Could you please explain whether tcpdum should see a packet dropped on ipfw? 
Does it look before or after ipfw?
tcpdump -vvv port 25 shows nothing when port is blocked on ipfw (security log 
shows droped packets).
Also, is there a way to to see uid/gid on the packet in ipfw log?
Alternatively, can tcpdump show uid/gid of the packet (before ipfw)? I don't 
see uid/gid when use tcpdump -vvv port 25. Is there a way to understand if 
packet does't have uid/gid or it just not shown?
I can't figure out a good rule to protect access to port 25 for other than 
sendmail (yep, native sendmail). The obvious
${ipfw} add allow tcp from me to any 25 out gid smmsp setup keep-state 
:emailfromme
doesn't work (email is not sent out,but dropped on the ipfw by the last deny 
rule). Seems like the packet sent by sendmail doesn't belong to snmmsp group.
I have tried gid operator gid mail gid smmsp gid wheel - won't help.
How to debug?

--
Oleg
_______________________________________________
[email protected] mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-ipfw
To unsubscribe, send any mail to "[email protected]"

Reply via email to