kern/73399: ipf blocks echo replies with keep state on pass out
icmp line
Giorgos Keramidas
keramida at freebsd.org
Tue Nov 2 09:30:37 PST 2004
The following reply was made to PR kern/73399; it has been noted by GNATS.
From: Giorgos Keramidas <keramida at freebsd.org>
To: Ted Cabeen <ted at impulse.net>
Cc: bug-followup at freebsd.org
Subject: Re: kern/73399: ipf blocks echo replies with keep state on pass out icmp line
Date: Tue, 2 Nov 2004 19:19:33 +0200
On 2004-11-01 16:35, Ted Cabeen <ted at impulse.net> wrote:
> With the following line in /etc/ipf.rules the firewall blocks outbound
> echo replies:
> pass out quick on fxp0 proto icmp all keep state
Can I see the full ruleset? This seems to be a problem with the ruleset
you are using. I just flushed all my ipfilter rules and loaded a simple
set like this:
: # ipfstat -hnio
: 0 @1 pass out quick on sis0 proto icmp from any to any keep state
: 3 @2 pass out quick proto udp from any to any port = 53 keep state
: empty list for ipfilter(in)
The first rule allows DNS lookups. The second is the rule you have
mentioned; I've only changed fxp0 to sis0, my interface name.
Outgoing icmp echo requests are passed as expected, and their incoming
icmp echo replies are also allowed:
: # ping www.otenet.gr
: PING www.otenet.gr (62.103.128.200): 56 data bytes
: 64 bytes from 62.103.128.200: icmp_seq=0 ttl=120 time=636.550 ms
: ^C
: --- www.otenet.gr ping statistics ---
: 2 packets transmitted, 1 packets received, 50% packet loss
: round-trip min/avg/max/stddev = 636.550/636.550/636.550/0.000 ms
Incoming echo requests do not receive a reply, because there is no
matching state to allow them in and there is no explicit allow rule for
incoming echo requests. Hence, echo replies are never sent from my
workstation, unless I also add:
: pass in quick on sis0 proto icmp from any to any keep state
This is not a bug though.
More information about the freebsd-bugs
mailing list