Hello,
I'm trying to understand why there's no PF state for a outgoing
rule dedicated to dnscrypt-proxy (668) daemon.
pf.conf says 'user' option needs effective ID...
# ps -axo uid,ruid,gid,rgid,pid,args | grep dnscrypt
688 688 688 688 16665 /usr/local/sbin/dnscrypt-proxy -d
--local-address=127.0.0.1:5331 --user=_dnscrypt-proxy
# pfctl -sr
block drop out log quick on egress from ! (egress:0) to any
anchor "test-out" all
pass out log quick on egress inet proto udp from any to 208.67.220.220 port =
443 user = 688
pass out log quick on egress inet proto tcp from any to 208.67.220.220 port =
443 user = 688 flags S/SA
pass out log quick on egress inet proto icmp all icmp-type echoreq
block drop in log quick from no-route to any
block drop in log quick from urpf-failed to any
block drop out log quick all
block drop in log quick on egress inet from any to 255.255.255.255
anchor "test-in" all
pass in log quick on egress inet proto icmp from any to (egress:0) icmp-type
echoreq code 0
pass in log quick on egress inet proto tcp from any to (egress:0) port = 22
flags S/SA
block drop in log quick all
Now when dnscrypt-proxy tries to make a connection it is blocked.
Interestingly there's even no logged outgoing connection, but just
blocked return.
# tcpdump -i pflog0 -n -e -ttt -vv
tcpdump: WARNING: snaplen raised from 116 to 160
tcpdump: listening on pflog0, link-type PFLOG
Jan 26 00:41:00.884036 rule 7/(match) [uid 0, pid 23524] block out on iwn0:
[uid 0, pid 16665] 192.168.1.100.10976 > 208.67.220.220.443: udp 512 (ttl 64,
id 9876, len 540, bad cksum 208! differs by e108)
(from anchor)
# pfctl -ss
all tcp 192.168.1.100:16505 -> 66.7.199.108:22 ESTABLISHED:ESTABLISHED
Well it works if I add dnscrypt-proxy rule for root but why?
jirib