Hi,

>      sloppy
>            Uses a sloppy TCP connection tracker that does not check sequence
>            numbers at all, which makes insertion and ICMP teardown attacks way
>            easier.  This is intended to be used in situations where one does
>            not see all packets of a connection, e.g. in asymmetric routing
>            situations.  It cannot be used with modulate state or synproxy
>            state.

The "which makes insertion and ICMP teardown attacks way easier." part
sounds scary!

Just tested... if I replace:
pass quick proto { icmp, icmp6 }
with:
pass quick proto { icmp, icmp6 } no state
.. it also works.

I guess this is a more normal behaviour of allowing any ICMP through,
regardless of sate. As opposed to silently dropping incoming traffic
for which there is no matching state.

Is that preferable over 'sloppy'?


>     I believe claudio@ has advice for you based on some of his real life
>     experience.

So he said he forwards traffic with a no state rule...

So I guess I need to allow outgoing with `no state`, but then
explicitly allow incoming with established,related (some how?) like
you would with iptables on Linux?

Thanks,

Ian

Reply via email to