Re: PF rate limiting options valid for UDP?

2023-07-19 Thread Stuart Henderson
to do per IP rate limiting alongside load-balancing you might want "mode source-hash" rather than the default round-robin or one of the random options. (I wouldn't recommend sticky-address, because then you get into more complex paths inside PF because it has to maintain source-tracking information).

Re: PF rate limiting options valid for UDP?

2023-07-19 Thread mabi
--- Original Message --- On Tuesday, July 18th, 2023 at 10:59 PM, Stuart Henderson wrote: > PF's state-tracking options are only for TCP. (Blocking an IP > based on number of connections from easily spoofed UDP is a good > way to let third parties prevent your machine from

Re: PF rate limiting options valid for UDP?

2023-07-19 Thread Kapetanakis Giannis
On 18/07/2023 23:59, Stuart Henderson wrote: > PF's state-tracking options are only for TCP. (Blocking an IP > based on number of connections from easily spoofed UDP is a good > way to let third parties prevent your machine from communicating > with IPs that may well get in the way i.e. trigger a

Re: PF rate limiting options valid for UDP?

2023-07-18 Thread Stuart Henderson
On 2023-07-18, mabi wrote: > Hello, > > From the following documentation, I am trying to figure out which PF tracking > options are also valid for UDP but unfortunately it is not quite clear to me: > > https://man.openbsd.org/pf.conf.5#Stateful_Tracking_Options > > My

PF rate limiting options valid for UDP?

2023-07-18 Thread mabi
Hello, >From the following documentation, I am trying to figure out which PF tracking >options are also valid for UDP but unfortunately it is not quite clear to me: https://man.openbsd.org/pf.conf.5#Stateful_Tracking_Options My goal would be to do add rate limiting options to a PF UD

Re: Question regarding pf rules: block in on em0: ...

2023-07-07 Thread Why 42? The lists account.
I have no idea how I could make my question any clearer: > My question is not about how to disable pf, but rather why the packets > are see as "in" when coming from my own address, and, why they are > blocked i.e. ... On Thu, Jul 06, 2023 at 11:09:27AM -0600, Zack Newman

Re: Question regarding pf rules: block in on em0: ...

2023-07-06 Thread Zack Newman
On 7/6/23 06:14, Why 42? The lists account. wrote: Hi, I see that I was not clear enough. You were not. One of the first things in your initial e-mail was the following: "While trying to debug the issue, it occurred to me that it could be a network / pf problem. This doesn't

Re: Question regarding pf rules: block in on em0: ...

2023-07-06 Thread Why 42? The lists account.
On Tue, Jul 04, 2023 at 10:42:39AM -0600, Zack Newman wrote: > ... > I am guessing you didn't flush the rules after disabling pf since > clearly pf rules are still being used. Run pfctl -F all after disabling > pf. Run pfctl -s all to verify there are no active rules. Hi,

Re: Question regarding pf rules: block in on em0: ...

2023-07-04 Thread Zack Newman
On 7/4/23 10:36, "Why 42? The lists account.": While trying to debug the issue, it occurred to me that it could be a network / pf problem. This doesn't seem to be the issue though, even after I disable pf (pfctl -d), the scanner is still not seen. However, running "tcpdump -n -e

Question regarding pf rules: block in on em0: ...

2023-07-04 Thread Why 42? The lists account.
Hi All, I just noticed that "simple-scan" no longer discovers my scanner. While trying to debug the issue, it occurred to me that it could be a network / pf problem. This doesn't seem to be the issue though, even after I disable pf (pfctl -d), the scanner is still not seen. Howeve

Re: Weird pf NAT failure on apu2

2023-06-26 Thread Ashlen
On Sat, 24 Jun 2023 07:33 -0600, Zack Newman wrote: > On 6/2l/23 9:01, Stephan Neuhaus wrote: > > I'm not sure about the Configuring NAT section being > > correct. I still maintain that the documentation and > > observed behaviour are different. > > I was lazy when I said that. I meant the

Re: Weird pf NAT failure on apu2

2023-06-25 Thread Stephan Neuhaus
On 6/24/23 13:14, Stuart Henderson wrote: On 2023-06-24, Stephan Neuhaus wrote: I now think that either the documentation is wrong, or pf is wrong. At any rate, there seems to be a rather serious disconnect between the two. The FAQ clearly says: When a packet is selected by a match rule

PF: (max-src-conn 1, max-src-conn-rate 1/1, overload )

2023-06-25 Thread Maxim Bourmistrov
Hello,  I’m not part of this maillist, so rply me directly if necessery. (Sent this pf@ which seems do not exists any more)   Following is given in pf.conf:   ### int pass in on int from any to any keep state \         (max-src-conn 1, max-src-conn-rate 1/1, overload ) pass out on int from any

Re: Weird pf NAT failure on apu2

2023-06-24 Thread Zack Newman
On 6/2l/23 9:01, Stephan Neuhaus wrote: I'm not sure about the Configuring NAT section being correct. I still maintain that the documentation and observed behaviour are different. I was lazy when I said that. I meant the example I quoted from that section in the original reply is correct.

Re: Weird pf NAT failure on apu2

2023-06-24 Thread Stuart Henderson
On 2023-06-24, Stephan Neuhaus wrote: > Hi Zack > > On 6/24/23 03:39, Zack Newman wrote: >> There do appear to be contradictions in documentation as well as the pf >> book. The Configuring NAT section is correct as you have seen with your >> own rules. > > I'm n

Re: Weird pf NAT failure on apu2

2023-06-24 Thread Stephan Neuhaus
Hi Zack On 6/24/23 03:39, Zack Newman wrote: There do appear to be contradictions in documentation as well as the pf book. The Configuring NAT section is correct as you have seen with your own rules. I'm not sure about the Configuring NAT section being correct. I still maintain

Re: Weird pf NAT failure on apu2

2023-06-23 Thread Zack Newman
There do appear to be contradictions in documentation as well as the pf book. The Configuring NAT section is correct as you have seen with your own rules. Here is the minimum set of stateless rules that allows ICMP traffic between my laptop and Cloudflare. # Options. set block-policy drop

Re: Weird pf NAT failure on apu2

2023-06-23 Thread Zack Newman
Just wanted to reply that that was an excellent rebuttal. Looks like I should have put my foot in my mouth. I am now keenly interested-and disappointed in my (lack) of knowledge. I will practice with pf on my machine to better understand what is happening. If/when I have something meaningful

Re: Weird pf NAT failure on apu2

2023-06-23 Thread Stephan Neuhaus
, but if it is, it is in conflict with the documentation and IMO the match/pass combo is much less useful. To make my first point, the pf FAQ says the following about match/pass: match When a packet traverses the ruleset and matches a match rule, any optional parameters specified in that rule

Re: Weird pf NAT failure on apu2

2023-06-23 Thread Zack Newman
. Is there anything you see in these rules, especially in rules 5 and 6, that is not correct? I don't think so, I've taken this almost verbatim from the pf FAQ https://www.openbsd.org/faq/pf/nat.html. You did not read that FAQ carefully enough, so I wouldn't say you have followed it "almost verbatim&qu

Re: Weird pf NAT failure on apu2

2023-06-23 Thread Stephan Neuhaus
matches. That is entirely possible and agrees with all the experimental evidence I have. Still, I don't think that this is what's going on, for the following reasons. 1. It is in conflict with the documentation. The FAQ http://www.openbsd.org/faq/pf/nat.html says match When a packet traverses

Re: Weird pf NAT failure on apu2

2023-06-23 Thread Stephan Neuhaus
On 6/23/23 13:19, Stephan Neuhaus wrote: Hi list [...] In other words, now the same packets that weren't passed using the match/pass combo are not passed when the nat-to is part of the pass rule. That should have been "...combo are NOW passed...". Sorry. Cheers Stephan

Weird pf NAT failure on apu2

2023-06-23 Thread Stephan Neuhaus
ccmp wpagroupcipher ccmp inet 192.168.3.2 netmask 0xff00 broadcast 192.168.3.255 What I want to do is NAT the wireless interface to the egress interface. I have this experimental pf setup, which has many problems, and which therefore has a big comment at the top: # PF configuration

Re: Possible typo in pf NAT FAQ

2023-06-19 Thread Philipp Buehler
Am 18.06.2023 20:35 schrieb Stephan Neuhaus: Here you can see that the "from" part is what the above description calls the src_addr, not the ext_addr, as it claims. This makes much more sense and is consistent with all the other documentation that I've seen. The "match" is rewriting to

Possible typo in pf NAT FAQ

2023-06-18 Thread Stephan Neuhaus
Hi list I think I have found a typo in the pf NAT FAQ here: https://www.openbsd.org/faq/pf/nat.html. In the "Configuring NAT" section it says: The general format in pf.conf looks something like this: match out on interface [af] \ from src_addr to dst_addr \ nat-t

Re: pf state-policy floating to if-bound

2023-06-15 Thread Kapetanakis Giannis
On 15/06/2023 19:07, Peter Nicolai Mathias Hansteen wrote: >> On 15 Jun 2023, at 16:26, Kapetanakis Giannis >> wrote: >> After applying some keep state (if-bound) on major rules, I 've already >> found a problem. >> >> pfsync. >> >> It copies the interface. The interfaces are different on the

Re: pf state-policy floating to if-bound

2023-06-15 Thread Peter Nicolai Mathias Hansteen
> On 15 Jun 2023, at 16:26, Kapetanakis Giannis > wrote: > After applying some keep state (if-bound) on major rules, I 've already found > a problem. > > pfsync. > > It copies the interface. The interfaces are different on the backup firewall > so the states will not match if I demote

Re: pf state-policy floating to if-bound

2023-06-15 Thread Kapetanakis Giannis
On 15/06/2023 17:17, Kapetanakis Giannis wrote: > Hello, > > I'd like to make a change to my firewall/router from the default state-policy > floating to if-bound > > I believe the way my pf.conf is configured it will not do any harm but I'm > being cautious here and I'd like some info. > > The

pf state-policy floating to if-bound

2023-06-15 Thread Kapetanakis Giannis
Hello, I'd like to make a change to my firewall/router from the default state-policy floating to if-bound I believe the way my pf.conf is configured it will not do any harm but I'm being cautious here and I'd like some info. The way I see it, I have two states for each packet traveling either

Re: Setting up a Transparent Tor Proxy on OpenBSD 7.3 with pf(4)

2023-06-15 Thread Peter N. M. Hansteen
ic is needed for name resolution to work in your environment, but your ruleset has no mention of icmp, which is likely why ping does not work. But then as JJ said already, instrument your rules with log or log(all) and spend some time getting to know our friend tcpdump(8) as applied to PF logging. Fo

Re: Setting up a Transparent Tor Proxy on OpenBSD 7.3 with pf(4)

2023-06-15 Thread Janne Johansson
> > > "pfctl -f /etc/pf.conf" does not spit out any warnings or errors either, > so I first assumed it would work just as flawlessly then, but apparently > it doesnt, because I cant ping any domain or wget any webpage, when I > If you add "log" rules to your pf.conf and the watch the pflog device

Setting up a Transparent Tor Proxy on OpenBSD 7.3 with pf(4)

2023-06-15 Thread distantpath
Hey there, as I am completely new here, I might do something against the netiquette here in the mailing lists, so correct me if I am wrong and I will try to adjust. I am trying to set up a transparent Tor proxy on OpenBSD with pf(4), but I couldnt find any helpful resources in the FAQ

Re: SOLVED [7.3/i386] pf-badhost - Illegal instruction (core dumped)

2023-06-12 Thread Radek
Hello, > Either build from ports with the MODCARGO_RUSTFLAGS line changed to this: > > MODCARGO_RUSTFLAGS = -C debuginfo=0 -C target-cpu=i586 I get some errors trying to build it from port: ===> Configuring for ripgrep-13.0.0p3 Illegal instruction (core dumped) *** Error 132 in .

Re: SOLVED [7.3/i386] pf-badhost - Illegal instruction (core dumped)

2023-06-05 Thread Stuart Henderson
On 2023-06-05, Radek wrote: > RipGrep caused my issue. When I replaced ripgrep with ggrep the script > started to work fine. Can you try a new ripgrep binary built with a different target-cpu type for me please? The default for the rust compiler is to use SSE instructions which aren't present

Re: Using pf route-to to Route Network Traffic a tun interface and Replying from it

2023-06-05 Thread David Gwynne
what you're doing. if you're just monitoring packets then there's also dup-to and bpf/tcpdump. > -- > > I implemented a small C program that reads packets from /dev/tun8 and > writes them back to the same device. During the writing phase, I have > attempted to add a 4-byte TUN header (

Re: [7.3/i386] pf-badhost - Illegal instruction (core dumped)

2023-06-05 Thread Radek
sh -x does not trace into functions, and > it is something inside "main" which is crashing: > > > > set -x or something. > > Sorry, I should have started with that. > > > > test73# doas -u _pfbadhost pf-badhost -O openbsd > > [ ... ] > > + com

Re: [7.3/i386] pf-badhost - Illegal instruction (core dumped)

2023-06-03 Thread Andrew Daugherity
Unfortunately it looks like sh -x does not trace into functions, and it is something inside "main" which is crashing: > > set -x or something. > Sorry, I should have started with that. > > test73# doas -u _pfbadhost pf-badhost -O openbsd > [ ... ] > + command -v t

Re: [7.3/i386] pf-badhost - Illegal instruction (core dumped)

2023-06-01 Thread Stuart Henderson
On 2023-06-01, Radek wrote: > Hello Stuart, > >> What is the name of the core dump file? > Actually there isn't any .core file. > test73# find / -name '*.core' > test73# >From your earlier mail: test73# doas -u _pfbadho

Re: [7.3/i386] pf-badhost - Illegal instruction (core dumped)

2023-06-01 Thread Radek
gularly monitors this > list. > > I've contacted him before at his email address and he was very prompt in > reply. > > 73 > diana > KI5PGJ > > On May 30, 2023 8:05:04 AM MDT, Radek wrote: > >Hello and sorry for the late reply, > > > >> D

Re: [7.3/i386] pf-badhost - Illegal instruction (core dumped)

2023-06-01 Thread Radek
t; >> Did you contact the individual who provides pf-bafhost script? He has > >> always responded to me when I contacted him. > > No, I didn't. Jordan shared his scripts here, I hope he reads misc@. > > > >> what program dumped core? > > Some parts

Re: [7.3/i386] pf-badhost - Illegal instruction (core dumped)

2023-05-30 Thread deich...@placebonol.com
MDT, Radek wrote: >Hello and sorry for the late reply, > >> Did you contact the individual who provides pf-bafhost script? He has >> always responded to me when I contacted him. >No, I didn't. Jordan shared his scripts here, I hope he reads misc@. >

Using pf route-to to Route Network Traffic a tun interface and Replying from it

2023-05-30 Thread Nick Andersen
ly-to (em0 (em0)) -- I implemented a small C program that reads packets from /dev/tun8 and writes them back to the same device. During the writing phase, I have attempted to add a 4-byte TUN header (with AF_INET byte). The issue arises when I enable pf, as my connectivity ceases to function. I suspe

Re: [7.3/i386] pf-badhost - Illegal instruction (core dumped)

2023-05-30 Thread Stuart Henderson
On 2023-05-30, Radek wrote: > Hello and sorry for the late reply, > >> Did you contact the individual who provides pf-bafhost script? He has >> always responded to me when I contacted him. > No, I didn't. Jordan shared his scripts here, I hope he reads misc@. > >

Re: [7.3/i386] pf-badhost - Illegal instruction (core dumped)

2023-05-30 Thread Radek
Hello and sorry for the late reply, > Did you contact the individual who provides pf-bafhost script? He has always > responded to me when I contacted him. No, I didn't. Jordan shared his scripts here, I hope he reads misc@. > what program dumped core? Some parts of [1]. How can I

Re: Usage of pf(4) with tap(4) and veb(4)

2023-05-26 Thread David Gwynne
On Thu, May 25, 2023 at 02:11:29AM +0200, Joel Carnat wrote: > Hi, > > I'd like confirm I understood how pf works in a mixed veb/vport/tap > environment. I'm using OpenBSD 7.3/amd64 (if that matters). > > I have a physical host that runs services (relayd, httpd...) the "cl

Re: [7.3/i386] pf-badhost - Illegal instruction (core dumped)

2023-05-25 Thread Stuart Henderson
On 2023-05-25, Radek wrote: > Hello, > I am getting the following error message when I try to run pf-badhost script > [1] at fresh install 7.3/i386. Have I missed something? > > 1. https://www.geoghegan.ca/pub/pf-badhost/latest/install/openbsd.txt > > test73# doas -u _pf

Re: [7.3/i386] pf-badhost - Illegal instruction (core dumped)

2023-05-25 Thread deich...@placebonol.com
Did you contact the individual who provides pf-bafhost script? He has always responded to me when I contacted him. diana On May 25, 2023 8:26:31 AM MDT, Radek wrote: >Hello, >I am getting the following error message when I try to run pf-badhost script >[1] at fresh install 7.3/i38

[7.3/i386] pf-badhost - Illegal instruction (core dumped)

2023-05-25 Thread Radek
Hello, I am getting the following error message when I try to run pf-badhost script [1] at fresh install 7.3/i386. Have I missed something? 1. https://www.geoghegan.ca/pub/pf-badhost/latest/install/openbsd.txt test73# doas -u _pfbadhost pf-badhost -O openbsd doas (r...@test73.my.domain

Usage of pf(4) with tap(4) and veb(4)

2023-05-24 Thread Joel Carnat
Hi, I'd like confirm I understood how pf works in a mixed veb/vport/tap environment. I'm using OpenBSD 7.3/amd64 (if that matters). I have a physical host that runs services (relayd, httpd...) the "classical" way and also provides VM using vmd. I have a couple of public IPs that

Re: pf - traffic flow through 2 routers

2023-04-30 Thread Roman Samoilenko
Hi. Check your PF rules and also confirm you have set net.inet.ip.forwarding=1 via sysctl. Regards, Roman On 30.04.23 11:23, Gurra wrote: Hi list, I’m stuck setting up this configuration - 2 OpenBSD 7.3 boxes connected via a private network 192.168.2.0/24. The clients connected to box 1

Re: pf - traffic flow through 2 routers

2023-04-30 Thread Janne Johansson
look for the issue. If you use PF, enable logging on rules (man pflog) and see which rule those packets hit. -- May the most significant bit of your life be positive.

pf - traffic flow through 2 routers

2023-04-30 Thread Gurra
Hi list, I’m stuck setting up this configuration - 2 OpenBSD 7.3 boxes connected via a private network 192.168.2.0/24. The clients connected to box 1 on 192.168.1.0/24 should be able to reach the server on 192.168.2.0/24 with ip 192.168.2.2 on port 1234 tcp The communication between clients

Re: PF: Redirect SOCKS connections to another server on a different net

2023-04-24 Thread Charlie
-to (wg0) tagged nat ... [1] https://marc.info/?l=openbsd-pf=168215778109013=2 Cheers, Charlie

Re: Will tags length influence the performance in PF?

2023-04-21 Thread Cristian Danila
tian Danila wrote: > > > > Hello Misc, > > > > I have a technical question in regards to PF tags. > > I was always wondering if the length of tags matters > > or not in terms of performance. > > For example will PF use the same effort to match a tag >

Re: Will tags length influence the performance in PF?

2023-04-21 Thread David Gwynne
inside the kernel tags are given numeric identifiers, and these numbers are used everywhere. the length of the tag name doesnt affect performance. > On 21 Apr 2023, at 04:10, Cristian Danila wrote: > > Hello Misc, > > I have a technical question in regards to PF tags. > I wa

Will tags length influence the performance in PF?

2023-04-20 Thread Cristian Danila
Hello Misc, I have a technical question in regards to PF tags. I was always wondering if the length of tags matters or not in terms of performance. For example will PF use the same effort to match a tag TEST_TEST_TEST_TEST_TEST as it would do for a tag A? I am wondering if PF internally would

PF: Redirect SOCKS connections to another server on a different net

2023-04-10 Thread Charlie
:1080,bind=192.168.1.10,reuseaddr,fork \ tcp:10.64.0.1:1080 I would very much like to replace the above command with pf rule(s). All the combinations I tried with "rdr-to", "nat-to", "divert-to", "synproxy state", etc. did not work. Could someone kindly poin

Fwd: Understanding PF behavior

2023-04-01 Thread Kaya Saman
Well... somehow I managed to get inter rdomain forwarding. I have no idea how...? I think things started to work when I changed this statement in PF: block log on rdomain 0 from "block log" Right now I can only communicate between rdomain 2 and rdomain 0. I moved my ISP-B

Understanding PF behavior

2023-03-31 Thread Kaya Saman
Hi guys, So far I have spent a week on this and I feel like I'm not progressing, now I just feel like I'm banging against a brick wall. To start with, I managed to send icmp echos over my WAN link through ISP-B within the same routing domain rdomain 2. I then started looking at

Re: fragmented ipv4[udp] ignored by server. OT: pf optimization setup

2023-03-06 Thread Daniele B.
this > https://blog.cloudflare.com/ip-fragmentation-is-broken/ Thank you for this one, Tom I'd like to ask if it could be possible to have a new option between aggressive and normal for 'set optimization' in pf? Or if you consider the aggressive setting enough good for little desktops with security in mi

Re: Does OpenBSD 7.2 PF support SITT (stateless NAT64)?

2023-03-05 Thread Gabor LENCSE
Does OpenBSD 7.2 PF support *SIIT* (RFC 7915, also called stateless NAT64)? No, PF's address translation is tied to firewall states. Thank you very much for the information! Gábor

Re: Does OpenBSD 7.2 PF support SITT (stateless NAT64)?

2023-03-05 Thread Stuart Henderson
On 2023-03-03, Gabor LENCSE wrote: > Does OpenBSD 7.2 PF support *SIIT* (RFC 7915, also called stateless NAT64)? No, PF's address translation is tied to firewall states.

Does OpenBSD 7.2 PF support SITT (stateless NAT64)?

2023-03-03 Thread Gabor LENCSE
Dear All, Does OpenBSD 7.2 PF support *SIIT* (RFC 7915, also called stateless NAT64)? If yes, how can I set it? I tried to set it similarly to stateful NAT64, but specifying "no state". However, it resulted in error messages: p095# pfctl -f /etc/pf-set-siit /etc/pf-set-si

Re: Simple PF Router/Firewall/NAT requirements: was Performance optimizing OpenBSD 7.2

2023-02-15 Thread patric conant
are reduced by more than 50% and so states are removed too soon > >resulting in a state-mismatch. > > > >So first bump the limit up and then look at the counters again. > > Within the next three months I'll be building a hardware (not VM) > OpenBSD machine with pf filterin

Simple PF Router/Firewall/NAT requirements: was Performance optimizing OpenBSD 7.2

2023-02-15 Thread Steve Litt
ate-mismatch. > >So first bump the limit up and then look at the counters again. Within the next three months I'll be building a hardware (not VM) OpenBSD machine with pf filtering to Route, firewall and NAT between my house's IPV4 192.168.0.0/24 network and the Internet. My Internet is

Re: Question about temporary pf(4) ruleset in: /etc/rc

2023-01-04 Thread Theo de Raadt
J Doe wrote: > Hi, > > I have a question regarding the temporary pf(4) ruleset that is found > in: /etc/rc. > > A couple of lines below: "# Set initial temporary pf rule set." there > appears to be two lines for DHCPv4 traffic: > > pass out inet proto

Question about temporary pf(4) ruleset in: /etc/rc

2023-01-03 Thread J Doe
Hi, I have a question regarding the temporary pf(4) ruleset that is found in: /etc/rc. A couple of lines below: "# Set initial temporary pf rule set." there appears to be two lines for DHCPv4 traffic: pass out inet proto udp from any port bootpc to any port bootps pas

Re: pf tcpdump rule def ?

2022-12-28 Thread Shadrock Uhuru
Hi many thanks Otto and Stuart forgot to move my default block rule back to the top after adding some ipv6 stuff at the beginning. have a happy and successful new year. shadrock

Re: pf tcpdump rule def ?

2022-12-27 Thread Stuart Henderson
On 2022-12-27, Otto Moerbeek wrote: > On Tue, Dec 27, 2022 at 04:23:13AM +, Shadrock Uhuru wrote: > >> hi everyone >> viewing my pf logs with >> tcpdump -nettt -i pflog0 there are lines with no rule numbers >> just rule def on the line instead, >> i've tri

Re: pf tcpdump rule def ?

2022-12-26 Thread Otto Moerbeek
On Tue, Dec 27, 2022 at 04:23:13AM +, Shadrock Uhuru wrote: > hi everyone > viewing my pf logs with > tcpdump -nettt -i pflog0 there are lines with no rule numbers > just rule def on the line instead, > i've tried googling without success, > need to know if t

pf tcpdump rule def ?

2022-12-26 Thread Shadrock Uhuru
hi everyone viewing my pf logs with tcpdump -nettt -i pflog0 there are lines with no rule numbers just rule def on the line instead, i've tried googling without success, need to know if they are wolf,sheep or misconfigurations causing them, and against which rule do i match them up

Re: pf question - antispoof and loopback

2022-12-24 Thread J Doe
On 2022-12-24 02:32, Philipp Buehler wrote: Am 22.12.2022 21:37 schrieb J Doe:     set skip on lo0 . . .     antispoof quick for $ext_if This one will be faster (a tad) if you do not plan for more detailled filtering (and who does so on lo0 besides the esoteric ones). ciao Hi Philipp,

Re: pf question - antispoof and loopback

2022-12-23 Thread Philipp Buehler
Am 22.12.2022 21:37 schrieb J Doe: set skip on lo0 . . . antispoof quick for $ext_if This one will be faster (a tad) if you do not plan for more detailled filtering (and who does so on lo0 besides the esoteric ones). ciao -- pb

pf question - antispoof and loopback

2022-12-22 Thread J Doe
Hi, I have a question regarding pf. In man pf.conf[1], the following note is made in the section on: antispoof "Caveat: Rules created by the antispoof directive interfere with packets sent over loopback interfaces to local addresses. One should pass these explicitly."

WAB veb vs PF NAT

2022-12-21 Thread Szél Gábor
on't want to routing for this VLAN! We want to filter the traffic to the VLAN - (with PF) _We came up with the following solution for this:__ _ * em0 - public WAN interface * em1 - filtered "WAN" interface internal VLAN is connected here - switch port, native VLAN * veb0 - we m

Re: DHCP server ignoring PF rules?

2022-12-17 Thread Marcus MERIGHI
x-cvsweb-markup I've not used this option, just saying... Marcus > > On Sat, Dec 17, 2022 at 3:11 PM David Gwynne wrote: > > > > > > dhcpd reads packets off the wire using BPF, which happens as packets > > come off the network interface, but before the IP stack

Re: DHCP server ignoring PF rules?

2022-12-17 Thread Cristian Danila
o control these packets? >> Still investigating but I had still not found yet a way to do it. >> >> Thank you. >> >> On Sat, Dec 17, 2022 at 3:11 PM David Gwynne wrote: >> > >> > dhcpd reads packets off the wire using BPF, which happens as packets co

Re: DHCP server ignoring PF rules?

2022-12-17 Thread Barbaros Bilek
ing BPF, which happens as packets > come off the network interface, but before the IP stack where pf runs. > > > > > On 17 Dec 2022, at 22:40, Cristian Danila wrote: > > > > > > Good day! > > > I finished setup an DHCP server and for some reason it seem

Re: DHCP server ignoring PF rules?

2022-12-17 Thread Cristian Danila
e wire using BPF, which happens as packets come off > the network interface, but before the IP stack where pf runs. > > > On 17 Dec 2022, at 22:40, Cristian Danila wrote: > > > > Good day! > > I finished setup an DHCP server and for some reason it seems D

Re: DHCP server ignoring PF rules?

2022-12-17 Thread David Gwynne
dhcpd reads packets off the wire using BPF, which happens as packets come off the network interface, but before the IP stack where pf runs. > On 17 Dec 2022, at 22:40, Cristian Danila wrote: > > Good day! > I finished setup an DHCP server and for some reason it seems DHCP > ser

DHCP server ignoring PF rules?

2022-12-17 Thread Cristian Danila
Good day! I finished setup an DHCP server and for some reason it seems DHCP server is ignoring PF filter. In short, in PF I have active only one rule: block drop quick all Double checked PF and it is enabled So using a windows machine to test DHCP server: 1) ifconfig /release 2) ifconfig /renew

Re: pf question - set skip on wildcards ?

2022-12-13 Thread Philipp Buehler
Am 13.12.2022 22:11 schrieb J Doe: set skip on !$ext_if ... with the idea that this skips all interfaces (virtual or otherwise) _EXCEPT_ em0, which is the real Ethernet NIC that I want to perform filtering on ? Yes, but likely to need a space between ! and $. ciao -- pb

Re: pf question - set skip on wildcards ?

2022-12-13 Thread J Doe
On 2022-12-13 01:23, Philipp Buehler wrote: Am 13.12.2022 06:02 schrieb J Doe:     set skip on { lo0, vif* } in pf.conf(5) the GRAMMAR shows: ifspec = ( [ "!" ] ( interface-name | interface-group ) ) |   "{" interface-list "}" So you could do "set skip on

Re: pf question - set skip on wildcards ?

2022-12-12 Thread Philipp Buehler
Am 13.12.2022 06:02 schrieb J Doe: set skip on { lo0, vif* } in pf.conf(5) the GRAMMAR shows: ifspec = ( [ "!" ] ( interface-name | interface-group ) ) | "{" interface-list "}" So you could do "set skip on { lo0 vif0 vif1 }" for explicit, or you use

pf question - set skip on wildcards ?

2022-12-12 Thread J Doe
Hello, I have a question regarding: set skip on in pf.conf(5). I have a host that has a number of dynamic virtual interfaces. I don't want my ruleset to apply to those interfaces, however, as they are created and removed dynamically, I don't know what the numbers will be assigned to those

Re: PF rules to block out every IP from a given country

2022-12-07 Thread Frank Habicht
Hi, On 07/12/2022 18:36, Peter N. M. Hansteen wrote: ...> and can now be found at https://nxdomain.no/~peter/ripe2cidr_country.sh.txt -- as it says in the script itself, a trivial hack. And I might add, it comes with *NO* warranties of any kind. I think instead of : grep allocated in the

Re: PF rules to block out every IP from a given country

2022-12-07 Thread Stuart Henderson
On 2022-12-07, Peter N. M. Hansteen wrote: > On Wed, Dec 07, 2022 at 10:28:27AM +1100, Damian McGuckin wrote: >> >> Has anybody created rules such as this and if so, do you have an example? > > As others have already indicated, the PF way to do anything like this would be

Re: PF rules to block out every IP from a given country

2022-12-07 Thread Peter N. M. Hansteen
On Wed, Dec 07, 2022 at 10:28:27AM +1100, Damian McGuckin wrote: > > Has anybody created rules such as this and if so, do you have an example? As others have already indicated, the PF way to do anything like this would be to generate a list of addresses and networks you want to address

Re: PF rules to block out every IP from a given country

2022-12-07 Thread Muhammad Muntaza
On Wed, 7 Dec 2022 at 08.55 Damian McGuckin wrote: > > Has anybody created rules such as this and if so, do you have an example? > > Stay safe - Damian > Check this Example: https://www.muntaza.id/pf/2020/02/03/pf-firewall-bagian-kedua.html I write in Indonesia, you can use G

Re: PF rules to block out every IP from a given country

2022-12-06 Thread Craig Schulz
Take a look at PF-Badhost. Here is a decent write-up: https://undeadly.org/cgi?action=article;sid=20210119113425 Craig > On Dec 6, 2022, at 18:28, Damian McGuckin wrote: > > > Has anybody created rules such as this and if so, do you have an example? > > Stay safe - D

Re: PF rules to block out every IP from a given country

2022-12-06 Thread All
Considering you solved the issue with getting all IPs for a given country correctly (and perhaps updating it sometimes): 1. Dump all IP addresses/ranges into a file (eg. blocked.ips) 2. add table file  /path/to/blocked.ips add "persist" if you want. 3. create rule to block all incoming

PF rules to block out every IP from a given country

2022-12-06 Thread Damian McGuckin
Has anybody created rules such as this and if so, do you have an example? Stay safe - Damian Pacific Engineering Systems International, 277-279 Broadway, Glebe NSW 2037 Ph:+61-2-8571-0847 .. Fx:+61-2-9692-9623 | unsolicited email not wanted here Views & opinions here are mine and not those of

Re: Is pf still the recommended firewall/NAT software for OpenBSD?

2022-12-01 Thread Maurice McCarthy
Yes On Fri, 2 Dec 2022, 01:14 Steve Litt, wrote: > Is pf still the recommended firewall/NAT software for OpenBSD? > > Thanks, > > SteveT > > Steve Litt > Autumn 2022 featured book: Thriving in Tough Times > http://www.troubleshooters.com/bookstore/thrive.htm > >

Re: pf rdr-to (localhost ntpd) not always works

2022-09-15 Thread Kapetanakis Giannis
efore with 1.2.3.4). > > 10:34:26.812675 x.x.x.x.123 > 2.3.4.5.123: v4 alarm client strat 0 poll 3 > prec -6 (DF) > 10:34:28.812571 x.x.x.x.123 > 2.3.4.5.123: v4 alarm client strat 0 poll 3 > prec -6 (DF) > 10:34:30.812587 x.x.x.x.123 > 2.3.4.5.123: v4 alarm client st

Re: pf rdr-to (localhost ntpd) not always works

2022-09-15 Thread Kapetanakis Giannis
em. > > all udp 127.0.0.1:123 (remote_ntp1:123) <- y.y.y.y:54401   SINGLE:MULTIPLE > all udp 127.0.0.1:123 (remote_ntp2:123) <- y.y.y.y:52525   SINGLE:MULTIPLE > > :( > > G Yes indeed. from info debug level I get. Sep 15 15:48:02 fw /bsd: pf: stack key attach failed on

pf rdr-to (localhost ntpd) not always works

2022-09-15 Thread Kapetanakis Giannis
t 0 poll 3 prec -6 (DF) I also see the pf log (4 times now and not 1 as before) Sep 15 10:34:26.812688 rule 154/(match) pass in on int_if: x.x.x.x.123 > 2.3.4.5.123: v4 alarm client strat 0 poll 3 prec -6 (DF) Sep 15 10:34:28.812583 rule 154/(match) pass in on int_if: x.x.x.x.123 > 2.3.4.

Re: SOLVED: Re: how to use OpenBSD firewall (pf) to protect Ooma Telo VOIP phone system

2022-08-18 Thread Jonathan Thornburg
In message <https://marc.info/?l=openbsd-misc=166062861021368=1> I described how I'm using an OpenBSD firewall (pf) to protect a VOIP phone system. A small correction: I wrote: > The firewall > also runs unbound to provide caching DNS service to the VOIP box and the > local compu

SOLVED: Re: how to use OpenBSD firewall (pf) to protect Ooma Telo VOIP phone system

2022-08-15 Thread Jonathan Thornburg
In message <https://marc.info/?l=openbsd-misc=162550822403762=1> (date 2021-07-05) I wrote: > Has anyone used an OpenBSD firewall (pf) to protect an Ooma Telo VOIP > phone system from internet attacks? If so, how did you do it? More > generally, how do people protect VOI

Re: mpls and pf

2022-08-01 Thread Holger Glaess
0,em1 } no state" they don't show the mpls neigbor but the rule match. is there a possebility to do an kind of pass quick on { em0 , em1 } mpls ? how can i handle correct mpls with pf ? I have zero hands on experience with mpls, but since [Mon Aug 01 12:35:07] peter@skapet:~$ apropos mp

mpls and pf

2022-08-01 Thread Holger Glaess
r but the rule match. is there a possebility to do an kind of pass quick on { em0 , em1 } mpls  ? how can i handle correct mpls with pf ? Holger

<    1   2   3   4   5   6   7   8   9   10   >