As described below, I am still unable to deploy IPFilter because it blocks communication among trusted hosts within my domain. Since the Email below, I've explicitly coded "pass in quick ..." statements for each IP address in my subnet, yet blocks still occur. 
 
What am I missing?

What other reasons would cause explicitly defined "pass in quick ..." hosts to be blocked?

Could OOW conditions be occurring in spite of my patch below? 
 
I can't try a newer release with confidence until I get this (what seems should be) basic situation resolved. 
 
This is so-o-o very frustrating! I would certainly appreciate any help that you may offer. 
 
Charles 
 
-----Original Message----- 
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Thu, 4 Jan 2007 8:33 am 
Subject: IPFilter 4.1.13 on Solaris 8 
 
I am attempting to deploy IPFilter 4.1.13 on Solaris 8 systems.  
  
I was unable to deploy IPFilter 4.1.8 due to my trusted computers being blocked by OOW conditions.   So, I tried IPFilter 4.1.13. Again OOW conditions prevented deployment.  
Then I rebuilt IPFilter 4.1.13 with (hopefully) no OOW blocking.  
  
Was:  
ip_fil.h:#define FI_OOW 0x0800 /* Out of state window, ... */  
Is:  
ip_fil.h:#define FI_OOW 0x0000 /* Out of state window, ... */  
  
My logic, though arguably faulty, is that I am apparently living okay with OOW conditions without IPFilter.  
I need the protection of IPFilter now.  
  
This modification to IPFilter ran on a test computer for weeks without any unexpected blocks.   Then when I attempted to deploy it, IPFilter started blocking my trusted computers. My intent, as shown   by these config statements, is to NEVER block any traffic from any computers on my subnet  
(123.456.78.01 - 123.456.78.99):  
  
 pass in quick proto tcp from 123.456.78.0/26 to any flags S keep  
 pass in quick proto udp from 123.456.78.0/26 to any keep state  
  pass in quick proto tcp from 123.456.78.64/27 to any flags S keep state  
  pass in quick proto udp from 123.456.78.64/27 to any keep state   
  pass in quick proto tcp from 123.456.78.96/28 to any flags S keep state  
 pass in quick proto udp from 123.456.78.96/28 to any keep state  
  
However, as shown below from ipmon logs, sometimes traffic from 123.456.78.xx computers is being blocked.  
  
I hope that someone can see what I am missing.  
  
This situation prohibits me from deploying the much needed IPFilter firewall.  
  
-------------------------------------------------------------------------
 
  
-------------------------------------------------------------------------
 
  
-------  
  
Computer 123.456.78.11:  
29/11/2006 12:16:35.785428 eri0 @0:18 b 123.456.78.59,52740 -> 123.456.78.11,32772 PR tcp len 20 40 -AF IN   29/11/2006 12:16:36.713333 eri0 @0:18 b 123.456.78.59,52740 -> 123.456.78.11,32772 PR tcp len 20 40 -AF IN   29/11/2006 12:16:38.583342 eri0 @0:18 b 123.456.78.59,52740 -> 123.456.78.11,32772 PR tcp len 20 40 -AF IN   29/11/2006 12:16:42.333484 eri0 @0:18 b 123.456.78.59,52740 -> 123.456.78.11,32772 PR tcp len 20 40 -AF IN   29/11/2006 12:16:49.834710 eri0 @0:18 b 123.456.78.59,52740 -> 123.456.78.11,32772 PR tcp len 20 40 -AF IN   29/11/2006 12:17:04.833742 eri0 @0:18 b 123.456.78.59,52740 -> 123.456.78.11,32772 PR tcp len 20 40 -AF IN  
  
Computer 123.456.78.43:  
28/11/2006 20:18:07.266794 eri0 @0:18 b 123.456.78.11,33204 -> 123.456.78.43,33287 PR tcp len 20 40 -AF IN   28/11/2006 20:18:10.632686 eri0 @0:18 b 123.456.78.11,33204 -> 123.456.78.43,33287 PR tcp len 20 40 -AF IN   28/11/2006 20:18:17.382736 eri0 @0:18 b 123.456.78.11,33204 -> 123.456.78.43,33287 PR tcp len 20 40 -AF IN  
  
... records deleted ...  
  
29/11/2006 07:54:58.685624 eri0 @0:18 b 123.456.78.47,40404 -> 123.456.78.43,33287 PR tcp len 20 40 -AF IN   29/11/2006 07:55:03.530294 eri0 @0:18 b 123.456.78.47,40404 -> 123.456.78.43,33287 PR tcp len 20 40 -AF IN   29/11/2006 07:55:13.240332 eri0 @0:18 b 123.456.78.47,40404 -> 123.456.78.43,33287 PR tcp len 20 40 -AF IN   29/11/2006 07:55:32.661388 eri0 @0:18 b 123.456.78.47,40404 -> 123.456.78.43,33287 PR tcp len 20 40 -AF IN  
  
... records deleted ...  
  
29/11/2006 08:18:55.785726 eri0 @0:18 b 123.456.78.68,39750 -> 123.456.78.43,33287 PR tcp len 20 40 -AF IN   29/11/2006 08:19:00.637141 eri0 @0:18 b 123.456.78.68,39750 -> 123.456.78.43,33287 PR tcp len 20 40 -AF IN   29/11/2006 08:19:10.367237 eri0 @0:18 b 123.456.78.68,39750 -> 123.456.78.43,33287 PR tcp len 20 40 -AF IN   29/11/2006 08:19:29.827933 eri0 @0:18 b 123.456.78.68,39750 -> 123.456.78.43,33287 PR tcp len 20 40 -AF IN  
  
... records deleted ...  
  
29/11/2006 09:00:15.181563 eri0 @0:18 b 123.456.78.76,38799 -> 123.456.78.43,33287 PR tcp len 20 40 -AF IN   29/11/2006 09:00:20.037385 eri0 @0:18 b 123.456.78.76,38799 -> 123.456.78.43,33287 PR tcp len 20 40 -AF IN   29/11/2006 09:00:29.767323 eri0 @0:18 b 123.456.78.76,38799 -> 123.456.78.43,33287 PR tcp len 20 40 -AF IN   29/11/2006 09:00:49.229308 eri0 @0:18 b 123.456.78.76,38799 -> 123.456.78.43,33287 PR tcp len 20 40 -AF IN  
  
... records deleted ...  
  
________________________________________________________________________ 
 
 
Check Out the new free AIM(R) Mail -- 2 GB of storage and industry-leading spam and email virus protection.  
  
 
________________________________________________________________________ 

Check Out the new free AIM(R) Mail -- 2 GB of storage and industry-leading spam and email virus protection. 
=0 


________________________________________________________________________
Check Out the new free AIM(R) Mail -- 2 GB of storage and industry-leading spam and email virus protection.
=0

Reply via email to