On 19/08/2021 19:01, Stefan Sperling wrote:

Any idea?

I suspect the packets towards vether0 are being dropped by pf.
What does your pf.conf look like?

I have been looking in that direction, and reduced my pf.conf to this:

----
default_tcp_ports="{ 22 }"

set block-policy return
set skip on lo0
set skip on bridge0
set skip on vether0

anchor tables

block drop      # block stateless traffic
pass out        # establish keep-state

anchor letsencrypt_traffic


pass in on cnmac2 inet proto icmp from 192.168.1.0/24 to \
        ( cnmac2 ) keep state
pass in on cnmac2 inet proto tcp from any to \
        ( cnmac2) port $default_tcp_ports flags S/SA keep state
----

Do you see anything related in tcpdump -n -i pflog0, provided you've
using 'log' statements on your block rules in pf.conf?

I wasn't, so I switched "block drop" for "block drop log", and I saw the DHCP requests in the output of "tcpdump -n -i pflog0". First, it puzzled me that PF was the culprit, when I had specified "set skip" on bridge0 and vether0. Then, I realised I didn't "set skip" on the physical interfaces of the bridge, cnmac0 and cnmac1.

I still need to adjust things a bit, but thanks already for putting me on the right track!

--
Étienne

Reply via email to