I've used the same pf.conf for years with only minimal changes, but 4.7
 broke it, and I can't seem to fix it.

 The OBSD machine is a firwall between a cable modem and a private IP LAN.
 Previously, I used these rules to allow ssh access from specific Internet
 hosts to a machine in the LAN:

rdr on $ext_if proto tcp from $work_hosts to any port ssh -> $ssh_host
pass in quick on $ext_if proto tcp \
     from $work_hosts to $ssh_host port ssh flags S/SA modulate state

 In 4.7, I changed this to

match in on $ext_if proto tcp from $work_hosts to any port ssh rdr-to $ssh_host
pass in quick on $ext_if proto tcp \
     from $work_hosts to $ssh_host port ssh flags S/SA modulate state

 What happens now when I try to connect to $ssh_host from the Internet is quite
 weird:
 - no blocked packets are logged
 - on the firewall's LAN-side interface, a tcpdump shows the ssh connection
   being forwarded to $ssh_host
 - on $ssh_host, tcpdump shows the incoming ssh connection
 - sshd on $ssh_host does not "pick up"

 I can ssh from the firewall to $ssh_host just fine; I haven't tested ssh
 from Internet to firewall (with suitable pass rule). What am I missing?
 I guess that some packet information isn't being rewritten correctly or
 completely.



---------------------------------------------------------------
This message and any attachments may contain Cypress (or its
subsidiaries) confidential information. If it has been received
in error, please advise the sender and immediately delete this
message.
---------------------------------------------------------------

Reply via email to