On Sun, May 3, 2009 at 10:14 AM, dug <[email protected]> wrote:
> Thans for your reply.
>
> Le 2 mai 09 ` 10:59, ropers a icrit :
>
>> 2009/5/1 dug <[email protected]>:
>> 0>
>> 1> #Allow SMTP, HTTPS
>> 2> pass quick proto tcp from any to {<public-ip> <mail-server>} port
>> 25
>> 3> pass quick proto tcp from any to {<public-ip> <mail-server>} port
>> 443
>> 4> pass quick proto tcp from {<public-ip> <mail-server>} port 25 to
>> any
>> 5> pass quick proto tcp from {<public-ip> <mail-server>} port 25 to
>> any
>> 6> pass quick proto tcp from any port 25 to {<public-ip> <mail-
>> server>}
>> 7> pass quick proto tcp from {<public-ip> <mail-server>}  to any
>> port 25
>>
>> Line 4 and 5 are identical. Presumably you wanted to write port 443
>> in line 5?
>
> Ok. It's just a mistake rewriting the rule in the mail.
> In my pf.conf, it's set to port 443, not port 25.
>
>>>
>>> block in on em0: mail-server.59902 > 81.255.99.202.25: [|tcp] (ttl
>>> 63, id
>>> 14511, len 40)
>>>
>>> block in on em0: mail-server.59902 > 81.255.99.202.25: [|tcp] (ttl
>>> 63, id
>>> 40161, len 52)
>>>
>>
>> Not sure what's going on here; line 7 should match these.
>
> That's my problem and what I don't understand ....
> In a perfect world, my rule must match these packets .... But
> currently not.
>
>
>>> block in on em0: mail-server.25 > 81.28.185.240.1777: [|tcp] (ttl
>>> 63, id
>>> 4151, len 41)
>>>
>>
>> Not sure what's going on there; line 4 (and, currently, 5) should
>> match these.
>
> Setting the rule "pass quick from any to any" at the beginning of my
> pf.conf file doesn't solve the problem.
> I always have block on these packets ....
>
> Logs of pftop tool :
>
> pfTop: Up Rule 1-55/71, View: rules, Cache: 10000
>
> RULE  ACTION   DIR LOG Q IF     PR        K     PKTS    BYTES
> STATES   MAX INFO
>   0  Pass     Any     Q                  K      560    69035
> 96       all  flags S/SA
>   1  Block    Any Log                            44     1772
> 0       drop all
>
>
> This is the option in the pf.conf file :
>
> set block-policy drop
> set skip on {gif0}
> set loginterface $ext_if
> set limit { states 100000, frags 50000 }
> set optimization normal
> set state-policy if-bound

Remove that last line and it should work.

If not, send the output of pfctl -s rules.

-HKS


>
> scrub all no-df random-id fragment reassemble
>
> Regards.

Reply via email to