Hi,
In a previous message (about a week ago?) I mentioned plans
to replace a current firewall with a pf-based one. I gave
a little outline of things I'd jot down on "paper". Well,
this weekend, I spent some time putting the actual pf.conf
together, and debugging some mistakes (oversights).
Anyway, I got it to a point where I felt confident to do a
test run in production. I swapped out the production firewall
box with the pf-based one.
I've been monitoring the traffic to see any anomalies, or things
that I may have missed. Kinda QA-ing if you will. One thing
I did notice is that my ibook is spewing lots of crap, but this
message isn't about that :)
While monitoring pflog0 I noticed a blocked packet from one of
my web-servers to 68.142.250.133. I didn't understand why that
was. So I ran:
# tcpdump -n -e -ttt -r /var/log/pflog host 68.142.250.133
tcpdump: WARNING: snaplen raised from 96 to 116
Apr 23 19:59:26.010917 rule 2/(match) block out on de2: 68.142.250.133.45648 >
a.b.c.d.80: S 3164412190:3164412190(0) win 5840 <mss 1460,sackOK,timestamp
103193913[|tcp]> (DF)
Apr 23 20:00:59.803910 rule 2/(match) block in on de1: a.b.c.d.80 >
68.142.250.133.45648: S 873225897:873225897(0) ack 3164412191 win 5792 <mss
1460,sackOK,timestamp 431195378[|tcp]> (DF)
Here is my set-up from my earlier post:
# /Internet/
# |
# [DSL Router]
# .1 |
# |
# __WIFI__ (de0) ___DMZ___
# +----+----+ .2 www1
# --X--(b)| PF |(de1)--- .3 www2
# (down) +----+----+ .4 dns1
# (de2) .5 mail1
# |
# |
# __LAN__
# .11 .12 .13 .14
What I'm confused about is why did the original packet
from 68.142.250.133 try to out on de2 interface and not
on de1 as it should have?
pf-based box is running a 'cvs up -rOPENBSD_3_9 -dP'
build.
All my pf filtering are using pass with tag on entry
interface, then using pass tagged on out-going interfaces.
Blocking by default. I'm not using any rdr, no nat, etc.
e.g.,
pass in on de0 from any to $web_server port www \
flags S/SA keep state tag NET2DMZ
pass out quick on de1 all keep state tagged NET2DMZ
Nothing is accepted on de0 destined for anything other
than <dmz_grp>.
Is there more info I can provide? What else should I
look for?
I obviously have ip forwarding enabled. All four
interfaces are bridged together, though currently the
wifi interface is disabled.
Is this something I need to use route-to to "force"
traffic to proper "internal" interface containing
destination host address?
Any thoughts on the matter are appreciated!
--patrick
Tired of spam? Yahoo! Mail has the best spam protection around
http://mail.yahoo.com