IPFW Problem

john.w.court at nokia.com john.w.court at nokia.com
Sun Nov 4 16:11:35 PST 2007


Yep bad advice on my part, should have re-read the man page first.  One
thing that might also be useful however would be to use the "ipfw -e -d
show" command when this occuring so that the expired and dynamic rule
set is also displayed.  I have logged bugs with IP6 keep-state in the
past but not IP4 so this might not help but it can't hurt having more
information :-)

Cheers

John 

-----Original Message-----
From: ext Russell Fulton [mailto:r.fulton at auckland.ac.nz] 
Sent: Monday, November 05, 2007 9:49 AM
To: Court John.W (Nokia-ES/Robina)
Cc: gbell72 at rogers.com; freebsd-ipfw at freebsd.org
Subject: Re: IPFW Problem



john.w.court at nokia.com wrote:
> Hmm, I may well be missing something very obvious but rule 01000 seems

> to be doing exactly what it says it will.  Are you sure you meant
"deny"
> rather than "allow" on rule 01000 ?

Note that it is immediately after the check state rule.  What the
Gardner intended was to drop established tcp traffic that was not part
of a session for which there was already state.  In fact this rule is
redundant since (assuming I've read the rule set correctly) such traffic
will get caught by the final deny rule.

What is odd about this problem is that it appears to be a timeout
problem and thus probably not related to the firewall at all.  To me it
seems that the initial SYN packet is getting lost and the retry gets
through, hence the delay.

I suggested to Gardner that he log all dropped packets so he can see if
it really is the firewall which is causing the problem.

Russell


More information about the freebsd-ipfw mailing list