Filtering bridge - how to decide which of the bridge's interfaces a packet arrived on?

Andrew Thompson thompsa at FreeBSD.org
Tue Oct 2 02:16:12 PDT 2007


On Tue, Oct 02, 2007 at 11:01:27AM +0300, Tobias Ernst wrote:
> Dear members of this list,
> 
> Recently, it was stated here by Andrew Thompson that
> 
> > anything that is destined for the
> > local host is tapped off early and handled specially. 
> 
> This referred to the fact that packets passing through a bridging
> firewall can be filtered on the individual inbound/outbound interfaces,
> but packets destined for the bridging firewall (that has assigned an ip
> address to the bridge interface) can only be filtered on the bridge
> interface.
> 
> I have now run into a problem with this. I am setting up a routing
> firewall with several DMZ, but for various reasons the DMZ use the same
> IP range as the internal net. I.e., the DMZ are bridged to the internal
> net, and the entire IP subnet is then routed to the external world.
> 
[...]
> 
> However, the above rules do not match packets sent from a machine with
> an illegal IP in the DMZ and destined for the firewall, because those
> packets only appear on bridge0. However, when I filter the packets on
> bridge0, I have no idea whether they arrived on the DMZ interface or on
> the internal interface.
> 
> Is there any other possibility of finding out which member of a bridge
> an inbound packet has arrived on?

Yes, a new option was added to HEAD that allows this (pfil_local_phys),
it adds an additional packet filter call on the member interface for
local packets.

> P.S.: FreeBSD 6.2-RELEASE

Its not in 6.2 unfortunately but will be MFC'd in time for 6.3


Andrew


More information about the freebsd-pf mailing list