On Wed, Jul 05, 2006 at 02:07:42PM +0200, Daniel Rapp wrote:

> pf: BAD state: TCP aaa.aaa.aaa.aaa:25 aaa.aaa.aaa.aaa:25
> bbb.bbb.bbb.bbb:2554 [lo=1937461566 high=1937478751 win=65535 modulator=0]
> [lo=740836633 high=740902095 win=17184 modulator=0] 4:4 R seq=1937461566
> ack=740836633 len=0 ackskew=0 pkts=2:4 dir=in,fwd
> pf: State failure on:         |

Ah, that means the RST didn't actually have a th_seq of 1937461566,
we're logging after adjusting it ("Ease sequencing restrictions on no
data packets"), somewhat confusing seeing that the first time ;)

This message means a TCP RST packet (incoming on the external interface)
was blocked by pf because its sequence number th_seq did not precisely
match. We check for precise match to make guessing (blind reset attacks)
harder.

This is a RST that was sent from the external peer, and we blocked it.
So it can't explain why the server produces a "connection reset by peer"
log message. Maybe subsequent RSTs (also from the external peer) have
exactly matching th_seq and pass. But none of this shows anything except
that the RSTs seem to originate from the external peer...

Daniel

Reply via email to