Hi Washington,

On Tue, Jan 20, 2026 at 11:48:38AM +0000, Crystal Kolipe wrote:
> On Tue, Jan 20, 2026 at 10:43:34AM +0300, Washington Odhiambo wrote:
> > On Mon, Jan 19, 2026 at 8:08???PM Crystal Kolipe 
> > <[email protected]>
> > wrote:
> > > The problem is probably not with PF, but something else.
> > >
> > 
> > I haven't manipulated anything at all. It's a fresh OpenBSD install.
> 
> Have you checked the configuration on the host?
> 
> >From the information you have supplied so far, the configuration of the
> OpenBSD client seems to be correct.
> 
> > Your suggested commands show that it is running and listening on all
> > interfaces for IPv4 and IPv6.
> 
> OK, so it seems that:
> 
> * PF is currently disabled, so this is not the source of the problem.
> * SSHd is running and listening on all interfaces.
> * Your ifconfig output looks correct.
> * Your routing table looks correct.
> * The OpenBSD vm is using 192.168.69.22
> * The host is using 192.168.69.1
> * You are able to ping the host from within the OpenBSD vm
> * You are able to ping other hosts on the internet from within the OpenBSD vm
> * Therefore ICMP traffic is correctly being routed out of and back to the
>   OpenBSD vm.
> * You are assigning the IP address to the OpenBSD via DHCP, (rather than
>   setting a fixed address.)
> 
> If this is all correct, I would now check:
> 
> * Is TCP traffic being routed out of and back to the OpenBSD vm:
> 
> openbsd# ftp -o -https://www.openbsd.org/
> 
> * Can you connect to an arbitrary high port that is listening on the OpenBSD 
> vm
>   from the host:
> 
> openbsd# nc -l 192.168.69.22 2000
> host$ telnet 192.168.69.22 2000
> 
> As PF is currently disabled, you should be able to connect to port 2000
> without any additional configuration.
 
In addition to the tings Crystal mentions here, I would check for any sshd log 
entries
on the VM, and perhaps try connecting to the VM with ssh -v or ssh -vv (more 
v's give
more detail).

I've seen ssh connections fail when the versions running on the client and 
server are
far enough apart that they fail to negotiate a common set of ciphers. But if I 
remember
correctly, in those situations the failures were not silent. But checking the 
logs
is likely useful anyway.

All the best
Peter

-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
https://nxdomain.no/~peter/blogposts https://nostarch.com/book-of-pf-4th-edition
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.

Reply via email to