-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi all,

having a policy filtering setup (chaper about tagging in FAQ) like
- -------------------------------------------------------------------
block log all
..
pass in on $ext_if inet proto tcp from any to <bastion_mail_hosts> \
                        port { smtp } tag RED_DMZ synproxy state
..
pass out quick on $dmz_if tagged RED_DMZ keep state
- -------------------------------------------------------------------
or
- -------------------------------------------------------------------
block log all
..
pass in on $ext_if inet proto tcp from any to <bastion_mail_hosts> \
                        port { smtp } tag RED_DMZ keep state
..
pass out quick on $dmz_if tagged RED_DMZ synproxy state
- -------------------------------------------------------------------
does not work either. In both cases no state is created for the running
connection going out on $dmz_if and the return packets coming in there
are dropped.
This is
- - 3.5_stable
- - no NAT involved
- - state-policy if-bound
Here
        http://archives.neohapsis.com/archives/openbsd/2004-07/0321.html
 Daniel wrote
 Up until a couple of weeks ago, synproxy would use the PF_GENERATED tag
 to make packets generated for the server handshake bypass further
 filtering. That was changed for the scenario where the destination
 isn't local, so these packets can create state on a second real
 interface (otherwise the server's SYN+ACK is dropped, unless no
 filtering is done on the second interface at all).

From that text I would have expected my setup to work with synproxy.

What am I doing wrong?
Or is this a permanent/temporary restriction of synroxy?

Axel

Axel Rau, Frankfurt, Germany    Phone:49-69-951418-0,  Fax: -55
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (Darwin)

iD8DBQFA/6R8bMW2mynpndYRAnXyAKCbJJJe7VqpvF0bJNIM6kuNRKkCtACfVc9P
CBn8FdZlEgAD3EW0sBnACpI=
=Cg9p
-----END PGP SIGNATURE-----

Reply via email to