Paul de Weerd wrote:
> Hi Renaud,
> 
> On Mon, Dec 10, 2007 at 04:50:36PM +0100, Paul de Weerd wrote:
> | Have you actually seen these packets live on the wire ?
> 
> I re-read your original mail, and it turns out you have seen these
> packets on the wire. Sorry for the too-quick-answer ;P

No problem. The firewall admin told me he was blocking packets from 127.0.0.1
originating from the antispam servers.

> 
> | I doubt it. In general (the recommended setup), pf redirects incoming
> | requests to 127.0.0.1:8025, the port where spamd is listening *on
> | localhost*. Replies such as ACK's etc. *MUST* originate from
> | 127.0.0.1:8025 in this case. PF will take care of rewriting the packet
> | to the address the client originally used to contact your mailserver
> | (spamdserver).
> 
> For some reason, pf doesn't seem to take care of rewriting the return
> traffic where it should. Can you confirm there is a matching pf-state
> in the state table when you see this sort of traffic ?
> 

It is quite hard to capture as it seems sporadic and servers are heavy loaded:

tcpdump: listening on em0, link-type EN10MB
Dec 10 17:07:18.585359 00:15:17:19:0e:be 00:04:23:09:79:68 0800 113:
127.0.0.1.8025 > 217.132.142.68.2199: FP 959669614:959669673(59) ack 2605929486
win 65535

all tcp 127.0.0.1:8025 <- 157.164.187.68:25 <- 217.132.142.68:4557
FIN_WAIT_2:FIN_WAIT_2
all tcp 127.0.0.1:8025 <- 157.164.187.68:25 <- 217.132.142.68:1052
FIN_WAIT_2:FIN_WAIT_2
all tcp 127.0.0.1:8025 <- 157.164.187.68:25 <- 217.132.142.68:1181
FIN_WAIT_2:FIN_WAIT_2
all tcp 127.0.0.1:8025 -> 217.132.142.68:2199       CLOSING:CLOSED

I guess the last one is the one I see on the firewall.

-- 
010100100110010101101110011000010111010101100100
010000010110110001101100011000010111001001100100

[demime 1.01d removed an attachment of type application/x-pkcs7-signature which 
had a name of smime.p7s]

Reply via email to