From owner-freebsd-isp@FreeBSD.ORG Fri Mar 11 19:51:53 2005 Return-Path: Delivered-To: freebsd-isp@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id B4F0716A531 for ; Fri, 11 Mar 2005 19:51:52 +0000 (GMT) Received: from web60306.mail.yahoo.com (web60306.mail.yahoo.com [216.109.118.117]) by mx1.FreeBSD.org (Postfix) with SMTP id 1865143D48 for ; Fri, 11 Mar 2005 19:51:52 +0000 (GMT) (envelope-from casteld73@yahoo.com) Received: (qmail 45610 invoked by uid 60001); 11 Mar 2005 19:51:51 -0000 Comment: DomainKeys? See http://antispam.yahoo.com/domainkeys DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; b=c5rtkPEg3dn4mlSyAki7/3EgOEyLLNq3NizvkynVzBb84UTQcLzAdumS4klaOlaiz068oGMhkcP8r5Nc4l01jz02IgUPBGD6SoZYk4mnHSNYTcyD6DaiRnyt4ZoCNhjbzeTM+RZiwSjxQSjtGPgc9xfLf/b51IwNBniqCMTJnfw= ; Message-ID: <20050311195150.45608.qmail@web60306.mail.yahoo.com> Received: from [66.95.160.2] by web60306.mail.yahoo.com via HTTP; Fri, 11 Mar 2005 11:51:50 PST Date: Fri, 11 Mar 2005 11:51:50 -0800 (PST) From: d c To: freebsd-isp@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Content-Filtered-By: Mailman/MimeDel 2.1.1 Subject: Transparent Firewall- Bridge on 5.3 X-BeenThere: freebsd-isp@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Internet Services Providers List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 11 Mar 2005 19:51:53 -0000 I have currently setup bridging on 5.3 p5 w/o too much effort. It works as documented. However I believe I am trying to do something that is not a function of bridging and I wanted to run it by the experts. Essentially I want ALL traffic to pass through the bridge. I accomplished this from the handbook. However I would like to pickoff any packets destined for port 25. Then I would like to forward them to 127.0.0.1:10025. >From the googling I have done I have seen notes mentioning the bridge not handling "fwd" with ipfilter. Here is the rule I am using: ipfw add 100 fwd 127.0.0.1,10025 tcp from not me to any 25 If I log it does show up in /var/log/security. 1. Is there a special directive I need to use when processing layer3 on a layer 2 bridge ? 2. Is the fwd command supported? Goal: Have a transparent device that intercepts all email and hands off to clamsmtp which is listening on 127.0.0.1:10025 Issue: Packets do not seem to be making it to clamsmtp for processing. Also- Does handing off to the loopback on a bridge cause any problems. Could I be making an infinte loop? Anyway to set the rule to process in one direction only on a bridge? Any advice / help / questions /comments would be greatly appreciated. TIA __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com