* Bryan S. Leaman <[email protected]> [2009-11-13 01:12]:
> I'm converting a pf ruleset to work with the new nat/rdr changes in 4.6
> -current and I came across an issue that seems like a problem in the way
> "tagged" rules are handled.  It's breaking ftp-proxy with tagging when I
> try to apply additional rules to the tagged packets.  The result is that I
> can login to an FTP server but the inbound data connection seems to get
> lost--I don't get a passed or blocked packet in the pf log and the data
> connection fails to establish.
> 
> If I remove my "tagged <TAGNAME>" rules, then everything works fine but
> then I can't use the tags to do further processing of these packets.
> Here are the anchor rules generated by ftp-proxy:
> 
> # pfctl -sA -v
>   ftp-proxy
>   ftp-proxy/16553.9
> # pfctl -v -a ftp-proxy/16553.9 -sr
> pass in log inet proto tcp from 192.168.99.237 to 192.168.99.234 port =
> 54237 flags S/SA keep state (max 1) tag FTPPROXY rtable 0 rdr-to 10.0.1.21
> port 47008
>   [ Evaluations: 1         Packets: 0         Bytes: 0           States: 0
>     ]
>   [ Inserted: uid 71 pid 16553 State Creations: 0     ]
> pass out log inet proto tcp from 192.168.99.237 to 10.0.1.21 port = 47008
> flags S/SA keep state (max 1) tag FTPPROXY rtable 0 nat-to 192.168.99.237
>   [ Evaluations: 1         Packets: 0         Bytes: 0           States: 0
>     ]
>   [ Inserted: uid 71 pid 16553 State Creations: 0     ]

hrm. ftp-proxy would need to use match instead of pass in that case.

-- 
Henning Brauer, [email protected], [email protected]
BS Web Services, http://bsws.de
Full-Service ISP - Secure Hosting, Mail and DNS Services
Dedicated Servers, Rootservers, Application Hosting

Reply via email to