Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 05 Mar 2008 14:28:10 +0000
From:      Matthew Seaman <m.seaman@infracaninophile.co.uk>
To:        Dennis Melentyev <dennis.melentyev@gmail.com>
Cc:        =?UTF-8?B?0JLQu9Cw0LTQuNGB0LvQsNCyINCd0LXQtNC+0YHQtdC60LjQvQ==?= <mr.vladis@gmail.com>, stable@freebsd.org
Subject:   Re: Could Not open some sites from Windows Vista and Server 2008 when using FreeBSD as gw
Message-ID:  <47CEADFA.8090502@infracaninophile.co.uk>
In-Reply-To: <b84edfa10803050608i3d647fcv2ede7737dbea54c5@mail.gmail.com>
References:  <fedd0b9d0803050049t7849a199y339f707033bb4aec@mail.gmail.com>	<b84edfa10803050244t1e26264atc65e80ef09cd3572@mail.gmail.com>	<fedd0b9d0803050429p5d1365b9x4527fe8b1019c666@mail.gmail.com> <b84edfa10803050608i3d647fcv2ede7737dbea54c5@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
-----BEGIN PGP SIGNED MESSAGE-----
Hash: RIPEMD160

Dennis Melentyev wrote:
> Hi!
> 
> Well, I'm not a PF professional, and you have rather advanced setup.
> So, someone with good PF experience is needed here.
> 
> 2008/3/5, Владислав Недосекин <mr.vladis@gmail.com>:
>> Hi, i understand that there is too little facts to analyze, but maybe some
>> one have the same problem and also i can provide you information.
>> TCP dump 192.168.200.11 - ip of PC with vista
>>  # tcpdump | grep 192.168.200.11
>> tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
>>  listening on ste0, link-type EN10MB (Ethernet), capture size 96 bytes
>> ^C^C^C^C3 packets captured
>>  433 packets received by filter
>> 0 packets dropped by kernel
>> # tcpdump | grep 192.168.200.111
>>  tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
>> listening on ste0, link-type EN10MB (Ethernet), capture size 96 bytes
> ...
>> 13:51:47.676471 arp who-has 192.168.200.200 (00:1d:60:ce:74:e8 (oui
>> Unknown)) tell 192.168.200.111
> 
> What's that?
> ...
> 
> 
>> PF.CONF
>>
> ...
> 
>> #       Block Policy
>> block in log all
>> block in log quick from no-route to any
>> block in log quick on $ext_if from <rfc1918>
>>  block return-icmp out log quick on $ext_if to <rfc1918>
>> antispoof quick for $int_if
>> antispoof quick for $ext_if
>> block out from 192.168.0.146 to any
> 
> Does log shows anything interesting? I mean dropped packets.
> 
> What about SQUID's log? Some special auth? Client's insisting on
> HTTP/1.1? Some glitches with transparent proxying (if I get it right
> from your PF config)?
> 
>> i've tried
>>  sysctl net.inet.tcp.rfc1323=0
>> but it does't help.
>>
>> And about ip6 it is disabled, but in enabled state it does't help.
> 
> Dropped by PF?
> 

A very good trick when debugging pf rulesets is to make sure that any
block rules also log the blocked packets -- in this case that should
include the antispoofing rules "antispoof log quick for { $int_if $extif }"

Then you can use tcpdump on the firewall against the pflog0 pseudo interface
to see what traffic is being blocked as it happens:

   # tcpdump -vv -i pflog0 

	Cheers,

	Matthew

- -- 
Dr Matthew J Seaman MA, D.Phil.                       Flat 3
                                                      7 Priory Courtyard
PGP: http://www.infracaninophile.co.uk/pgpkey         Ramsgate
                                                      Kent, CT11 9PW, UK
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.4 (FreeBSD)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFHzq363jDkPpsZ+VYRAzBuAJ4/Cy9GA+m8iDv1jeYPeCM/xOFOvQCfc6XB
yOqR3qTYmijkFA9fVygqH80=
=apq8
-----END PGP SIGNATURE-----



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?47CEADFA.8090502>