Specifically, here is the problem:
With the first set of rules loaded,
ns2.et> ipf -Fa -f ipf.conf
ns2.et> ipfstat -hi | grep icmp ; ipfstat -ho | head -4
0 pass in quick proto icmp from any to any
0 pass out quick on lo0 all
0 pass out quick all keep state
0 block out log all
[EMAIL PROTECTED] (138) [~]> ping ns2.et
PING ns2.et (192.168.1.2) 56(84) bytes of data.

--- ns2.et ping statistics ---
8 packets transmitted, 0 received, 100% packet loss, time 7000ms
ns2.et> ipfstat -hi | grep icmp ; ipfstat -ho | head -4
8 pass in quick proto icmp from any to any
0 pass out quick on lo0 all
8 pass out quick all keep state
0 block out log all

Why don't the icmp replies ever make it out? I run a snoop on ns2.et, and I only see ICMP requests, no replies. Flushing the rules, or tweaking the rule set fixes this, but it worked in 3.4.31 before.

Erik Huizing wrote:

Hello,
I'm planning to upgrade some of our servers to 4.1.8, and while testing, found that icmp doesn't work with our current rule set. We've got

# start of file
# outbound connections
pass out quick all keep state
# allow ping
pass in quick proto icmp all
# rest of file is port and IP-based ACLS

I found switching to this, worked
# allow ping
pass out quick proto icmp all
pass in quick proto icmp all

# outbound connections
pass out quick all keep state

Did something change between ipf 3.4.31 to 4.1.8 that would cause this behaviour? Am I correct in guessing I'll have to tweak the rule sets as I roll out the upgrade?



--
Erik Huizing
Regional Services
(403)-781-4906

Reply via email to