From owner-freebsd-questions@FreeBSD.ORG Sun Jul 24 18:31:32 2005 Return-Path: X-Original-To: questions@freebsd.org Delivered-To: freebsd-questions@FreeBSD.ORG Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 4B24E16A41F for ; Sun, 24 Jul 2005 18:31:32 +0000 (GMT) (envelope-from gouders@et.bocholt.fh-gelsenkirchen.de) Received: from alice.et.bocholt.fh-gelsenkirchen.de (alice.et.bocholt.fh-gelsenkirchen.de [193.175.197.63]) by mx1.FreeBSD.org (Postfix) with ESMTP id 7E87A43D4C for ; Sun, 24 Jul 2005 18:31:25 +0000 (GMT) (envelope-from gouders@et.bocholt.fh-gelsenkirchen.de) Received: from musashi.et.bocholt.fh-gelsenkirchen.de (musashi.et.bocholt.fh-gelsenkirchen.de [193.175.197.95]) by alice.et.bocholt.fh-gelsenkirchen.de (8.12.9/8.12.9) with ESMTP id j6OIVNeD020270 (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO) for ; Sun, 24 Jul 2005 20:31:24 +0200 Received: from karga.hank.home ([10.8.0.6]) by musashi.et.bocholt.fh-gelsenkirchen.de (8.13.3/8.13.3) with ESMTP id j6OIVM8C081676 for ; Sun, 24 Jul 2005 20:31:23 +0200 (CEST) (envelope-from hank@karga.hank.home) Received: from localhost (localhost [127.0.0.1]) by karga.hank.home (8.13.3/8.13.3) with ESMTP id j6OIXrd2000676 for ; Sun, 24 Jul 2005 20:33:53 +0200 (CEST) (envelope-from hank@karga.hank.home) Message-Id: <200507241833.j6OIXrd2000676@karga.hank.home> To: questions@freebsd.org In-Reply-To: Message from Chuck Swiger of "Sun, 24 Jul 2005 12:09:01 EDT." <42E3BD1D.4020301@mac.com> Date: Sun, 24 Jul 2005 20:33:53 +0200 From: Dirk GOUDERS X-Scanned-By: MIMEDefang 2.43 Cc: Subject: Re: ipfw and tun0 X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 24 Jul 2005 18:31:32 -0000 > > Well, I am a little bit confused, because usually, I run machines with > > "real" NICs and if I activate firewall rules that drop packets from > > that NIC, I can run tcpdump on that NIC and will not see the dropped > > packets. > > Are you 100% certain of that? No, I now realize, that I was always inspecting ipfw's log messages and just assumed that dropped packets do not appear to tcpdump without ever verifying that assumption. Thanks for pointing that out. > > Does that mean, that there is no way, to inspect the network > > traffic from tun0 after it has been "cleaned up" by ipfw and that is > > not forwarded to the internal NIC? > > You can either add a log rule after your IPFW reject rules, and have the > firewall itself log the traffic which is permitted through, or you could use > another divert rule and force that traffic into a daemon which looks at the > packets (this is how natd works, after all). I guess, I will use ipfw's logging facility. Thanks again for clarification. Dirk