-
Notifications
You must be signed in to change notification settings - Fork 759
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
pf rules are dropped on lan when no connected and linkup event occurs on other interface #451
Comments
AdSchellevis
added a commit
that referenced
this issue
Nov 3, 2015
AdSchellevis
added a commit
that referenced
this issue
Nov 3, 2015
AdSchellevis
added a commit
that referenced
this issue
Nov 3, 2015
… if not needed. loosly related to #451
|
Tested with 288bc8c and it looks like it solved when using this fix. |
AdSchellevis
added a commit
that referenced
this issue
Nov 4, 2015
AdSchellevis
added a commit
that referenced
this issue
Nov 4, 2015
…ay change during the session... all for saving a ifconfig call. related to, #451 (try to avoid smilar issues)
AdSchellevis
added a commit
that referenced
this issue
Nov 10, 2015
(cherry picked from commit 288bc8c)
AdSchellevis
added a commit
that referenced
this issue
Nov 10, 2015
(cherry picked from commit fdc754e)
AdSchellevis
added a commit
that referenced
this issue
Nov 10, 2015
(cherry picked from commit 50dc2e5)
fichtner
added a commit
that referenced
this issue
Dec 7, 2015
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
This issue occurs when one would unplug the lan cable and plugin another network cable in another port causing a linkup. In that case the pf rules for the LAN interface are lost.
Test scenario:
em0: LAN, 192.168.1.1/24 + DHCP server 192.168.1.100-200
em1: WAN dhcp client
em2: DMZ, 192.168.2.1/24 + DHCP server 192.168.2.100-200 (also tested with static ip, same result)
Connect your pc to LAN (em0), you will receive an IP adres from the server and the rules list:
pfctl -sr | grep em0scrub on em0 all fragment reassemble
block drop in log on ! em0 inet from 192.168.1.0/24 to any
block drop in log on em0 inet6 from fe80::1:1 to any
pass in quick on em0 inet proto udp from any port = bootpc to 255.255.255.255 port = bootps keep state label "allow access to DHCP server"
pass in quick on em0 inet proto udp from any port = bootpc to 192.168.1.1 port = bootps keep state label "allow access to DHCP server"
pass out quick on em0 inet proto udp from 192.168.1.1 port = bootps to any port = bootpc keep state label "allow access to DHCP server"
pass quick on em0 inet6 proto udp from fe80::/10 to fe80::/10 port = dhcpv6-client keep state label "allow access to DHCPv6 server"
pass quick on em0 inet6 proto udp from fe80::/10 to ff02::/16 port = dhcpv6-client keep state label "allow access to DHCPv6 server"
pass quick on em0 inet6 proto udp from fe80::/10 to ff02::/16 port = dhcpv6-server keep state label "allow access to DHCPv6 server"
pass quick on em0 inet6 proto udp from ff02::/16 to fe80::/10 port = dhcpv6-server keep state label "allow access to DHCPv6 server"
pass in quick on em0 proto tcp from any to (em0) port = https flags S/SA keep state label "anti-lockout rule"
pass in quick on em0 proto tcp from any to (em0) port = http flags S/SA keep state label "anti-lockout rule"
pass in quick on em0 inet from 192.168.1.0/24 to any flags S/SA keep state label "USER_RULE: Default allow LAN to any rule"
Unplug LAN cable and put it into DMZ, wait until you get an IP adres and look at the rule set again:
pfctl -sr | grep em0No ALTQ support in kernel
ALTQ related functions disabled
scrub on em0 all fragment reassemble
pass in quick on em0 inet proto udp from any port = bootpc to 255.255.255.255 port = bootps keep state label "allow access to DHCP server"
pass quick on em0 inet6 proto udp from fe80::/10 to fe80::/10 port = dhcpv6-client keep state label "allow access to DHCPv6 server"
pass quick on em0 inet6 proto udp from fe80::/10 to ff02::/16 port = dhcpv6-client keep state label "allow access to DHCPv6 server"
pass quick on em0 inet6 proto udp from fe80::/10 to ff02::/16 port = dhcpv6-server keep state label "allow access to DHCPv6 server"
pass quick on em0 inet6 proto udp from ff02::/16 to fe80::/10 port = dhcpv6-server keep state label "allow access to DHCPv6 server"
pass in quick on em0 proto tcp from any to (em0) port = https flags S/SA keep state label "anti-lockout rule"
pass in quick on em0 proto tcp from any to (em0) port = http flags S/SA keep state label "anti-lockout rule"
NOTICE: We lost the Default allow LAN to any rule.. same thing happening with other rules if configured.
The text was updated successfully, but these errors were encountered: