Hi, 

As far as I undrestand you are trying to limit the amount of firewall rules,
that means you won't have to write a specific outbound rule. 

As far as I undrestood from the kernel source glimpse the  <- and -> in
pfctl -ss mean PF_IN and PF_OUT. So although you have not limited the rules
to a specific interface there happens something similar to tcp "src" and
"dst" ports get turned the wrong way. Perhaps there are other reasons why
only one rule won't work. I saw no mention in state table lookups to policy
if-bound, only one standard check. My undrestanding is that you must have
two entries in state table for the packet to pass through the router/fw, but
I am unable to tell, if the second entry can be autogenerated. This is as
much as I undrestood from the glimpse to the kernel source. 

Other and perhaps more simple solution would be pass out all and filter only
on pass in (that means you trust what is already inside). At the present
moment I am unable to check that idea for flaws, I would go that way.

Juhani


-- 
View this message in context: 
http://www.nabble.com/how-to-confirm-i-am-gaining-advantage-from-floating-state-policy-tf4163808.html#a11863013
Sent from the openbsd user - misc mailing list archive at Nabble.com.

Reply via email to