Re: RDR for internal machine

2003-03-31 Thread Srebrenko Sehic
On Mon, Mar 31, 2003 at 10:53:09AM -0600, Darley Ware wrote: > 1. I have webserver on the internal LAN which listens on port 8000. I can > view the webserver internally by IP and by name (using LMHOST records). I > have not however been able to access the internal webserver from the > outside.

Re: antispoof vs. ip aliases

2003-03-30 Thread Srebrenko Sehic
On Sun, Mar 30, 2003 at 06:29:09PM +0200, Henning Brauer wrote: > yes, that is known. I don't see a real world problem with this; the effect > is zero as skip steps solve that nicely. Hurray for skip-steps then ;) However, imagine having tons of aliases; resulting filter rules might get a bit ugl

antispoof vs. ip aliases

2003-03-30 Thread Srebrenko Sehic
$ cat /etc/hostname.fxp0 inet 10.0.3.20 255.0.0.0 NONE inet alias 10.1.3.20 255.0.0.0 inet alias 10.2.3.20 255.0.0.0 inet alias 10.3.3.20 255.0.0.0 inet alias 10.4.3.20 255.0.0.0 inet alias 10.5.3.20 255.0.0.0 $ grep antispoof /etc/pf.c

Re: pf(4) schemantics

2003-03-21 Thread Srebrenko Sehic
On Fri, Mar 21, 2003 at 12:50:43PM +0100, Henning Brauer wrote: > I'm close to give up on you wrt to that. SOmehow it seems you don't _want_ > to see why the filtering outbond on an interface is so important. I gave a > very good example why that is absolutely needed. Bla, bla, since traffic can

Re: pf(4) schemantics

2003-03-21 Thread Srebrenko Sehic
On Fri, Mar 21, 2003 at 12:52:14PM +0100, Henning Brauer wrote: > On Thu, Mar 20, 2003 at 11:16:10PM +0100, Srebrenko Sehic wrote: > > This is cosmetics. However, whouldn't we get some performance increase > > if pf(4) didn't bother looking at packets (in certain situation

Re: pf(4) schemantics

2003-03-21 Thread Srebrenko Sehic
On Thu, Mar 20, 2003 at 04:13:04PM -0700, [EMAIL PROTECTED] wrote: > > I assume that 'pass out all keep state' makes pf(4), at least, do a > > state lookup in the table? AFAIK, that's, in worst case scenario, 16 > > searches down the binary tree? That ought to eat a few cycles. > I really doubt t

Re: pf(4) schemantics

2003-03-21 Thread Srebrenko Sehic
On Thu, Mar 20, 2003 at 06:27:04PM -0800, Kyle R. Hofmann wrote: > So far everyone who has responded to you has been polite, despite your > inability to comprehend what they're telling you. Now, in the proud > tradition of OpenBSD lusers everywhere, I will flame you: I don't recall _you_ being a

Re: pf(4) schemantics

2003-03-20 Thread Srebrenko Sehic
On Thu, Mar 20, 2003 at 02:49:37PM -0700, [EMAIL PROTECTED] wrote: > > Yes, but it could be nice if one could choose, eg. > > set filter-policy {in, out, both} or something. > > You can choose. Either type: > > block out all > or > pass out all keep state This is cosmetics. However, whouldn't we

Re: pf(4) schemantics

2003-03-20 Thread Srebrenko Sehic
On Thu, Mar 20, 2003 at 02:16:02PM -0700, [EMAIL PROTECTED] wrote: > Again: traffic can originate on the firewall box. Since this traffic > never passes inbound on an interface, filtering MUST be done > on the outbound direction. (ie - transparent proxies). Yes, but it could be nice if one could

Re: Routing private networks

2003-03-20 Thread Srebrenko Sehic
On Thu, Mar 20, 2003 at 11:02:03AM -0800, Bryan Irvine wrote: > no nat on $WAN from $LAN to $DMZ > no nat on $WAN from $DMZ to $LAN > nat on $WAN inet from $LAN to any -> ($WAN) > nat on $WAN inet from $DMZ to any -> ($WAN) Packets from $LAN to $DMZ and vice versa, never go across $WAN interface.

Re: pf(4) schemantics

2003-03-20 Thread Srebrenko Sehic
On Thu, Mar 20, 2003 at 12:32:50PM -0700, [EMAIL PROTECTED] wrote: > Okay, I think I'm starting to understand what you want. (because I > believe we tossed the idea around at the last hackathon) > > Basically, you want a state-creating packet to be able to create state > on multiple interfaces, l

Re: pf(4) schemantics

2003-03-20 Thread Srebrenko Sehic
On Thu, Mar 20, 2003 at 12:43:52AM +0100, Henning Brauer wrote: > > No clear? Let me rephrase. Why not filter on inbound traffic only, even > > though you have 'block all' in your ruleset? > > this is like asking why your car engine doesn't work even given you have > fuel in a tank on the seat. >

Re: pf(4) schemantics

2003-03-20 Thread Srebrenko Sehic
On Wed, Mar 19, 2003 at 04:23:00PM -0800, Trevor Talbot wrote: > On Wednesday, Mar 19, 2003, at 15:19 US/Pacific, Srebrenko Sehic wrote: > > >block in all > >block out all > > > >## allow traffic on $ext_if to $webserver on 80/tcp and 443/tcp > >pass

Re: pf(4) schemantics

2003-03-19 Thread Srebrenko Sehic
On Wed, Mar 19, 2003 at 11:27:26PM +0100, Henning Brauer wrote: > > 1. What's the reason why packets 'travel' across an interface twice > > (both in and out)? This makes, IMHO, writing very tight rules a bit > > tricky. Especially if you want to start off with 'block all'. > > they come in on one

Re: Routing private networks

2003-03-19 Thread Srebrenko Sehic
On Wed, Mar 19, 2003 at 02:15:10PM -0800, Bryan Irvine wrote: > So would I need to turn on RIP at all? Or would it just "know" because > it's a directly connected interface? Sure, if those 2 interfaces are directly connected, then pf(4) can filter/route traffic (and do translation) without proble

Re: Routing private networks

2003-03-19 Thread Srebrenko Sehic
On Wed, Mar 19, 2003 at 01:37:35PM -0800, Bryan Irvine wrote: > What I want is for the 192.168.0.* and 10.0.*.* networks to see each > other just fine. Which is possible to do with routing, but then for > these networks to get onto the internet I have to turn on NAT (or do I?) > which makes the 2

pf(4) schemantics

2003-03-19 Thread Srebrenko Sehic
While working on a pf(4) tutorial/article, I started wondering about the following, 1. What's the reason why packets 'travel' across an interface twice (both in and out)? This makes, IMHO, writing very tight rules a bit tricky. Especially if you want to start off with 'block all'. 2. Say I 'block

rdr number/symbolic name inconsistency

2003-03-12 Thread Srebrenko Sehic
Eg, a pf.conf rule like, rdr on $outside_if proto tcp from any to 10.1.3.20 port smtp -> 192.168.0.3 port smtp will result in, $ pfctl -sn | grep smtp rdr on fxp0 inet proto tcp from any to 10.1.3.20 port = smtp -> 192.168.0.3 por

Re: Cisco PIX 4-port 10/100 card in OpenBSD-current

2003-02-26 Thread Srebrenko Sehic
On Wed, Feb 26, 2003 at 10:46:58AM +0100, Roger Skjetlein wrote: > Why are the Intel cards better than anything else? > How does Intel compare to the 3Com905C for instance? > > Everyone claims that Intel is the thing, but haven't actualley seen any > documentation on this yet. Well, experience

Cisco PIX 4-port 10/100 card in OpenBSD-current

2003-02-25 Thread Srebrenko Sehic
For all you pf firewall builders. I just tried installing a Cisco 4-port card (PIX-4FE; used in Cisco PIX firewalls) into my OpenBSD-current box and guess what? It works like a charm, so I wanted to share it. I know people often ask for this type of devices. Interfaces are detected as separate fxp

Cisco PIX 4-port 10/100 card in OpenBSD-current

2003-02-25 Thread Srebrenko Sehic
For all you pf firewall builders. I just tried installing a Cisco 4-port card (PIX-4FE; used in Cisco PIX firewalls) into my OpenBSD-current box and guess what? It works like a charm, so I wanted to share it. I know people often ask for this type of devices. Interfaces are detected as separate fxp

Re: Linux NFS no-DF status

2003-02-21 Thread Srebrenko Sehic
On Fri, Feb 21, 2003 at 02:40:29PM -0500, Jason Dixon wrote: > I don't want anyone's hair to stand on end, but I was just curious... > with the clarification recently given by the Linux camp on the > NFS/DF-bit issue, is there an effort currently under way to recognize > and support their implement

Re: Syntax error in Snapshot pf.conf

2003-02-19 Thread Srebrenko Sehic
On Wed, Feb 19, 2003 at 03:08:11PM -0700, [EMAIL PROTECTED] wrote: > > if you think about it for a minute, > > $interface/24 > > and > > $interface:network > > are not the same. > > they CAN expand to teh same thing. one possibility. just one. > > > Well true, but in most cases where this is

Re: Syntax error in Snapshot pf.conf

2003-02-19 Thread Srebrenko Sehic
On Wed, Feb 19, 2003 at 09:26:16PM +0100, Cedric Berger wrote: > Hmm, you're right. > And reading from pfvar.h, I believe this should work. > That's a weird setting, though. > We really need to reimplement ($int_if:network) someday. > I wrote a patch for that looong ago. > Cedric Is there any rea

Re: PF feature

2003-02-07 Thread Srebrenko Sehic
On Fri, Feb 07, 2003 at 10:10:34PM -0300, jorge wrote: > Hi: > i need the feature and power the "PF", but i need also FreeVRRP... > > is possible install PF in FreeBSD ? > > (i am install Freevrrp in openbsd 3.1 and 3.2, compiles ok, but a the > run command "/usr/local/sbin/freevrrpd" say: > > f

Re: RFC: libpf, simplifying pf(4) access to userland apps

2003-01-09 Thread Srebrenko Sehic
On Thu, Jan 09, 2003 at 11:13:41PM +0100, Henning Brauer wrote: > > Didn't know that. So, authpf can insert rules on fly using anchors, but is > > this possible with arbitrary applications? Say I want my snort box to insert > > filter rules into pf, by sending a messages (something like > > 'block

Re: RFC: libpf, simplifying pf(4) access to userland apps

2003-01-09 Thread Srebrenko Sehic
On Thu, Jan 09, 2003 at 09:43:34PM +0100, Daniel Hartmeier wrote: > As for a library, that would only make sense if it were an additional > abstraction layer somewhere between pf(4) ioctls and pfctl command line. > Whether you find a level that changes less often than pf(4) but is more > generic t

Re: RFC: libpf, simplifying pf(4) access to userland apps

2003-01-09 Thread Srebrenko Sehic
On Thu, Jan 09, 2003 at 09:52:56PM +0100, Cedric Berger wrote: > There is a "table" feature that has just been commited to the kernel. > You can write in pf.conf: > > table persist > block in from to any > > And then, your snort box can do the following: > ssh firewall pfctl -t snortblacklis

Re: RFC: libpf, simplifying pf(4) access to userland apps

2003-01-09 Thread Srebrenko Sehic
On Thu, Jan 09, 2003 at 07:50:09PM +0100, Henning Brauer wrote: > > pfctl does not support inserting rules on the fly and authpf needs that. > > On the other hand, the overhead of having that would be too big. > > h, things changed... authpf uses anchors now, that IS possible with > pfctl...

Re: RFC: libpf, simplifying pf(4) access to userland apps

2003-01-09 Thread Srebrenko Sehic
On Thu, Jan 09, 2003 at 07:22:14PM +0100, Cedric Berger wrote: > >If we leave out all the technical challenges involved, the real question > >is if the pf developers find this idea useful at all? > > > A few points, in wrac: > > 1) I kind of like libraries, but they are difficult to get right, >

Re: RFC: libpf, simplifying pf(4) access to userland apps

2003-01-09 Thread Srebrenko Sehic
On Thu, Jan 09, 2003 at 06:34:13PM +0100, Daniel Hartmeier wrote: > On Thu, Jan 09, 2003 at 06:20:55PM +0100, Srebrenko Sehic wrote: > > > What do you think about this? > > There is some sharing of pfctl code with authpf already, but it's done > by compiling and link

RFC: libpf, simplifying pf(4) access to userland apps

2003-01-09 Thread Srebrenko Sehic
I've sent this some time ago to misc@, but didn't get much response. I thought I might try the pf specific list. While working on my own tool, rpfcd (remote pf control dameon, http://www.insecure.dk/rpfcd/) I found myself reusing a lot of code from pfctl for pf(4) related routines. While some of s

Re: 'scrub out log' not working?

2003-01-07 Thread Srebrenko Sehic
On Tue, Jan 07, 2003 at 04:58:50AM +0100, Daniel Hartmeier wrote: > > Is scrub logging fully implemented? I have the following rules defined, > > The log options was ignored on scrub rules just until a couple of days > ago. With a recent -current, it works. My -current is from 04/01/03. Shouldn'

'scrub out log' not working?

2003-01-06 Thread Srebrenko Sehic
Is scrub logging fully implemented? I have the following rules defined, $ sudo pfctl -sr -v | head -n 5 scrub in all fragment reassemble [ Evaluations: 106920Packets: 105000Bytes: 0 States: 0 ] scrub out log all fragment reassemble [ Evaluations: 1920 Packets: 1920 B

Re: set limit states ulimited and pf.conf

2002-12-30 Thread Srebrenko Sehic
On Mon, Dec 30, 2002 at 08:37:28PM +0100, Wouter Clarie wrote: > > On a related note: the default pf.conf in the distribution, does have: > > #set limit { states unlimited, frags 5000 } > > which is not parseable if uncommented. /usr/src/etc/pf.conf also has, #set loginterface none #set optimi

Re: set limit states ulimited and pf.conf

2002-12-30 Thread Srebrenko Sehic
On Mon, Dec 30, 2002 at 07:40:23PM +0100, Daniel Hartmeier wrote: > On Mon, Dec 30, 2002 at 07:05:40PM +0100, Wouter Clarie wrote: > > > That should be more flexible eh? I'll see if i can cook up a diff for > > that tonight. > > Yes, it's rather simple to add support for either 'inf' or 'unlimit

Re: set limit states ulimited and pf.conf

2002-12-30 Thread Srebrenko Sehic
On Mon, Dec 30, 2002 at 07:05:40PM +0100, Wouter Clarie wrote: > On Mon, 30 Dec 2002, Dries Schellekens wrote: > > > If you don't specify a limit for states, it will be unlimited. But if you > > choice a number, there is no way to change it back to unlimited except by > > rebooting. So there is a

Re: set limit states ulimited and pf.conf

2002-12-30 Thread Srebrenko Sehic
On Mon, Dec 30, 2002 at 05:17:12PM +0100, Dries Schellekens wrote: > So I guess the correct syntax would be 'set limit states inf'. Can you try > this? Doesn't work either. I get, /etc/pf.conf:15: inf is not a number pfctl: Syntax error in file: pf rules not loaded // haver

set limit states ulimited and pf.conf

2002-12-30 Thread Srebrenko Sehic
Isn't 'set limit states unlimited' supposed to work in /etc/pf.conf? I get this: root@hellspawn:/root# grep states /etc/pf.conf set limit { states unlimited, frags 5000 } root@hellspawn:/root# grep states /usr/src/etc/pf.conf #set limit { states unlimited, frags 5000 } root@hellspaw

macro expansion and '!' wierdness

2002-12-28 Thread Srebrenko Sehic
Following does not work (on -current from today, btw) EXTIF="xl0" EXTIP="{ 10.0.3.20, 10.1.3.20, 10.2.3.20 }" block out log quick on $EXTIF from ! $EXTIP to any root@hellspawn:/root# pfctl -f pf.conf pf.conf:3: syntax error If I remove the !, no problem. This is not normal, right? // haver