kern/73399: ipf blocks echo replies with keep state on pass out icmp line

Giorgos Keramidas keramida at freebsd.org
Tue Nov 2 14:40:35 PST 2004


The following reply was made to PR kern/73399; it has been noted by GNATS.

From: Giorgos Keramidas <keramida at freebsd.org>
To: Ted Cabeen <ted at impulse.net>
Cc: bug-followup at freebsd.org
Subject: Re: kern/73399: ipf blocks echo replies with keep state on pass out icmp line
Date: Wed, 3 Nov 2004 00:30:30 +0200

 On 2004-11-02 10:27, Ted Cabeen <ted at impulse.net> wrote:
 > Giorgos Keramidas <keramida at freebsd.org> writes:
 > > On 2004-11-01 16:35, Ted Cabeen <ted at impulse.net> wrote:
 > >> With the following line in /etc/ipf.rules the firewall blocks outbound
 > >> echo replies:
 > >> pass out quick on fxp0 proto icmp all keep state
 > >
 > > Can I see the full ruleset?  This seems to be a problem with the ruleset
 > > you are using.
 >
 !grep icmp rules
 > pass out quick on fxp0 proto icmp all keep state
 > pass in quick on fxp0 proto icmp from any to black icmp-type 0
 > pass in quick on fxp0 proto icmp from any to black icmp-type 8
 > pass in quick on fxp0 proto icmp from any to black icmp-type 11
 > block return-icmp(port-unr) in log quick on fxp0 proto udp all
 
 Your ruleset uses `keep state' for outgoing icmps but not for the icmp-types
 0, 8 and 11.  I'm not sure how ipfilter keeps states internally, but can you
 try one of the following?
 
 a. Add 'keep state' to the input rules too, or
 
 b. Replace all your icmp rules with a pair like this:
 
 	pass in icmp all
 	pass out icmp all
 
 If (a) doesn't work but (b) works, we'll have to look at this in more
 detail.  If they both work, it's probably a lot faster to keep (b) and
 use the net.inet.icmp.icmplim sysctl to limit the rate of icmp packets ;-)
 


More information about the freebsd-bugs mailing list