTING THIS PANIC!
DO NOT EVEN BOTHER REPORTING THIS WITHOUT INCLUDING THAT INFORMATION!
ddb> trace
Debugger(d09d272c,f5233e18,d09a5231,f5233e18,0) at Debugger+0x7
panic(d09a5231,17,17,d03b7608,d179ec30) at panic+0x71
pf_postprocess_addr(d5daf1c4,d09a3978,751611d9,d608fba0,f5233f40) at
pf_postprocess_addr+0x2db
pf_unlink_state(d5daf1c4,8,0,0,0) at pf_unlink_state+0x2f
pf_purge_expired_states(8,20,d09a3b9f,64,d608fba0) at
pf_purge_expired_states+0x8e
pf_purge_thread(d608fba0) at pf_purge_thread+0x66
ddb> ps
PID PPID PGRP UID S FLAGS WAIT COMMAND
28959 29744 29744 0 3 0x82 nanosleep newsyslog
29744 15742 29744 0 3 0x8a pause sh
15742 29063 29063 0 3 0x80 piperd cron
30635 3057 18902 1000 3 0x82 nanosleep sleep
10521 3942 10521 1000 3 0x83 ttyin bash
3942 13206 13206 1000 3 0x90 select sshd
13206 10345 13206 0 3 0x92 poll sshd
24303 1 24303 0 3 0x83 ttyin getty
3057 18902 18902 1000 3 0x8a pause sh
18902 17843 18902 1000 3 0x8a pause sh
17843 29063 29063 0 3 0x80 piperd cron
29063 1 29063 0 3 0x80 poll cron
14529 1 18325 750 3 0x81 nanosleep perl
31306 19765 19765 606 3 0x90 kqread ladvd
19765 1 19765 0 3 0x80 kqread ladvd
628 1 628 99 3 0x90 poll sndiod
5370 1 5370 79 3 0x90 kqread tftpd
26243 17852 17852 67 3 0x90 kqread httpd
5443 17852 17852 67 3 0x90 kqread httpd
23826 28804 23826 67 3 0x90 kqread httpd
17852 28804 17852 67 3 0x90 kqread httpd
28804 1 28804 0 3 0x80 kqread httpd
28240 26040 26040 95 3 0x90 kqread smtpd
28040 26040 26040 95 3 0x90 kqread smtpd
17835 26040 26040 95 3 0x90 kqread smtpd
13222 26040 26040 95 3 0x90 kqread smtpd
21891 26040 26040 95 3 0x90 kqread smtpd
31023 26040 26040 103 3 0x90 kqread smtpd
26040 1 26040 0 3 0x80 kqread smtpd
7321 1 7321 77 3 0x90 poll dhcpd
10345 1 10345 0 3 0x80 select sshd
1103 0 0 0 3 0x14280 nfsidl nfsio
11485 0 0 0 3 0x14280 nfsidl nfsio
32022 0 0 0 3 0x14280 nfsidl nfsio
609 0 0 0 3 0x14280 nfsidl nfsio
20992 1 20992 0 3 0x80 poll ntpd
16027 17436 16027 83 3 0x90 poll ntpd
17436 1 17436 83 3 0x90 poll ntpd
15716 1 15716 53 3 0x90 kqread unbound
26708 10651 9354 97 3 0x90 kqread nsd
10651 9354 9354 97 3 0x90 select nsd
9354 1 9354 97 3 0x90 kqread nsd
17042 21725 21725 74 3 0x90 bpf pflogd
21725 1 21725 0 3 0x80 netio pflogd
21402 15626 15626 73 3 0x90 kqread syslogd
15626 1 15626 0 3 0x80 netio syslogd
22942 1 22942 577 3 0x90 poll openvpn
14257 0 0 0 3 0x14200 pgzero zerothread
18078 0 0 0 3 0x14200 aiodoned aiodoned
23489 0 0 0 3 0x14200 syncer update
5067 0 0 0 3 0x14200 cleaner cleaner
26636 0 0 0 3 0x14200 reaper reaper
8826 0 0 0 3 0x14200 pgdaemon pagedaemon
23805 0 0 0 3 0x14200 bored crypto
* 705 0 0 0 7 0x14200 pfpurge
21236 0 0 0 3 0x14200 usbtsk usbtask
28615 0 0 0 3 0x14200 usbatsk usbatsk
2343 0 0 0 3 0x14200 bored softnet
20428 0 0 0 3 0x14200 bored systqmp
16301 0 0 0 3 0x14200 bored systq
26974 0 0 0 3 0x40014200 idle0
798 0 0 0 3 0x14200 kmalloc kmthread
1 0 1 0 3 0x82 wait init
0 -1 0 0 3 0x10200 scheduler swapper
ddb> show registers
ds 0x10
es 0x10
fs 0x20
gs 0
edi 0x100
esi 0xd09a5231 fusefs_vfsops+0x1eb1
ebp 0xf5233dcc
ebx 0xf5233e18
edx 0x1
ecx 0xd0b25240 kprintf_mutex
eax 0x1
eip 0xd0553c57 Debugger+0x7
cs 0x8
eflags 0x282
esp 0xf5233dbc
ss 0x10
Debugger+0x7: leave
ddb> boot crash
@0 pass all flags S/SA
[ Evaluations: 120867 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@1 match out on egress all set ( prio(5, 6) )
[ Evaluations: 120867 Packets: 2213441 Bytes: 1025018633 States: 11 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@2 match all scrub (no-df)
[ Evaluations: 120867 Packets: 4986760 Bytes: 2222850423 States: 56 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@3 match out on pppoe all scrub (max-mss 1440)
[ Evaluations: 120867 Packets: 2213441 Bytes: 1025018633 States: 11 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@4 block drop all label "block_all"
[ Evaluations: 120867 Packets: 1754 Bytes: 130559 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@5 block drop in on ! int inet from 10.1.2.0/24 to any
[ Evaluations: 120867 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@6 block drop in inet from 10.1.2.1 to any
[ Evaluations: 94715 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@7 block drop in on ! dsl inet from 192.168.7.0/24 to any
[ Evaluations: 93838 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@8 block drop in inet from 192.168.7.2 to any
[ Evaluations: 93838 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@9 block drop in quick on int from any to <bogus:2> label "bogus_in"
[ Evaluations: 93838 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@10 anchor "ext1" on pppoe0 all {
[ Evaluations: 120867 Packets: 28211 Bytes: 2460602 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 246 ]
@0 block drop in on ! pppoe0 from (pppoe0:network:1) to any
[ Evaluations: 27251 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@1 block drop in from (pppoe0:1) to any
[ Evaluations: 27251 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@2 block drop in log quick on pppoe0 proto tcp from <sshguard:0> to any port =
22 label "ssh bruteforce_pppoe0"
[ Evaluations: 1099 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@3 block drop in log quick on pppoe0 from <bogon:13> to any label
"bogon_in_pppoe0"
[ Evaluations: 1099 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@4 block drop out log on pppoe0 from any to <bogon:13> label "bogon_out_pppoe0"
[ Evaluations: 27251 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@5 pass out log on pppoe0 all flags S/SA label "out_pppoe0"
[ Evaluations: 26152 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@6 match in on pppoe0 inet proto tcp from any to (pppoe0:1) port = 80 rdr-to
10.1.2.30
[ Evaluations: 27251 Packets: 306 Bytes: 17612 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@7 match in on pppoe0 inet proto tcp from any to (pppoe0:1) port = 6081 rdr-to
10.1.2.30
[ Evaluations: 685 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@8 match in on pppoe0 inet proto tcp from any to (pppoe0:1) port = 8080 rdr-to
10.1.2.30
[ Evaluations: 539 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@9 match in on pppoe0 inet proto tcp from any to (pppoe0:1) port = 9418 rdr-to
10.1.2.18 port 9418
[ Evaluations: 539 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@10 match in on pppoe0 inet proto tcp from any to (pppoe0:1) port = 119 rdr-to
10.1.2.10 port 119
[ Evaluations: 522 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@11 match in on pppoe0 inet proto tcp from any to (pppoe0:1) port = 65429
rdr-to 10.1.2.18 port 22
[ Evaluations: 522 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@12 match in on pppoe0 inet proto tcp from any to (pppoe0:1) port = 65428
rdr-to 10.1.2.30 port 22
[ Evaluations: 522 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@13 match in on pppoe0 inet proto tcp from any to (pppoe0:1) port = 65427
rdr-to 10.1.2.31 port 22
[ Evaluations: 522 Packets: 26838 Bytes: 2249564 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@14 match in on pppoe0 inet proto tcp from any to (pppoe0:1) port = 65426
rdr-to 10.1.2.33 port 22
[ Evaluations: 522 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@15 match in on pppoe0 inet proto tcp from any to (pppoe0:1) port = 65425
rdr-to 10.1.2.11 port 22
[ Evaluations: 520 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@16 match in on pppoe0 inet proto tcp from any to (pppoe0:1) port = 65424
rdr-to 10.1.2.12 port 22
[ Evaluations: 520 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@17 match in on pppoe0 inet proto tcp from any to (pppoe0:1) port = 65423
rdr-to 10.1.2.15 port 22
[ Evaluations: 520 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@18 match in on pppoe0 inet proto tcp from any to (pppoe0:1) port = 65420
rdr-to 10.1.2.143 port 22
[ Evaluations: 520 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@19 match in on pppoe0 inet proto tcp from any to (pppoe0:1) port = 65419
rdr-to 10.1.2.144 port 22
[ Evaluations: 520 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@20 match in on pppoe0 inet proto tcp from any to (pppoe0:1) port = 46889 set (
prio 2 ) rdr-to 10.1.2.17 port 46889
[ Evaluations: 520 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@21 match in on pppoe0 inet proto udp from any to (pppoe0:1) port = 46889 set (
prio 2 ) rdr-to 10.1.2.17 port 46889
[ Evaluations: 414 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@22 match out on pppoe0 inet from <int_net:5> to any nat-to (pppoe0:0:1)
[ Evaluations: 27251 Packets: 2109397 Bytes: 1003141051 States: 10 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@23 pass in quick on pppoe0 inet proto tcp from any to any port = 22 flags S/SA
synproxy state reply-to pppoe0
[ Evaluations: 25630 Packets: 27856 Bytes: 2431526 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 98 ]
@24 pass in quick on pppoe0 inet proto tcp from any to any port = 52122 flags
S/SA synproxy state reply-to pppoe0
[ Evaluations: 587 Packets: 49 Bytes: 11464 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 2 ]
@25 pass in quick on pppoe0 inet proto tcp from any to any port = 65432 flags
S/SA synproxy state reply-to pppoe0
[ Evaluations: 585 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@26 pass in quick on pppoe0 inet proto tcp from any to any port = 65431 flags
S/SA synproxy state reply-to pppoe0
[ Evaluations: 585 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@27 pass in quick on pppoe0 inet proto tcp from any to any port = 65430 flags
S/SA synproxy state reply-to pppoe0
[ Evaluations: 585 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@28 pass in quick on pppoe0 inet proto tcp from any to any port = 65429 flags
S/SA synproxy state reply-to pppoe0
[ Evaluations: 585 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@29 pass in quick on pppoe0 inet proto tcp from any to any port = 65428 flags
S/SA synproxy state reply-to pppoe0
[ Evaluations: 585 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@30 pass in quick on pppoe0 inet proto tcp from any to any port = 65427 flags
S/SA synproxy state reply-to pppoe0
[ Evaluations: 585 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@31 pass in quick on pppoe0 inet proto tcp from any to any port = 65426 flags
S/SA synproxy state reply-to pppoe0
[ Evaluations: 585 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@32 pass in quick on pppoe0 inet proto tcp from any to any port = 65425 flags
S/SA synproxy state reply-to pppoe0
[ Evaluations: 585 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@33 pass in quick on pppoe0 inet proto tcp from any to any port = 65424 flags
S/SA synproxy state reply-to pppoe0
[ Evaluations: 585 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@34 pass in quick on pppoe0 inet proto tcp from any to any port = 65423 flags
S/SA synproxy state reply-to pppoe0
[ Evaluations: 585 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@35 pass in quick on pppoe0 inet proto tcp from any to any port = 65420 flags
S/SA synproxy state reply-to pppoe0
[ Evaluations: 585 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@36 pass in quick on pppoe0 inet proto tcp from any to any port = 65419 flags
S/SA synproxy state reply-to pppoe0
[ Evaluations: 585 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@37 pass in on pppoe0 inet proto tcp from any to any port = 119 flags S/SA
reply-to pppoe0
[ Evaluations: 585 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@38 pass in on pppoe0 inet proto tcp from any to any port = 80 flags S/SA
reply-to pppoe0
[ Evaluations: 585 Packets: 306 Bytes: 17612 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 146 ]
@39 pass in on pppoe0 inet proto udp from any to any port = 1194 reply-to pppoe0
[ Evaluations: 999 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@40 pass in on pppoe0 inet proto tcp from any to any port = 46889 flags S/SA
set ( prio 2 ) reply-to pppoe0
[ Evaluations: 999 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@41 pass in on pppoe0 inet proto udp from any to any port = 46889 set ( prio 2
) reply-to pppoe0
[ Evaluations: 496 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
}
@11 anchor "ext2" on urtwn0 all {
[ Evaluations: 119146 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@0 block drop in on ! urtwn0 from (urtwn0:network:*) to any
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@1 block drop in from (urtwn0:*) to any
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@2 block drop in log quick on urtwn0 proto tcp from <sshguard:0> to any port =
22 label "ssh bruteforce_urtwn0"
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@3 block drop in log quick on urtwn0 from <bogon:13> to any label
"bogon_in_urtwn0"
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@4 block drop out log on urtwn0 from any to <bogon:13> label "bogon_out_urtwn0"
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@5 pass out log on urtwn0 all flags S/SA label "out_urtwn0"
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@6 match in on urtwn0 inet proto tcp from any to (urtwn0:*) port = 80 rdr-to
10.1.2.18
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@7 match in on urtwn0 inet proto tcp from any to (urtwn0:*) port = 6081 rdr-to
10.1.2.18
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@8 match in on urtwn0 inet proto tcp from any to (urtwn0:*) port = 8080 rdr-to
10.1.2.18
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@9 match in on urtwn0 inet proto tcp from any to (urtwn0:*) port = 9418 rdr-to
10.1.2.18 port 9418
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@10 match in on urtwn0 inet proto tcp from any to (urtwn0:*) port = 119 rdr-to
10.1.2.10 port 119
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@11 match in on urtwn0 inet proto tcp from any to (urtwn0:*) port = 65429
rdr-to 10.1.2.18 port 22
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@12 match in on urtwn0 inet proto tcp from any to (urtwn0:*) port = 65428
rdr-to 10.1.2.30 port 22
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@13 match in on urtwn0 inet proto tcp from any to (urtwn0:*) port = 65427
rdr-to 10.1.2.31 port 22
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@14 match in on urtwn0 inet proto tcp from any to (urtwn0:*) port = 65426
rdr-to 10.1.2.33 port 22
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@15 match in on urtwn0 inet proto tcp from any to (urtwn0:*) port = 65425
rdr-to 10.1.2.11 port 22
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@16 match in on urtwn0 inet proto tcp from any to (urtwn0:*) port = 65424
rdr-to 10.1.2.12 port 22
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@17 match in on urtwn0 inet proto tcp from any to (urtwn0:*) port = 65423
rdr-to 10.1.2.15 port 22
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@18 match in on urtwn0 inet proto tcp from any to (urtwn0:*) port = 65420
rdr-to 10.1.2.143 port 22
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@19 match in on urtwn0 inet proto tcp from any to (urtwn0:*) port = 65419
rdr-to 10.1.2.144 port 22
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@20 match in on urtwn0 inet proto tcp from any to (urtwn0:*) port = 46889
rdr-to 10.1.2.17 port 46889
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@21 match in on urtwn0 inet proto udp from any to (urtwn0:*) port = 46889
rdr-to 10.1.2.17 port 46889
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@22 match out on urtwn0 inet from ! (urtwn0:*) to any nat-to (urtwn0:0:*)
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@23 pass in quick on urtwn0 inet proto tcp from any to any port = 22 flags S/SA
synproxy state reply-to urtwn0
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@24 pass in quick on urtwn0 inet proto tcp from any to any port = 52122 flags
S/SA synproxy state reply-to urtwn0
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@25 pass in quick on urtwn0 inet proto tcp from any to any port = 65432 flags
S/SA synproxy state reply-to urtwn0
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@26 pass in quick on urtwn0 inet proto tcp from any to any port = 65431 flags
S/SA synproxy state reply-to urtwn0
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@27 pass in quick on urtwn0 inet proto tcp from any to any port = 65430 flags
S/SA synproxy state reply-to urtwn0
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@28 pass in quick on urtwn0 inet proto tcp from any to any port = 65429 flags
S/SA synproxy state reply-to urtwn0
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@29 pass in quick on urtwn0 inet proto tcp from any to any port = 65428 flags
S/SA synproxy state reply-to urtwn0
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@30 pass in quick on urtwn0 inet proto tcp from any to any port = 65427 flags
S/SA synproxy state reply-to urtwn0
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@31 pass in quick on urtwn0 inet proto tcp from any to any port = 65426 flags
S/SA synproxy state reply-to urtwn0
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@32 pass in quick on urtwn0 inet proto tcp from any to any port = 65425 flags
S/SA synproxy state reply-to urtwn0
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@33 pass in quick on urtwn0 inet proto tcp from any to any port = 65424 flags
S/SA synproxy state reply-to urtwn0
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@34 pass in quick on urtwn0 inet proto tcp from any to any port = 65423 flags
S/SA synproxy state reply-to urtwn0
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@35 pass in quick on urtwn0 inet proto tcp from any to any port = 65420 flags
S/SA synproxy state reply-to urtwn0
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@36 pass in quick on urtwn0 inet proto tcp from any to any port = 65419 flags
S/SA synproxy state reply-to urtwn0
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@37 pass in on urtwn0 inet proto tcp from any to any port = 119 flags S/SA
reply-to urtwn0
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@38 pass in on urtwn0 inet proto tcp from any to any port = 80 flags S/SA
reply-to urtwn0
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@39 pass in on urtwn0 inet proto udp from any to any port = 1194 reply-to urtwn0
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
}
@12 pass out quick all flags S/SA
[ Evaluations: 119146 Packets: 2377186 Bytes: 1130924666 States: 12 ]
[ Inserted: uid 0 pid 20191 State Creations: 25370 ]
@13 pass in inet proto icmp all icmp-type echoreq
[ Evaluations: 93774 Packets: 18 Bytes: 592 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 9 ]
@14 pass in inet proto icmp all icmp-type unreach
[ Evaluations: 93 Packets: 73 Bytes: 6212 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@15 pass in quick on dsl inet from 192.168.7.0/24 to any flags S/SA
[ Evaluations: 93738 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@16 pass on lo0 inet6 from fe80::1 to any flags S/SA
[ Evaluations: 93774 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@17 pass inet6 from ::1 to any flags S/SA
[ Evaluations: 93774 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@18 pass inet from 127.0.0.1 to any flags S/SA
[ Evaluations: 93774 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@19 pass inet from 10.1.2.0/24 to any flags S/SA
[ Evaluations: 93774 Packets: 2581347 Bytes: 1089464763 States: 44 ]
[ Inserted: uid 0 pid 20191 State Creations: 90207 ]
@20 pass quick on tun0 inet all flags S/SA
[ Evaluations: 93774 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@21 pass out on vr3 inet proto tcp from any to 192.168.7.1 port = 80 flags S/SA
[ Evaluations: 93774 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@0 block drop in on ! pppoe0 from (pppoe0:network:1) to any
[ Evaluations: 27255 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@1 block drop in from (pppoe0:1) to any
[ Evaluations: 27255 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@2 block drop in log quick on pppoe0 proto tcp from <sshguard:0> to any port =
22 label "ssh bruteforce_pppoe0"
[ Evaluations: 1099 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@3 block drop in log quick on pppoe0 from <bogon:13> to any label
"bogon_in_pppoe0"
[ Evaluations: 1099 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@4 block drop out log on pppoe0 from any to <bogon:13> label "bogon_out_pppoe0"
[ Evaluations: 27255 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@5 pass out log on pppoe0 all flags S/SA label "out_pppoe0"
[ Evaluations: 26156 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@6 match in on pppoe0 inet proto tcp from any to (pppoe0:1) port = 80 rdr-to
10.1.2.30
[ Evaluations: 27255 Packets: 306 Bytes: 17612 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@7 match in on pppoe0 inet proto tcp from any to (pppoe0:1) port = 6081 rdr-to
10.1.2.30
[ Evaluations: 685 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@8 match in on pppoe0 inet proto tcp from any to (pppoe0:1) port = 8080 rdr-to
10.1.2.30
[ Evaluations: 539 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@9 match in on pppoe0 inet proto tcp from any to (pppoe0:1) port = 9418 rdr-to
10.1.2.18 port 9418
[ Evaluations: 539 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@10 match in on pppoe0 inet proto tcp from any to (pppoe0:1) port = 119 rdr-to
10.1.2.10 port 119
[ Evaluations: 522 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@11 match in on pppoe0 inet proto tcp from any to (pppoe0:1) port = 65429
rdr-to 10.1.2.18 port 22
[ Evaluations: 522 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@12 match in on pppoe0 inet proto tcp from any to (pppoe0:1) port = 65428
rdr-to 10.1.2.30 port 22
[ Evaluations: 522 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@13 match in on pppoe0 inet proto tcp from any to (pppoe0:1) port = 65427
rdr-to 10.1.2.31 port 22
[ Evaluations: 522 Packets: 26838 Bytes: 2249564 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@14 match in on pppoe0 inet proto tcp from any to (pppoe0:1) port = 65426
rdr-to 10.1.2.33 port 22
[ Evaluations: 522 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@15 match in on pppoe0 inet proto tcp from any to (pppoe0:1) port = 65425
rdr-to 10.1.2.11 port 22
[ Evaluations: 520 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@16 match in on pppoe0 inet proto tcp from any to (pppoe0:1) port = 65424
rdr-to 10.1.2.12 port 22
[ Evaluations: 520 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@17 match in on pppoe0 inet proto tcp from any to (pppoe0:1) port = 65423
rdr-to 10.1.2.15 port 22
[ Evaluations: 520 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@18 match in on pppoe0 inet proto tcp from any to (pppoe0:1) port = 65420
rdr-to 10.1.2.143 port 22
[ Evaluations: 520 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@19 match in on pppoe0 inet proto tcp from any to (pppoe0:1) port = 65419
rdr-to 10.1.2.144 port 22
[ Evaluations: 520 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@20 match in on pppoe0 inet proto tcp from any to (pppoe0:1) port = 46889 set (
prio 2 ) rdr-to 10.1.2.17 port 46889
[ Evaluations: 520 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@21 match in on pppoe0 inet proto udp from any to (pppoe0:1) port = 46889 set (
prio 2 ) rdr-to 10.1.2.17 port 46889
[ Evaluations: 414 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@22 match out on pppoe0 inet from <int_net:5> to any nat-to (pppoe0:0:1)
[ Evaluations: 27255 Packets: 2109442 Bytes: 1003145431 States: 10 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@23 pass in quick on pppoe0 inet proto tcp from any to any port = 22 flags S/SA
synproxy state reply-to pppoe0
[ Evaluations: 25634 Packets: 27856 Bytes: 2431526 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 98 ]
@24 pass in quick on pppoe0 inet proto tcp from any to any port = 52122 flags
S/SA synproxy state reply-to pppoe0
[ Evaluations: 587 Packets: 49 Bytes: 11464 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 2 ]
@25 pass in quick on pppoe0 inet proto tcp from any to any port = 65432 flags
S/SA synproxy state reply-to pppoe0
[ Evaluations: 585 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@26 pass in quick on pppoe0 inet proto tcp from any to any port = 65431 flags
S/SA synproxy state reply-to pppoe0
[ Evaluations: 585 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@27 pass in quick on pppoe0 inet proto tcp from any to any port = 65430 flags
S/SA synproxy state reply-to pppoe0
[ Evaluations: 585 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@28 pass in quick on pppoe0 inet proto tcp from any to any port = 65429 flags
S/SA synproxy state reply-to pppoe0
[ Evaluations: 585 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@29 pass in quick on pppoe0 inet proto tcp from any to any port = 65428 flags
S/SA synproxy state reply-to pppoe0
[ Evaluations: 585 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@30 pass in quick on pppoe0 inet proto tcp from any to any port = 65427 flags
S/SA synproxy state reply-to pppoe0
[ Evaluations: 585 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@31 pass in quick on pppoe0 inet proto tcp from any to any port = 65426 flags
S/SA synproxy state reply-to pppoe0
[ Evaluations: 585 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@32 pass in quick on pppoe0 inet proto tcp from any to any port = 65425 flags
S/SA synproxy state reply-to pppoe0
[ Evaluations: 585 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@33 pass in quick on pppoe0 inet proto tcp from any to any port = 65424 flags
S/SA synproxy state reply-to pppoe0
[ Evaluations: 585 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@34 pass in quick on pppoe0 inet proto tcp from any to any port = 65423 flags
S/SA synproxy state reply-to pppoe0
[ Evaluations: 585 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@35 pass in quick on pppoe0 inet proto tcp from any to any port = 65420 flags
S/SA synproxy state reply-to pppoe0
[ Evaluations: 585 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@36 pass in quick on pppoe0 inet proto tcp from any to any port = 65419 flags
S/SA synproxy state reply-to pppoe0
[ Evaluations: 585 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@37 pass in on pppoe0 inet proto tcp from any to any port = 119 flags S/SA
reply-to pppoe0
[ Evaluations: 585 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@38 pass in on pppoe0 inet proto tcp from any to any port = 80 flags S/SA
reply-to pppoe0
[ Evaluations: 585 Packets: 306 Bytes: 17612 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 146 ]
@39 pass in on pppoe0 inet proto udp from any to any port = 1194 reply-to pppoe0
[ Evaluations: 999 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@40 pass in on pppoe0 inet proto tcp from any to any port = 46889 flags S/SA
set ( prio 2 ) reply-to pppoe0
[ Evaluations: 999 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@41 pass in on pppoe0 inet proto udp from any to any port = 46889 set ( prio 2
) reply-to pppoe0
[ Evaluations: 496 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@0 block drop in on ! urtwn0 from (urtwn0:network:*) to any
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@1 block drop in from (urtwn0:*) to any
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@2 block drop in log quick on urtwn0 proto tcp from <sshguard:0> to any port =
22 label "ssh bruteforce_urtwn0"
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@3 block drop in log quick on urtwn0 from <bogon:13> to any label
"bogon_in_urtwn0"
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@4 block drop out log on urtwn0 from any to <bogon:13> label "bogon_out_urtwn0"
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@5 pass out log on urtwn0 all flags S/SA label "out_urtwn0"
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@6 match in on urtwn0 inet proto tcp from any to (urtwn0:*) port = 80 rdr-to
10.1.2.18
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@7 match in on urtwn0 inet proto tcp from any to (urtwn0:*) port = 6081 rdr-to
10.1.2.18
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@8 match in on urtwn0 inet proto tcp from any to (urtwn0:*) port = 8080 rdr-to
10.1.2.18
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@9 match in on urtwn0 inet proto tcp from any to (urtwn0:*) port = 9418 rdr-to
10.1.2.18 port 9418
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@10 match in on urtwn0 inet proto tcp from any to (urtwn0:*) port = 119 rdr-to
10.1.2.10 port 119
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@11 match in on urtwn0 inet proto tcp from any to (urtwn0:*) port = 65429
rdr-to 10.1.2.18 port 22
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@12 match in on urtwn0 inet proto tcp from any to (urtwn0:*) port = 65428
rdr-to 10.1.2.30 port 22
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@13 match in on urtwn0 inet proto tcp from any to (urtwn0:*) port = 65427
rdr-to 10.1.2.31 port 22
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@14 match in on urtwn0 inet proto tcp from any to (urtwn0:*) port = 65426
rdr-to 10.1.2.33 port 22
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@15 match in on urtwn0 inet proto tcp from any to (urtwn0:*) port = 65425
rdr-to 10.1.2.11 port 22
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@16 match in on urtwn0 inet proto tcp from any to (urtwn0:*) port = 65424
rdr-to 10.1.2.12 port 22
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@17 match in on urtwn0 inet proto tcp from any to (urtwn0:*) port = 65423
rdr-to 10.1.2.15 port 22
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@18 match in on urtwn0 inet proto tcp from any to (urtwn0:*) port = 65420
rdr-to 10.1.2.143 port 22
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@19 match in on urtwn0 inet proto tcp from any to (urtwn0:*) port = 65419
rdr-to 10.1.2.144 port 22
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@20 match in on urtwn0 inet proto tcp from any to (urtwn0:*) port = 46889
rdr-to 10.1.2.17 port 46889
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@21 match in on urtwn0 inet proto udp from any to (urtwn0:*) port = 46889
rdr-to 10.1.2.17 port 46889
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@22 match out on urtwn0 inet from ! (urtwn0:*) to any nat-to (urtwn0:0:*)
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@23 pass in quick on urtwn0 inet proto tcp from any to any port = 22 flags S/SA
synproxy state reply-to urtwn0
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@24 pass in quick on urtwn0 inet proto tcp from any to any port = 52122 flags
S/SA synproxy state reply-to urtwn0
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@25 pass in quick on urtwn0 inet proto tcp from any to any port = 65432 flags
S/SA synproxy state reply-to urtwn0
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@26 pass in quick on urtwn0 inet proto tcp from any to any port = 65431 flags
S/SA synproxy state reply-to urtwn0
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@27 pass in quick on urtwn0 inet proto tcp from any to any port = 65430 flags
S/SA synproxy state reply-to urtwn0
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@28 pass in quick on urtwn0 inet proto tcp from any to any port = 65429 flags
S/SA synproxy state reply-to urtwn0
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@29 pass in quick on urtwn0 inet proto tcp from any to any port = 65428 flags
S/SA synproxy state reply-to urtwn0
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@30 pass in quick on urtwn0 inet proto tcp from any to any port = 65427 flags
S/SA synproxy state reply-to urtwn0
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@31 pass in quick on urtwn0 inet proto tcp from any to any port = 65426 flags
S/SA synproxy state reply-to urtwn0
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@32 pass in quick on urtwn0 inet proto tcp from any to any port = 65425 flags
S/SA synproxy state reply-to urtwn0
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@33 pass in quick on urtwn0 inet proto tcp from any to any port = 65424 flags
S/SA synproxy state reply-to urtwn0
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@34 pass in quick on urtwn0 inet proto tcp from any to any port = 65423 flags
S/SA synproxy state reply-to urtwn0
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@35 pass in quick on urtwn0 inet proto tcp from any to any port = 65420 flags
S/SA synproxy state reply-to urtwn0
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@36 pass in quick on urtwn0 inet proto tcp from any to any port = 65419 flags
S/SA synproxy state reply-to urtwn0
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@37 pass in on urtwn0 inet proto tcp from any to any port = 119 flags S/SA
reply-to urtwn0
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@38 pass in on urtwn0 inet proto tcp from any to any port = 80 flags S/SA
reply-to urtwn0
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
@39 pass in on urtwn0 inet proto udp from any to any port = 1194 reply-to urtwn0
[ Evaluations: 0 Packets: 0 Bytes: 0 States: 0 ]
[ Inserted: uid 0 pid 20191 State Creations: 0 ]
obsd32:i386/tmp 2>sudo gdb
GNU gdb 6.3
Copyright 2004 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and you are
welcome to change it and/or distribute copies of it under certain conditions.
Type "show copying" to see the conditions.
There is absolutely no warranty for GDB. Type "show warranty" for details.
This GDB was configured as "i386-unknown-openbsd5.8".
(gdb) file bsd.gdb
Reading symbols from /usr/obj/i386/tmp/bsd.gdb...done.
(gdb) target kvm bsd.2.core
#0 0xd0557ac8 in boot (howto=0) at ../../../../arch/i386/i386/machdep.c:2637
2637 dumpsys();
(gdb) bt
#0 0xd0557ac8 in boot (howto=0) at ../../../../arch/i386/i386/machdep.c:2637
#1 0xd03bb04f in reboot (howto=0) at ../../../../kern/kern_xxx.c:69
#2 0xd037f4b2 in db_boot_crash_cmd (addr=Could not find the frame base for
"db_boot_crash_cmd".
) at ../../../../ddb/db_command.c:730
#3 0xd037fb94 in db_command (last_cmdp=0x0, cmd_table=0xd0b22dc0) at
../../../../ddb/db_command.c:260
#4 0xd037fddf in db_command_loop () at ../../../../ddb/db_command.c:643
#5 0xd0383faa in db_trap (type=1, code=0) at ../../../../ddb/db_trap.c:94
#6 0xd0553edc in kdb_trap (type=1, code=0, regs=0xf5233d7c) at
../../../../arch/i386/i386/db_interface.c:157
#7 0xd0565af5 in trap (frame=0xf5233d7c) at
../../../../arch/i386/i386/trap.c:189
#8 0xd0200b12 in calltrap ()
#9 0xd0553c57 in Debugger () at ../../../../arch/i386/i386/db_interface.c:359
#10 0xd03c9791 in panic (fmt=0xd09a5231 "no appropriate pool for %d/%d") at
../../../../kern/subr_prf.c:214
#11 0xd037023b in pf_postprocess_addr (cur=Variable "cur" is not available.
) at ../../../../net/pf_lb.c:877
#12 0xd035174f in pf_unlink_state (cur=0xd5daf1c4) at ../../../../net/pf.c:1265
#13 0xd03518be in pf_purge_expired_states (maxcheck=8) at
../../../../net/pf.c:1354
#14 0xd03519a6 in pf_purge_thread (v=0xd608fba0) at ../../../../net/pf.c:1161
#15 0xd0200519 in proc_trampoline ()
(gdb) fr 11
#11 0xd037023b in pf_postprocess_addr (cur=Variable "cur" is not available.
) at ../../../../net/pf_lb.c:877
877 panic("no appropriate pool for %d/%d", cur->rule.ptr ?
(gdb) list
872 else if (nr->nat.addr.type != PF_ADDR_NONE)
873 rpool = nr->nat;
874 else if (nr->route.addr.type != PF_ADDR_NONE)
875 rpool = nr->route;
876 else
877 panic("no appropriate pool for %d/%d", cur->rule.ptr ?
878 cur->rule.ptr->nr : -1, nr->nr);
879
880 if (((rpool.opts & PF_POOL_TYPEMASK) != PF_POOL_LEASTSTATES))
881 return (0);
(gdb) info frame
Stack level 11, frame at 0xf5233ed4:
eip = 0xd037023b in pf_postprocess_addr (../../../../net/pf_lb.c:877); saved
eip 0xd035174f
called by frame at 0xf5233f34, caller of frame at 0xf5233e14
source language c.
Arglist at 0xf5233ecc, args: cur=Variable "cur" is not available.
(gdb) info locals
nr = Variable "nr" is not available.
(gdb) p nr->nr
Variable "nr" is not available.
(gdb) down
#10 0xd03c9791 in panic (fmt=0xd09a5231 "no appropriate pool for %d/%d") at
../../../../kern/subr_prf.c:214
214 Debugger();
(gdb) up
#11 0xd037023b in pf_postprocess_addr (cur=Variable "cur" is not available.
) at ../../../../net/pf_lb.c:877
877 panic("no appropriate pool for %d/%d", cur->rule.ptr ?
(gdb) up
#12 0xd035174f in pf_unlink_state (cur=0xd5daf1c4) at ../../../../net/pf.c:1265
1265 pf_postprocess_addr(cur);
(gdb) set height 0
(gdb) p cur
$1 = (struct pf_state *) 0xd5daf1c4
(gdb) p *cur
$2 = {id = 10665649818231553621, creatorid = 601369293, direction = 1 '\001',
pad = "\000\000", sync_list = {tqe_next = 0x0,
tqe_prev = 0x0}, entry_list = {tqe_next = 0xd5ead8c8, tqe_prev =
0xd5dbad38}, entry_id = {rbe_left = 0xd5da5384, rbe_right = 0x0,
rbe_parent = 0xd603c8c8, rbe_color = 0}, src = {scrub = 0x0, seqlo =
2206602467, seqhi = 4222343688, seqdiff = 0,
max_win = 65535, mss = 64, state = 11 '\v', wscale = 0 '\0', tcp_est = 0
'\0', pad = ""}, dst = {scrub = 0x0, seqlo = 0,
seqhi = 1, seqdiff = 0, max_win = 1, mss = 0, state = 0 '\0', wscale = 0
'\0', tcp_est = 0 '\0', pad = ""}, match_rules = {
slh_first = 0xd5f92db8}, rule = {ptr = 0xd5fac4fc, nr = 3589981436}, anchor
= {ptr = 0xd5fbb978, nr = 3590044024}, natrule = {
ptr = 0xd5fac4fc, nr = 3589981436}, rt_addr = {pfa = {v4 = {s_addr = 0}, v6
= {__u6_addr = {__u6_addr8 = '\0' <repeats 15 times>,
__u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}},
addr8 = '\0' <repeats 15 times>, addr16 = {0, 0, 0,
0, 0, 0, 0, 0}, addr32 = {0, 0, 0, 0}}}, src_nodes = {slh_first = 0x0},
key = {0xd601b5a8, 0xd601b5a8}, kif = 0xd1895200,
rt_kif = 0xd1951000, packets = {0, 0}, bytes = {0, 0}, creation = 532, expire
= 532, pfsync_time = 0, qid = 0, pqid = 0, tag = 0,
state_flags = 32, log = 0 '\0', timeout = 0 '\0', sync_state = 255 'ΓΏ',
sync_updates = 0 '\0', rtableid = {-1, 0},
min_ttl = 0 '\0', set_tos = 0 '\0', set_prio = "\000", max_mss = 0,
if_index_in = 7, if_index_out = 0, pad2 = "\000"}
(gdb) quit