Maybe we could create a fake blog site stating that MSN.COM is offline until
the M$Soft-Yahoo deal is completed.

Would that help you out.

Jay

> I know, "Who cares?" or  "Great!" is my own response but my users have
> other wishes that include msn.com and this one has me stumped.
>
> I had a more complex pf rule set but now I'm using a simple rule set
> based almost entirely on the one from the PF FAQ:
>
> ext_if="em0"  # External Public Interface
> int_if="bge0" # Internal LAN Interface
> tcp_services = "{ 22, 113 }"
> udp_services = "{ domain, ntp }"
> icmp_types = "{ echoreq, unreach }"
> table <zombies> persist
> set block-policy return
> set loginterface $ext_if
> set skip on { lo, tun }
> scrub in no-df fragment reassemble
> nat on $ext_if from !($ext_if) -> ($ext_if:0)
> nat-anchor "ftp-proxy/*"
> rdr-anchor "ftp-proxy/*"
> rdr on $int_if proto tcp from any to any port ftp -> 127.0.0.1 port 8021
> block in log
> pass out log keep state
> anchor "ftp-proxy/*"
> antispoof log quick for { lo $int_if }
> block in log quick on $ext_if from <zombies> to any
> pass in log quick on $ext_if proto tcp from any to ($ext_if) port ssh \
>
>    keep state (max-src-conn-rate 3/30, overload <zombies> flush global)
>
> pass in log on $ext_if inet proto tcp from any to ($ext_if) port \
>    $tcp_services keep state
> pass in log on $ext_if inet proto udp from any to ($ext_if) port \
>    $udp_services keep state
> pass in log inet proto icmp all icmp-type $icmp_types keep state
> pass in log quick on $int_if
>
>
> I added all of the log lines so I could hopefully see what's going awry.
>
>  From the firewall itself, when I use lynx to try
>
>       http://www.msn.com
>
> I get asked to accept about 5 cookies, which I accept and then a "HTTP
> request sent; waiting for response." and that's it.
>
> Watching pflog0 I see this:
>
> May 20 09:59:58.339833 rule 1/(match) pass out on em0: 192.168.0.2.23294
>  > 205.128.93.51.53:[|domain]
> May 20 09:59:58.548598 rule 1/(match) pass out on em0: 192.168.0.2.4281
>  > 207.68.173.76.80: [|tcp] (DF)
>
> I don't ever see a return packet, and nothing is ever blocked as seen
> from pflog0.
>
> Thinking it is a scrub issue, I've tried scrub in, scrub in no-df, and
> the combination listed above, with no difference.
>
> Hopefully someone can provide me a cluestick before my msn deprived
> users do something ugly--to me!
>
>
> Thanks,
>
> Jeff

Reply via email to